x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) [ 820.602417][T20879] loop4: detected capacity change from 0 to 128 [ 820.628690][T20878] loop5: detected capacity change from 0 to 2048 13:58:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$eJzs3F9IU38Yx/HHPz/1Z+hGRFBQPeVNRRzcrgMdoRENjHJhCcExz2rstI2dsZqEWxB400U3/buuIEIQoosgELvoKpTwrovuvPMiu0oiOjGnudnUMnWS79fF9rDn+zl8z58dtu9g08fvXouGHSNspqS6oUqq2yUns1XilWpZkJMj10fe7zt34eLpQDDYcVa1M9Dt86tq84HR3pvDh8ZSO86/bH5dL+PeS9Mz/qnx3eN7pr93X404GnE0Fk+pqX3xeMrssy3tv+9EDdUztmU6lkZijpUs6YfteCKRUTPW39SYSFqOo2Yso1Ero6m4ppIZNa+YkZgahqFNjYKVDacfBZbvhp7Puq7MpN65bn1OXNfNv9iwidNDhc2df9ctOv93Kj0lbKKim3qDiD2UDqVDhedCPxCWiNhiSat45JvkrxH38Yg7d6nkH2/4R4KTR9++UVWvDNrZ+Xw2HaopzfvEI95CpqBQd54Kdvi0oDT/nzQW5/3ikV3l8/6y+To53FKUN8Qjk5clLrZMjB78MtU19GAhP+hTPdEVXJL/X/oXD9OzzxU6PwAAAAAAAAAArIWhP5VdvzfyA24PqGrTkn4hX+73gaXr861l1+drZW9tZfcdAAAAAIDtwskMRE3btpJ/WeS/yq/Hdv694smt3x+8v3PlMS1tNRPtH3KJrbBff1B87dkS0ygtZH71abXBNev8TlksPq3Ldqrm57f8mJO9H1+sup26X47PcsY2/q4EAAAAYCMsfuhvk2z4VTrbc+xepecEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMB2s4a/HJt4WK6l+WLn03KtSu8jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADASn4EAAD//xAR0Ao=") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$eJzs3F9IU38Yx/HHPz/1Z+hGRFBQPeVNRRzcrgMdoRENjHJhCcExz2rstI2dsZqEWxB400U3/buuIEIQoosgELvoKpTwrovuvPMiu0oiOjGnudnUMnWS79fF9rDn+zl8z58dtu9g08fvXouGHSNspqS6oUqq2yUns1XilWpZkJMj10fe7zt34eLpQDDYcVa1M9Dt86tq84HR3pvDh8ZSO86/bH5dL+PeS9Mz/qnx3eN7pr93X404GnE0Fk+pqX3xeMrssy3tv+9EDdUztmU6lkZijpUs6YfteCKRUTPW39SYSFqOo2Yso1Ero6m4ppIZNa+YkZgahqFNjYKVDacfBZbvhp7Puq7MpN65bn1OXNfNv9iwidNDhc2df9ctOv93Kj0lbKKim3qDiD2UDqVDhedCPxCWiNhiSat45JvkrxH38Yg7d6nkH2/4R4KTR9++UVWvDNrZ+Xw2HaopzfvEI95CpqBQd54Kdvi0oDT/nzQW5/3ikV3l8/6y+To53FKUN8Qjk5clLrZMjB78MtU19GAhP+hTPdEVXJL/X/oXD9OzzxU6PwAAAAAAAAAArIWhP5VdvzfyA24PqGrTkn4hX+73gaXr861l1+drZW9tZfcdAAAAAIDtwskMRE3btpJ/WeS/yq/Hdv694smt3x+8v3PlMS1tNRPtH3KJrbBff1B87dkS0ygtZH71abXBNev8TlksPq3Ldqrm57f8mJO9H1+sup26X47PcsY2/q4EAAAAYCMsfuhvk2z4VTrbc+xepecEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMB2s4a/HJt4WK6l+WLn03KtSu8jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADASn4EAAD//xAR0Ao=") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) [ 820.649137][T20882] loop2: detected capacity change from 0 to 128 [ 820.671479][T20886] loop3: detected capacity change from 0 to 128 [ 820.684746][T20878] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 820.746015][T20878] EXT4-fs error (device loop5): __ext4_iget:4893: inode #12: block 2: comm syz-executor.5: invalid block 13:58:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2000480, &(0x7f0000000fc0)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0], 0x1, 0x76f, &(0x7f00000007c0)="$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") creat(&(0x7f0000000000)='./file0\x00', 0x0) 13:58:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$eJzs3F9IU38Yx/HHPz/1Z+hGRFBQPeVNRRzcrgMdoRENjHJhCcExz2rstI2dsZqEWxB400U3/buuIEIQoosgELvoKpTwrovuvPMiu0oiOjGnudnUMnWS79fF9rDn+zl8z58dtu9g08fvXouGHSNspqS6oUqq2yUns1XilWpZkJMj10fe7zt34eLpQDDYcVa1M9Dt86tq84HR3pvDh8ZSO86/bH5dL+PeS9Mz/qnx3eN7pr93X404GnE0Fk+pqX3xeMrssy3tv+9EDdUztmU6lkZijpUs6YfteCKRUTPW39SYSFqOo2Yso1Ero6m4ppIZNa+YkZgahqFNjYKVDacfBZbvhp7Puq7MpN65bn1OXNfNv9iwidNDhc2df9ctOv93Kj0lbKKim3qDiD2UDqVDhedCPxCWiNhiSat45JvkrxH38Yg7d6nkH2/4R4KTR9++UVWvDNrZ+Xw2HaopzfvEI95CpqBQd54Kdvi0oDT/nzQW5/3ikV3l8/6y+To53FKUN8Qjk5clLrZMjB78MtU19GAhP+hTPdEVXJL/X/oXD9OzzxU6PwAAAAAAAAAArIWhP5VdvzfyA24PqGrTkn4hX+73gaXr861l1+drZW9tZfcdAAAAAIDtwskMRE3btpJ/WeS/yq/Hdv694smt3x+8v3PlMS1tNRPtH3KJrbBff1B87dkS0ygtZH71abXBNev8TlksPq3Ldqrm57f8mJO9H1+sup26X47PcsY2/q4EAAAAYCMsfuhvk2z4VTrbc+xepecEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMB2s4a/HJt4WK6l+WLn03KtSu8jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADASn4EAAD//xAR0Ao=") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) [ 820.824164][T20901] loop4: detected capacity change from 0 to 128 [ 820.826581][ T3410] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 820.831799][T20902] loop2: detected capacity change from 0 to 128 13:58:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) [ 820.866100][T20907] loop3: detected capacity change from 0 to 128 13:58:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$eJzs3F9IU38Yx/HHPz/1Z+hGRFBQPeVNRRzcrgMdoRENjHJhCcExz2rstI2dsZqEWxB400U3/buuIEIQoosgELvoKpTwrovuvPMiu0oiOjGnudnUMnWS79fF9rDn+zl8z58dtu9g08fvXouGHSNspqS6oUqq2yUns1XilWpZkJMj10fe7zt34eLpQDDYcVa1M9Dt86tq84HR3pvDh8ZSO86/bH5dL+PeS9Mz/qnx3eN7pr93X404GnE0Fk+pqX3xeMrssy3tv+9EDdUztmU6lkZijpUs6YfteCKRUTPW39SYSFqOo2Yso1Ero6m4ppIZNa+YkZgahqFNjYKVDacfBZbvhp7Puq7MpN65bn1OXNfNv9iwidNDhc2df9ctOv93Kj0lbKKim3qDiD2UDqVDhedCPxCWiNhiSat45JvkrxH38Yg7d6nkH2/4R4KTR9++UVWvDNrZ+Xw2HaopzfvEI95CpqBQd54Kdvi0oDT/nzQW5/3ikV3l8/6y+To53FKUN8Qjk5clLrZMjB78MtU19GAhP+hTPdEVXJL/X/oXD9OzzxU6PwAAAAAAAAAArIWhP5VdvzfyA24PqGrTkn4hX+73gaXr861l1+drZW9tZfcdAAAAAIDtwskMRE3btpJ/WeS/yq/Hdv694smt3x+8v3PlMS1tNRPtH3KJrbBff1B87dkS0ygtZH71abXBNev8TlksPq3Ldqrm57f8mJO9H1+sup26X47PcsY2/q4EAAAAYCMsfuhvk2z4VTrbc+xepecEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMB2s4a/HJt4WK6l+WLn03KtSu8jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADASn4EAAD//xAR0Ao=") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) [ 820.981706][T20923] loop3: detected capacity change from 0 to 128 [ 821.000110][T20925] loop2: detected capacity change from 0 to 128 [ 821.027009][T20927] loop4: detected capacity change from 0 to 128 [ 821.031529][T20918] loop5: detected capacity change from 0 to 2048 13:58:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) [ 821.079155][T20918] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 821.114368][T20918] EXT4-fs error (device loop5): __ext4_iget:4893: inode #12: block 2: comm syz-executor.5: invalid block 13:58:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) write$binfmt_misc(r1, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) [ 821.177619][T20946] loop3: detected capacity change from 0 to 128 [ 821.186984][ T3410] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 821.241755][T20951] loop2: detected capacity change from 0 to 128 [ 821.248158][ T25] audit: type=1400 audit(1683208712.805:154911): avc: denied { bind } for pid=20948 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 821.268070][ T25] audit: type=1400 audit(1683208712.805:154912): avc: denied { name_bind } for pid=20948 comm="syz-executor.4" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 13:58:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) [ 821.289488][ T25] audit: type=1400 audit(1683208712.805:154913): avc: denied { node_bind } for pid=20948 comm="syz-executor.4" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=dccp_socket permissive=1 [ 821.310947][ T25] audit: type=1400 audit(1683208712.805:154914): avc: denied { listen } for pid=20948 comm="syz-executor.4" lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 821.332198][ T25] audit: type=1400 audit(1683208712.805:154915): avc: denied { write } for pid=20948 comm="syz-executor.4" path="socket:[59774]" dev="sockfs" ino=59774 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 821.356333][ T25] audit: type=1400 audit(1683208712.805:154916): avc: denied { connect } for pid=20948 comm="syz-executor.4" lport=49157 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 821.362073][T20959] loop5: detected capacity change from 0 to 128 13:58:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$eJzs3F9IU38Yx/HHPz/1Z+hGRFBQPeVNRRzcrgMdoRENjHJhCcExz2rstI2dsZqEWxB400U3/buuIEIQoosgELvoKpTwrovuvPMiu0oiOjGnudnUMnWS79fF9rDn+zl8z58dtu9g08fvXouGHSNspqS6oUqq2yUns1XilWpZkJMj10fe7zt34eLpQDDYcVa1M9Dt86tq84HR3pvDh8ZSO86/bH5dL+PeS9Mz/qnx3eN7pr93X404GnE0Fk+pqX3xeMrssy3tv+9EDdUztmU6lkZijpUs6YfteCKRUTPW39SYSFqOo2Yso1Ero6m4ppIZNa+YkZgahqFNjYKVDacfBZbvhp7Puq7MpN65bn1OXNfNv9iwidNDhc2df9ctOv93Kj0lbKKim3qDiD2UDqVDhedCPxCWiNhiSat45JvkrxH38Yg7d6nkH2/4R4KTR9++UVWvDNrZ+Xw2HaopzfvEI95CpqBQd54Kdvi0oDT/nzQW5/3ikV3l8/6y+To53FKUN8Qjk5clLrZMjB78MtU19GAhP+hTPdEVXJL/X/oXD9OzzxU6PwAAAAAAAAAArIWhP5VdvzfyA24PqGrTkn4hX+73gaXr861l1+drZW9tZfcdAAAAAIDtwskMRE3btpJ/WeS/yq/Hdv694smt3x+8v3PlMS1tNRPtH3KJrbBff1B87dkS0ygtZH71abXBNev8TlksPq3Ldqrm57f8mJO9H1+sup26X47PcsY2/q4EAAAAYCMsfuhvk2z4VTrbc+xepecEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMB2s4a/HJt4WK6l+WLn03KtSu8jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADASn4EAAD//xAR0Ao=") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x3) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0x5407, 0x0) 13:58:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000200)=@updpolicy={0x13c, 0x19, 0x1, 0x0, 0x0, {{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x84, 0x5, [{{@in6=@loopback, 0x0, 0x2b}, 0x2, @in=@dev, 0x0, 0x1}, {{@in=@dev}, 0x0, @in6=@mcast1}]}]}, 0x13c}}, 0x0) 13:58:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x3) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0x5407, 0x0) 13:58:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000280), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) [ 821.377581][ T25] audit: type=1400 audit(1683208712.805:154917): avc: denied { name_connect } for pid=20948 comm="syz-executor.4" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 13:58:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000280), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 13:58:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000200)=@updpolicy={0x13c, 0x19, 0x1, 0x0, 0x0, {{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x84, 0x5, [{{@in6=@loopback, 0x0, 0x2b}, 0x2, @in=@dev, 0x0, 0x1}, {{@in=@dev}, 0x0, @in6=@mcast1}]}]}, 0x13c}}, 0x0) 13:58:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x3) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0x5407, 0x0) [ 821.453471][ T25] audit: type=1400 audit(1683208713.015:154918): avc: denied { create } for pid=20967 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 821.459854][T20969] loop3: detected capacity change from 0 to 128 13:58:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000280), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) [ 821.601880][T20982] loop5: detected capacity change from 0 to 128 13:58:33 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) write$binfmt_misc(r1, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 13:58:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x3) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0x5407, 0x0) 13:58:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000200)=@updpolicy={0x13c, 0x19, 0x1, 0x0, 0x0, {{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x84, 0x5, [{{@in6=@loopback, 0x0, 0x2b}, 0x2, @in=@dev, 0x0, 0x1}, {{@in=@dev}, 0x0, @in6=@mcast1}]}]}, 0x13c}}, 0x0) 13:58:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000280), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 13:58:33 executing program 3: io_uring_setup(0x93c, &(0x7f0000000100)={0x0, 0x0, 0x256}) 13:58:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000010c0), 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000012c0)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) r1 = socket(0x19, 0x6, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000016c0)=@gcm_256={{0x304}, "e3ac095e9dd50b8d", "505d329505093d55b6a1147ccf757d920db2e08ab2f54db7e46be55ab1974612", "c1b74276", "149c4db2d93c3bd5"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001180)={0x376, {{0xa, 0x4e23, 0x2, @remote, 0xa8}}, {{0xa, 0x4e24, 0x0, @private0, 0x5}}}, 0x108) syz_genetlink_get_family_id$gtp(&(0x7f0000001340), 0xffffffffffffffff) shutdown(r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001100)) sendto$inet6(r0, &(0x7f0000001100), 0x0, 0x2400c0c5, &(0x7f0000001140)={0xa, 0x4e1e, 0x0, @private1, 0x1}, 0x1c) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7EJAkEQBdC/uxye0QkWoD3YgE3YionJJRZiamhxpieInImpiPBe9GcmGH74rZqalvUxLZf64X7qU7t5GpK6TKaUeddN2ST7pGSVZDskafdd//5QS3nFcUw9t9szL5Icrt+sBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/4hEAAP//imUI/w==") r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560211820fffff5bab4e210000000058006f543bc2945f640094f96a0325010ebc000000000014008000f0fffeffe809004000fff5dd0000001000010008", 0x4d}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0xc, &(0x7f0000000000)=0xfffffffc, 0x4) accept4$unix(r2, &(0x7f00000013c0), &(0x7f0000001080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0xc0185879, 0x0) 13:58:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000200)=@updpolicy={0x13c, 0x19, 0x1, 0x0, 0x0, {{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x84, 0x5, [{{@in6=@loopback, 0x0, 0x2b}, 0x2, @in=@dev, 0x0, 0x1}, {{@in=@dev}, 0x0, @in6=@mcast1}]}]}, 0x13c}}, 0x0) 13:58:33 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) write$binfmt_misc(r1, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 13:58:33 executing program 3: io_uring_setup(0x93c, &(0x7f0000000100)={0x0, 0x0, 0x256}) 13:58:33 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ftruncate(r2, 0x2008002) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7031100, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) [ 822.097707][T20992] loop5: detected capacity change from 0 to 128 13:58:33 executing program 3: io_uring_setup(0x93c, &(0x7f0000000100)={0x0, 0x0, 0x256}) 13:58:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25}, {0x14}, {0x6}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) 13:58:34 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) write$binfmt_misc(r1, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 13:58:34 executing program 5: syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000180)={[{@map_normal}, {@nojoliet}, {@nojoliet}]}, 0xfd, 0x3c8, &(0x7f0000000a00)="$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") r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000e80)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x2c, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x13}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}]}}]}, 0x58}}, 0x0) mkdir(0x0, 0x0) 13:58:34 executing program 3: io_uring_setup(0x93c, &(0x7f0000000100)={0x0, 0x0, 0x256}) 13:58:34 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ftruncate(r2, 0x2008002) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7031100, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 13:58:34 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) write$binfmt_misc(r1, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 13:58:34 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000002c00)={0x1f, 0x0, @fixed, 0x0, 0x1}, 0xe) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x103) 13:58:34 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000002c00)={0x1f, 0x0, @fixed, 0x0, 0x1}, 0xe) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x103) 13:58:34 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000002c00)={0x1f, 0x0, @fixed, 0x0, 0x1}, 0xe) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x103) [ 822.966232][T21016] loop5: detected capacity change from 0 to 136 [ 822.978192][T21016] ISOFS: Unable to identify CD-ROM format. 13:58:34 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000002c00)={0x1f, 0x0, @fixed, 0x0, 0x1}, 0xe) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x103) 13:58:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25}, {0x14}, {0x6}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) 13:58:34 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25}, {0x14}, {0x6}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) 13:58:34 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ftruncate(r2, 0x2008002) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7031100, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 13:58:35 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) write$binfmt_misc(r1, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 13:58:35 executing program 5: syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000180)={[{@map_normal}, {@nojoliet}, {@nojoliet}]}, 0xfd, 0x3c8, &(0x7f0000000a00)="$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") r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000e80)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x2c, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x13}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}]}}]}, 0x58}}, 0x0) mkdir(0x0, 0x0) 13:58:35 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ftruncate(r2, 0x2008002) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7031100, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 13:58:35 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) write$binfmt_misc(r1, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 13:58:35 executing program 5: syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000180)={[{@map_normal}, {@nojoliet}, {@nojoliet}]}, 0xfd, 0x3c8, &(0x7f0000000a00)="$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") r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000e80)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x2c, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x13}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}]}}]}, 0x58}}, 0x0) mkdir(0x0, 0x0) [ 823.820870][T21040] loop5: detected capacity change from 0 to 136 [ 823.833020][T21040] ISOFS: Unable to identify CD-ROM format. 13:58:35 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25}, {0x14}, {0x6}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) 13:58:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25}, {0x14}, {0x6}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) 13:58:35 executing program 1: syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000180)={[{@map_normal}, {@nojoliet}, {@nojoliet}]}, 0xfd, 0x3c8, &(0x7f0000000a00)="$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") r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000e80)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x2c, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x13}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}]}}]}, 0x58}}, 0x0) mkdir(0x0, 0x0) [ 823.890412][T21048] loop5: detected capacity change from 0 to 136 [ 823.898186][T21048] ISOFS: Unable to identify CD-ROM format. 13:58:35 executing program 5: syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000180)={[{@map_normal}, {@nojoliet}, {@nojoliet}]}, 0xfd, 0x3c8, &(0x7f0000000a00)="$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") r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000e80)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x2c, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x13}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}]}}]}, 0x58}}, 0x0) mkdir(0x0, 0x0) 13:58:35 executing program 1: syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000180)={[{@map_normal}, {@nojoliet}, {@nojoliet}]}, 0xfd, 0x3c8, &(0x7f0000000a00)="$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") r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000e80)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x2c, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x13}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}]}}]}, 0x58}}, 0x0) mkdir(0x0, 0x0) 13:58:35 executing program 1: syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000180)={[{@map_normal}, {@nojoliet}, {@nojoliet}]}, 0xfd, 0x3c8, &(0x7f0000000a00)="$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") r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000e80)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x2c, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x13}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}]}}]}, 0x58}}, 0x0) mkdir(0x0, 0x0) [ 823.988168][T21060] loop5: detected capacity change from 0 to 136 [ 823.997935][T21060] ISOFS: Unable to identify CD-ROM format. 13:58:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000002c00)={0x1f, 0x0, @fixed, 0x0, 0x1}, 0xe) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x103) 13:58:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x401c5820, 0x0) 13:58:36 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000002c00)={0x1f, 0x0, @fixed, 0x0, 0x1}, 0xe) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x103) 13:58:36 executing program 4: r0 = io_uring_setup(0x5ed8, &(0x7f0000000500)) r1 = creat(&(0x7f0000005640)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) io_submit(r2, 0x1, &(0x7f0000000700)=[&(0x7f0000000000)={0x7c00, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000040)="d9", 0x1}]) 13:58:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x401c5820, 0x0) 13:58:36 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000002c00)={0x1f, 0x0, @fixed, 0x0, 0x1}, 0xe) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x103) 13:58:36 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25}, {0x14}, {0x6}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) 13:58:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25}, {0x14}, {0x6}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) 13:58:36 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00000003c0)="b2", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)='#', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) 13:58:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @local}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x5, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6}, 0x10) 13:58:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x401c5820, 0x0) 13:58:36 executing program 4: r0 = io_uring_setup(0x5ed8, &(0x7f0000000500)) r1 = creat(&(0x7f0000005640)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) io_submit(r2, 0x1, &(0x7f0000000700)=[&(0x7f0000000000)={0x7c00, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000040)="d9", 0x1}]) 13:58:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x401c5820, 0x0) 13:58:36 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00000003c0)="b2", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)='#', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) 13:58:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @local}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x5, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6}, 0x10) 13:58:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @local}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x5, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6}, 0x10) [ 824.808210][T21088] batadv0: entered promiscuous mode [ 824.816146][T21088] batadv_slave_1: entered promiscuous mode [ 824.831441][T21085] batadv_slave_1: left promiscuous mode [ 824.837272][T21085] batadv0: left promiscuous mode 13:58:36 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00000003c0)="b2", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)='#', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) 13:58:36 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00000003c0)="b2", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) sendmsg$inet6(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)='#', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) [ 824.878363][T21099] batadv0: entered promiscuous mode [ 824.887998][T21099] batadv_slave_1: entered promiscuous mode [ 824.894796][T21102] batadv0: entered promiscuous mode [ 824.900622][T21102] batadv_slave_1: entered promiscuous mode [ 824.906815][T21098] batadv_slave_1: left promiscuous mode [ 824.912620][T21098] batadv0: left promiscuous mode [ 824.917742][T21101] batadv_slave_1: left promiscuous mode [ 824.923454][T21101] batadv0: left promiscuous mode 13:58:37 executing program 4: r0 = io_uring_setup(0x5ed8, &(0x7f0000000500)) r1 = creat(&(0x7f0000005640)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) io_submit(r2, 0x1, &(0x7f0000000700)=[&(0x7f0000000000)={0x7c00, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000040)="d9", 0x1}]) 13:58:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) mmap(&(0x7f00007bc000/0x4000)=nil, 0x4000, 0x2, 0x28012, r0, 0x0) 13:58:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @local}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x5, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6}, 0x10) 13:58:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{&(0x7f0000000280)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000700)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0}}], 0x2, 0x0) 13:58:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @local}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x5, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6}, 0x10) 13:58:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{&(0x7f0000000280)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000700)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0}}], 0x2, 0x0) 13:58:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8100, &(0x7f0000000180)={[{@nocompress}, {@iocharset={'iocharset', 0x3d, 'cp737'}}, {@overriderock}, {@sbsector={'sbsector', 0x3d, 0x3}}, {@utf8}]}, 0x1, 0x944, &(0x7f0000001440)="$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") 13:58:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) mmap(&(0x7f00007bc000/0x4000)=nil, 0x4000, 0x2, 0x28012, r0, 0x0) 13:58:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{&(0x7f0000000280)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000700)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0}}], 0x2, 0x0) [ 825.675290][T21115] batadv0: entered promiscuous mode [ 825.686217][T21114] batadv0: entered promiscuous mode [ 825.696847][T21114] batadv_slave_1: entered promiscuous mode [ 825.705526][T21115] batadv_slave_1: entered promiscuous mode [ 825.715269][T21112] batadv_slave_1: left promiscuous mode 13:58:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{&(0x7f0000000280)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000700)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0}}], 0x2, 0x0) 13:58:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) mmap(&(0x7f00007bc000/0x4000)=nil, 0x4000, 0x2, 0x28012, r0, 0x0) 13:58:37 executing program 4: r0 = io_uring_setup(0x5ed8, &(0x7f0000000500)) r1 = creat(&(0x7f0000005640)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) io_submit(r2, 0x1, &(0x7f0000000700)=[&(0x7f0000000000)={0x7c00, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000040)="d9", 0x1}]) 13:58:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @local}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x5, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6}, 0x10) [ 825.721162][T21112] batadv0: left promiscuous mode [ 825.724022][T21119] loop2: detected capacity change from 0 to 1764 [ 825.726387][T21110] batadv_slave_1: left promiscuous mode [ 825.738215][T21110] batadv0: left promiscuous mode 13:58:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) mmap(&(0x7f00007bc000/0x4000)=nil, 0x4000, 0x2, 0x28012, r0, 0x0) 13:58:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8100, &(0x7f0000000180)={[{@nocompress}, {@iocharset={'iocharset', 0x3d, 'cp737'}}, {@overriderock}, {@sbsector={'sbsector', 0x3d, 0x3}}, {@utf8}]}, 0x1, 0x944, &(0x7f0000001440)="$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") 13:58:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @local}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x5, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6}, 0x10) 13:58:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)="d8000000180081054e81f782db4cb904021d080006007c09e8fe55a10a0015000400142603600e122f00160006000400a8000600200003400700027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1, 0x0, 0x0, 0x4a0f0000}, 0x0) 13:58:37 executing program 3: perf_event_open(&(0x7f0000000380)={0x8, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:58:37 executing program 3: perf_event_open(&(0x7f0000000380)={0x8, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 825.833026][T21134] batadv0: entered promiscuous mode [ 825.839345][T21139] validate_nla: 27 callbacks suppressed [ 825.839372][T21139] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 825.847622][T21136] loop2: detected capacity change from 0 to 1764 [ 825.853160][T21139] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.0'. 13:58:37 executing program 3: perf_event_open(&(0x7f0000000380)={0x8, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:58:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)="d8000000180081054e81f782db4cb904021d080006007c09e8fe55a10a0015000400142603600e122f00160006000400a8000600200003400700027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1, 0x0, 0x0, 0x4a0f0000}, 0x0) [ 825.878671][T21139] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 825.886880][T21139] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 825.900121][T21140] batadv0: entered promiscuous mode [ 825.905612][T21145] batadv_slave_1: entered promiscuous mode [ 825.911545][T21146] batadv_slave_1: entered promiscuous mode [ 825.923861][T21132] batadv_slave_1: left promiscuous mode 13:58:37 executing program 3: perf_event_open(&(0x7f0000000380)={0x8, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 825.929653][T21132] batadv0: left promiscuous mode [ 825.936984][T21150] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 825.945234][T21150] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.0'. [ 825.968094][T21150] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 13:58:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8100, &(0x7f0000000180)={[{@nocompress}, {@iocharset={'iocharset', 0x3d, 'cp737'}}, {@overriderock}, {@sbsector={'sbsector', 0x3d, 0x3}}, {@utf8}]}, 0x1, 0x944, &(0x7f0000001440)="$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") 13:58:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)={0x2c, r1, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@val={0x8}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x4, 0xe, 0x0, 0x0}]}]}]}]}, 0x2c}}, 0x0) 13:58:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000001100), 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000001dc0)='net/ip_vs_stats\x00') sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000000)={0x3c, r1, 0x961d0f24d09015d1, 0x0, 0x0, {0x3}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r2}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8}]}, 0x3c}}, 0x0) 13:58:37 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000680)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000c73000/0x1000)=nil, 0x0}, 0x68) 13:58:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)="d8000000180081054e81f782db4cb904021d080006007c09e8fe55a10a0015000400142603600e122f00160006000400a8000600200003400700027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1, 0x0, 0x0, 0x4a0f0000}, 0x0) [ 825.976261][T21150] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 825.986752][T21138] batadv_slave_1: left promiscuous mode [ 825.992927][T21138] batadv0: left promiscuous mode 13:58:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x25) 13:58:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000001100), 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000001dc0)='net/ip_vs_stats\x00') sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000000)={0x3c, r1, 0x961d0f24d09015d1, 0x0, 0x0, {0x3}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r2}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8}]}, 0x3c}}, 0x0) 13:58:37 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) 13:58:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000001100), 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000001dc0)='net/ip_vs_stats\x00') sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000000)={0x3c, r1, 0x961d0f24d09015d1, 0x0, 0x0, {0x3}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r2}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8}]}, 0x3c}}, 0x0) 13:58:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)={0x2c, r1, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@val={0x8}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x4, 0xe, 0x0, 0x0}]}]}]}]}, 0x2c}}, 0x0) 13:58:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x25) [ 826.064248][T21158] loop2: detected capacity change from 0 to 1764 [ 826.067403][T21163] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 826.078865][T21163] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.0'. 13:58:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000001100), 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000001dc0)='net/ip_vs_stats\x00') sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000000)={0x3c, r1, 0x961d0f24d09015d1, 0x0, 0x0, {0x3}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r2}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8}]}, 0x3c}}, 0x0) 13:58:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8100, &(0x7f0000000180)={[{@nocompress}, {@iocharset={'iocharset', 0x3d, 'cp737'}}, {@overriderock}, {@sbsector={'sbsector', 0x3d, 0x3}}, {@utf8}]}, 0x1, 0x944, &(0x7f0000001440)="$eJzs3c1vXOW9B/DvcWzwNSgEyOXmRkAm4QYM+Dpjp4RabOrYY2eoXyrbkYi6IJQkVRSrVNBKgLpIpaqronZRddHuWHaFxAY2VXbtX9BFpYp/AXWVnatzZkwmicfjpLYnTT8f6/i8/eZ5fmfOmfNoXs55wr+zjY2NarjP+fN/3M9kefCcnf3q088+KYefX88jOZDXii+S4SS1ZDDJkWRoZnZlebFHQdeSi0luJEWSR9Ma78jFFL/O47fmb6T4Q1kve2+D/2j9Pv4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBBVMzM1usTRRaaS+ffqnVXdQG+zfrN8r6sev0uvuxZb1KUQ4aHN7v6PnL41upnyn8n8mxr7tmqQ/IM5+PHnjn0xtODA5uP3yahffHBRx9fe2d9/fL7/U6kT+YbS83V5ebi9Hyj1lxdrk2dOVM/dW5utTbXXGisXlhdayzWZlYa02vLK7XRmZdrE1NTp2uN8QvL55fmZ8cXGpsLX///yXr9TO3N8e81pldWl5dOvTm+OnOuubDQXJqvYsrVZczr5YH43eZaba0xvVirXbm6fvl0ryTLoImdBE32CpqsT05OTExOTpx5beq11+v1wbsW1O+QuyL6f9DSX7t+Dof7NdBu/7OQZpZyPm+ltuXfTGazkuUsdlnfttn+nzzV2LbezvZ/s5U/cmv10VTt//Otuee7tf9dctm/vw/yUT7OtbyT9aznct7ve0a7/ze4zbr5NLKUZlaznGYWM10tqbWX1DKVMzmTet7OucxlNbXMpZmFNLKaC1nNWhrVETWTlTQynbUsZyW1jGYmL6eWiUxlKqdTSyPjuZDlnM9S5jOb6aqUK7laPe+nt8nxm6CJnQRNbhOk/edftxencbgvG+32/5HeoaMz+5EQAAAAsOv+9y85ePipP/89Gcpz1WfsAAAAwMOm+rnes+VoqJx6LsVcc6FR73daAAAAwC4qqmvsiiQjOdaa2rwSyocAAAAA8JCovv9/vhyNlFPHUnj/DwAAAA+b3vfY7xlRjG3e/rd2qTW+1I5o3+d3ZK650BifWV54YyIvVncZqK40uKu0A0kxVF1+8EqOt6KOj7TGI7eXOFxGTYy/MZFXcqK9IaMvlKMXRreInGxFvtSKfGmbyNNlJAA87E5s0x7vtP1/JWOtiLGjZWOawaNbtKx1LSsAPCh697HTM6L4Vo/3/0/lyrHWTwrG827ey3ouZay62qD6xcGWpY50/AxhrMenASMdPbyM9fg8YKSjo5exHp8IjHR0LwMAD5MTPdrhnbT/Yz3e/4/4SSEAPFC+6cF+Dyf6vY0AwO200gAAAAAAAAAAAAAAAAAAAAAAAAAAALD79uP+/yZM9Gti2BF+nxP9PjMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwH4rkwFbLB5JHk9STnNr/rPbO9X4n0GfFzdzMhznY7zwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB427fv/D6Q1fqy1KIMDyckkF5N8v9857qab/U6gzzru/1/u82wUGWzt9hRDM7Mry4vl7q/6fhj46tPPPimH+6mnLKCs4bbOJdo1dH/Uk9WjRmYvf3DtJ+/9uDZ7tkry7Nrcwuzi/Mp3bgU+U3ye1NIaNm3m+7OTf/rNFlv+ebmlO6t3rqp39u56/2erR29f73aurl+eLGtaa7y19tMfXf2wY9VTOZ68MJqM3l7TD8uhS03HM7RdbcXXxS+Lg/ldLlb7v3w2io2i3EVPVNv/X1eurl8ef/e99UtdcjqUY0kuJcM7z+lYdT7ZUnXUDQyVtdaroPLf4R7lbaujxIku2/BkdciM3NM21LpvQ6XH897O6HSXjJ7Oi/e8p1/sUeOWiq+LvxXn8tf8oqP/j4Fy/5/MTl6dZUwV2XGkdI0caEVWWz7ZueLtOyO7virZA7/KD/Ltb/b/QMf5v72v9ud81FHjHr4uHr1z+vAdLVL77NMty3aeh1tRXfL877yaDB69pzPKqz3OKHv1+v99MZp/5Lr+fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAdfkRzYavlAcjLJoSRPlPO1ZGM36hsYKXajmPt2va+1919xMzfzYQ72Ow8AAAAAAAAAdsfZ2a8+/eyTcqi+jz+Q/yu+SIZb3/QPJjlU/HZoZnZlebFHQUPJxSQ3yunhe8uhfFwevzV/o5w7cu/bAgDszD8DAAD//zduaEc=") 13:58:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)={0x2c, r1, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@val={0x8}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x4, 0xe, 0x0, 0x0}]}]}]}]}, 0x2c}}, 0x0) 13:58:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)="d8000000180081054e81f782db4cb904021d080006007c09e8fe55a10a0015000400142603600e122f00160006000400a8000600200003400700027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1, 0x0, 0x0, 0x4a0f0000}, 0x0) 13:58:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x25) 13:58:37 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) [ 826.123866][T21163] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 826.132067][T21163] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 13:58:37 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) 13:58:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)={0x2c, r1, 0xc4fc9e906872338b, 0x0, 0x0, {{0x15}, {@val={0x8}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x4, 0xe, 0x0, 0x0}]}]}]}]}, 0x2c}}, 0x0) 13:58:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x25) [ 826.193107][T21182] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 826.201388][T21182] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.0'. 13:58:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) 13:58:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) [ 826.265852][T21190] loop2: detected capacity change from 0 to 1764 [ 826.279763][T21182] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 826.287908][T21182] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 13:58:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0xa, 0x20, 0x708, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000001100), &(0x7f0000000240)=@tcp6, 0x2}, 0x20) 13:58:37 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) 13:58:37 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x1e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000006c0)='tasks\x00', 0x2, 0x0) setuid(0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) 13:58:38 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x1e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000006c0)='tasks\x00', 0x2, 0x0) setuid(0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) 13:58:38 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) 13:58:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0xa, 0x20, 0x708, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000001100), &(0x7f0000000240)=@tcp6, 0x2}, 0x20) 13:58:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0xa, 0x20, 0x708, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000001100), &(0x7f0000000240)=@tcp6, 0x2}, 0x20) 13:58:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) 13:58:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) 13:58:38 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x1e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000006c0)='tasks\x00', 0x2, 0x0) setuid(0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) 13:58:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0xa, 0x20, 0x708, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000001100), &(0x7f0000000240)=@tcp6, 0x2}, 0x20) 13:58:38 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x1e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000006c0)='tasks\x00', 0x2, 0x0) setuid(0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) 13:58:38 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) 13:58:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0xa, 0x20, 0x708, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000001100), &(0x7f0000000240)=@tcp6, 0x2}, 0x20) 13:58:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0xa, 0x20, 0x708, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000001100), &(0x7f0000000240)=@tcp6, 0x2}, 0x20) 13:58:38 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x1e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000006c0)='tasks\x00', 0x2, 0x0) setuid(0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) 13:58:38 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) 13:58:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) 13:58:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffeffffffff, 0x80000000}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x4, 0x3, 0x6, 0x3, 0x0, 0x1ff, 0x84091, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000500), 0x9}, 0x4800, 0x1, 0x5, 0x0, 0x20, 0x8, 0x800, 0x0, 0x7, 0x0, 0x33d}, 0xffffffffffffffff, 0x10, r0, 0x0) syz_clone(0x8009080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x0, 0x0, 0x0, 0x1, 0xfff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x9, 0x204, 0x3, 0xffffffffffffffff, 0xfffffffe}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r2, 0x40305839, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x7ff) 13:58:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0xa, 0x20, 0x708, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000001100), &(0x7f0000000240)=@tcp6, 0x2}, 0x20) 13:58:38 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x1e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000006c0)='tasks\x00', 0x2, 0x0) setuid(0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) 13:58:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ftruncate(r1, 0xc17a) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0xb034) 13:58:38 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x1e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000006c0)='tasks\x00', 0x2, 0x0) setuid(0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) 13:58:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ftruncate(r1, 0xc17a) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0xb034) 13:58:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ftruncate(r1, 0xc17a) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0xb034) 13:58:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x24}]}, &(0x7f0000001400)='syzkaller\x00', 0x7, 0xb5, &(0x7f0000001780)=""/181, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:58:38 executing program 3: request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVdx:De', 0x0) 13:58:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}, 0x0}]}}) 13:58:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x24}]}, &(0x7f0000001400)='syzkaller\x00', 0x7, 0xb5, &(0x7f0000001780)=""/181, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:58:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ftruncate(r1, 0xc17a) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0xb034) 13:58:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x50}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x22) 13:58:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_TIMEOUT={0xc}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 13:58:38 executing program 3: request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVdx:De', 0x0) 13:58:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x50}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x22) 13:58:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}, 0x0}]}}) 13:58:38 executing program 3: request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVdx:De', 0x0) 13:58:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_TIMEOUT={0xc}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 13:58:38 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5411, 0xfffffffffffffffd) 13:58:38 executing program 3: request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVdx:De', 0x0) [ 826.822098][T21275] syz-executor.0[21275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 13:58:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x50}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x22) 13:58:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}, 0x0}]}}) 13:58:38 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x5411, &(0x7f0000000080)) 13:58:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x24}]}, &(0x7f0000001400)='syzkaller\x00', 0x7, 0xb5, &(0x7f0000001780)=""/181, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 826.903099][T21288] syz-executor.0[21288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 826.980346][ T25] kauditd_printk_skb: 12 callbacks suppressed [ 826.980359][ T25] audit: type=1400 audit(1683208718.545:154931): avc: denied { create } for pid=21298 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 13:58:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_TIMEOUT={0xc}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 13:58:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}, 0x0}]}}) 13:58:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x50}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x22) 13:58:38 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5411, 0xfffffffffffffffd) 13:58:38 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x5411, &(0x7f0000000080)) 13:58:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x24}]}, &(0x7f0000001400)='syzkaller\x00', 0x7, 0xb5, &(0x7f0000001780)=""/181, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:58:38 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5411, 0xfffffffffffffffd) [ 827.040195][ T25] audit: type=1400 audit(1683208718.595:154932): avc: denied { ioctl } for pid=21298 comm="syz-executor.2" path="socket:[60361]" dev="sockfs" ino=60361 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 13:58:38 executing program 5: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:38 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5411, 0xfffffffffffffffd) 13:58:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_TIMEOUT={0xc}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 13:58:38 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x5411, &(0x7f0000000080)) 13:58:38 executing program 2: syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) syz_clone3(&(0x7f0000000080)={0x0, &(0x7f0000000100), &(0x7f0000000e00), &(0x7f0000000e40), {}, &(0x7f0000000e80)=""/24, 0x18, &(0x7f0000000ec0)=""/59, &(0x7f0000000f00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x81) 13:58:38 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x5411, &(0x7f0000000080)) [ 827.072941][T21307] syz-executor.0[21307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 827.143609][ T25] audit: type=1400 audit(1683208718.705:154933): avc: denied { execmem } for pid=21318 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 13:58:38 executing program 4: r0 = socket(0x15, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 13:58:38 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xd0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 13:58:38 executing program 2: syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) syz_clone3(&(0x7f0000000080)={0x0, &(0x7f0000000100), &(0x7f0000000e00), &(0x7f0000000e40), {}, &(0x7f0000000e80)=""/24, 0x18, &(0x7f0000000ec0)=""/59, &(0x7f0000000f00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x81) 13:58:38 executing program 4: r0 = socket(0x15, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 13:58:38 executing program 2: syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) syz_clone3(&(0x7f0000000080)={0x0, &(0x7f0000000100), &(0x7f0000000e00), &(0x7f0000000e40), {}, &(0x7f0000000e80)=""/24, 0x18, &(0x7f0000000ec0)=""/59, &(0x7f0000000f00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x81) [ 827.156004][T21325] syz-executor.0[21325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 827.276175][ T25] audit: type=1400 audit(1683208718.835:154934): avc: denied { read } for pid=21338 comm="syz-executor.4" name="event0" dev="devtmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 13:58:38 executing program 3: r0 = socket(0x15, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 13:58:38 executing program 4: r0 = socket(0x15, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 13:58:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:39 executing program 2: syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) syz_clone3(&(0x7f0000000080)={0x0, &(0x7f0000000100), &(0x7f0000000e00), &(0x7f0000000e40), {}, &(0x7f0000000e80)=""/24, 0x18, &(0x7f0000000ec0)=""/59, &(0x7f0000000f00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x81) 13:58:39 executing program 5: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:39 executing program 4: r0 = socket(0x15, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 13:58:39 executing program 3: r0 = socket(0x15, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 13:58:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:39 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xd0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 13:58:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:39 executing program 3: r0 = socket(0x15, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 13:58:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:39 executing program 5: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:39 executing program 5: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:40 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xd0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 13:58:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:41 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xd0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 13:58:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x0, &(0x7f0000000300)='\x00') r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r3, &(0x7f0000000540)=[{0x0}], 0x1, 0x81806, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x24}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000019c0)='rdma.max\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000840)={0x18, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0xfffffffffffffffd}, {&(0x7f0000000580)="acd5f40106fc439086cf966d2eb7faf8fa4a25452059ee2879408d72b51c0394a6dfd03bfe8585ba4a795b5b19940a4c867526918eed0ccd4bbde923fafa284343333d9d470d0ebc3fa2ec7b424795a67f9f9a4b45d51a91539116a3e5aee95abc823065d07891a68ba549290b2e46de624e16d6b3b21159fc2e9af37907dfdfd342a47939bf8063cb943a261e5ebde95bbba2a0f665283adf4c1eedcca86c73777ca128ca9c9ec8b2791faa1aedc6877baeea4d6d2cec9ebfb9e855b72fecc41d31e4b1a94b43cd5f4b5805f4986bf4", 0xd0}, {&(0x7f0000000440)="103e53a0941008fc9884f02a3c8b0d66d0ddfcd34f4dd030b4f4deb1c573be1a72547af44f3e3f98ac60471027b8e564b2dd60347c3f0dc03913b679a35b21cb1a9533b8bb033e3d8aa0fefcdd836210609cd3d7bcc0d06f0759f81ea4", 0x5d}, {&(0x7f0000000680)="594b07bc86d7ad925d400ce82a8ca9a12df8c9e58254c6dddf6add23bbbbd8dfebdf802bf304d9e6007a487a4f3cb0e6f9473a955bed4d83f22eb4d2279759d13b9e57fe5416547dd0657d1d8f31c8bde4e81bb8483253d4e7ce11326209cd32389000ccd59c4dcf89a8079ccbe6b9f60933b628b4e17a0375e1e984cffc8fa60591149e67e30ff38f18ed2c8204deb50def9ed8f2b4fddd2d", 0x99}, {&(0x7f0000000740)="25cb9d82a9fbf25f1e5ff900826b8e713d38391b67b95ed6319a8c6673f54ee7c150723ae45c143aaed1c45d5eb8705e40824a12f1f21d70e858c8df3d0ea50e144d2b0d253d27158c", 0x49}, {0x0}, {&(0x7f0000000100)}], 0x7, &(0x7f0000001a00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88, 0x20004000}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b80)="fe0d055feae2c30df1ff49458c79c0636ceef795d4c10966f7cab77ff7603f3593ce7c1fdd7af45c676ca4818cf999c6ea97e2124911a6d7ff114492bf3ccd484357c59878a9becc4008ae1c661f72c31bea1aa9674b", 0x56}, {&(0x7f0000001c00)="ea95d4", 0x3}], 0x2, 0x0, 0x0, 0x10}}], 0x2, 0x8010) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_CLR_FD(r2, 0x4c01) 13:58:42 executing program 1: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:42 executing program 2: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:42 executing program 4: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:42 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg1\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) 13:58:42 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x1}], {0x95, 0x2}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:58:42 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg1\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) 13:58:42 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x1}], {0x95, 0x2}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 830.695326][ T25] audit: type=1400 audit(1683208722.265:154935): avc: denied { ioctl } for pid=21427 comm="syz-executor.0" path="socket:[61693]" dev="sockfs" ino=61693 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 13:58:42 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg1\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) 13:58:42 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x1}], {0x95, 0x2}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:58:42 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg1\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) 13:58:42 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x1}], {0x95, 0x2}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:58:43 executing program 4: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:43 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg1\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) 13:58:43 executing program 3: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x1fe}}, 0x0) setitimer(0x0, &(0x7f0000000100)={{}, {0x7ff}}, 0x0) 13:58:43 executing program 1: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:43 executing program 2: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:43 executing program 5: renameat(0xffffffffffffff9c, &(0x7f0000001340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') 13:58:43 executing program 3: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x1fe}}, 0x0) setitimer(0x0, &(0x7f0000000100)={{}, {0x7ff}}, 0x0) 13:58:43 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg1\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) 13:58:43 executing program 5: renameat(0xffffffffffffff9c, &(0x7f0000001340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') 13:58:43 executing program 3: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x1fe}}, 0x0) setitimer(0x0, &(0x7f0000000100)={{}, {0x7ff}}, 0x0) 13:58:43 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg1\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) 13:58:43 executing program 5: renameat(0xffffffffffffff9c, &(0x7f0000001340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') 13:58:43 executing program 4: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:43 executing program 3: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x1fe}}, 0x0) setitimer(0x0, &(0x7f0000000100)={{}, {0x7ff}}, 0x0) 13:58:43 executing program 0: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x1fe}}, 0x0) setitimer(0x0, &(0x7f0000000100)={{}, {0x7ff}}, 0x0) 13:58:43 executing program 1: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:43 executing program 5: renameat(0xffffffffffffff9c, &(0x7f0000001340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') 13:58:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x0, 0xfffffffe}, {0x25}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 13:58:43 executing program 0: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x1fe}}, 0x0) setitimer(0x0, &(0x7f0000000100)={{}, {0x7ff}}, 0x0) 13:58:43 executing program 2: set_mempolicy(0x3, &(0x7f00000004c0)=0x15e1, 0x7fff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 13:58:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x0, 0xfffffffe}, {0x25}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 13:58:43 executing program 0: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x1fe}}, 0x0) setitimer(0x0, &(0x7f0000000100)={{}, {0x7ff}}, 0x0) 13:58:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x0, 0xfffffffe}, {0x25}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 13:58:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_cache\x00') lseek(r0, 0x4bcf, 0x0) 13:58:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x0, 0xfffffffe}, {0x25}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 13:58:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x0, 0xfffffffe}, {0x25}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 13:58:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_cache\x00') lseek(r0, 0x4bcf, 0x0) 13:58:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x0, 0xfffffffe}, {0x25}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 13:58:43 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x40305839, 0x0) 13:58:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_cache\x00') lseek(r0, 0x4bcf, 0x0) 13:58:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x0, 0xfffffffe}, {0x25}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 13:58:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f780000000c0a01020000000000000000010000000900020073797a32000000004c000380480000800800034000004511a3710b80200001800e000100636f6e6e6c696d69740000000c00028008000140000000001800018005000100636f6e6e6c696d6974000000040002800900010073797a30"], 0xfc}}, 0x0) 13:58:43 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaf9231f098aa86dd604dfe8000000000000000000000000000aaff020000000c000000000000000000010000000000000000010165"], 0x0) 13:58:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_cache\x00') lseek(r0, 0x4bcf, 0x0) 13:58:43 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x40305839, 0x0) 13:58:43 executing program 5: r0 = memfd_secret(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x40305839, 0x0) 13:58:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}}, 0x0) 13:58:43 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv6_newnexthop={0x1c, 0x5e, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x4}, [@NHA_OIF={0x8}]}, 0x20}}, 0x0) [ 832.211255][T21502] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 13:58:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x37, &(0x7f0000000140), &(0x7f0000001a80)=0xc) 13:58:43 executing program 5: r0 = memfd_secret(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x40305839, 0x0) 13:58:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f780000000c0a01020000000000000000010000000900020073797a32000000004c000380480000800800034000004511a3710b80200001800e000100636f6e6e6c696d69740000000c00028008000140000000001800018005000100636f6e6e6c696d6974000000040002800900010073797a30"], 0xfc}}, 0x0) 13:58:43 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x40305839, 0x0) 13:58:43 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv6_newnexthop={0x1c, 0x5e, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x4}, [@NHA_OIF={0x8}]}, 0x20}}, 0x0) 13:58:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}}, 0x0) 13:58:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x37, &(0x7f0000000140), &(0x7f0000001a80)=0xc) 13:58:43 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x40305839, 0x0) 13:58:43 executing program 5: r0 = memfd_secret(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x40305839, 0x0) 13:58:43 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv6_newnexthop={0x1c, 0x5e, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x4}, [@NHA_OIF={0x8}]}, 0x20}}, 0x0) 13:58:43 executing program 5: set_mempolicy(0x2, &(0x7f0000000000)=0x80000001, 0x8) r0 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 13:58:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}}, 0x0) [ 832.327164][T21528] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 13:58:43 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv6_newnexthop={0x1c, 0x5e, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x4}, [@NHA_OIF={0x8}]}, 0x20}}, 0x0) 13:58:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x35}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)='E', 0x4}], 0x1) 13:58:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f780000000c0a01020000000000000000010000000900020073797a32000000004c000380480000800800034000004511a3710b80200001800e000100636f6e6e6c696d69740000000c00028008000140000000001800018005000100636f6e6e6c696d6974000000040002800900010073797a30"], 0xfc}}, 0x0) 13:58:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x37, &(0x7f0000000140), &(0x7f0000001a80)=0xc) 13:58:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}}, 0x0) 13:58:44 executing program 5: set_mempolicy(0x2, &(0x7f0000000000)=0x80000001, 0x8) r0 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 13:58:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x35}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)='E', 0x4}], 0x1) 13:58:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x37, &(0x7f0000000140), &(0x7f0000001a80)=0xc) 13:58:44 executing program 1: set_mempolicy(0x2, &(0x7f0000000000)=0x80000001, 0x8) r0 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 13:58:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x890d, 0x0) 13:58:44 executing program 5: set_mempolicy(0x2, &(0x7f0000000000)=0x80000001, 0x8) r0 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 13:58:44 executing program 1: set_mempolicy(0x2, &(0x7f0000000000)=0x80000001, 0x8) r0 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 13:58:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x35}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)='E', 0x4}], 0x1) [ 832.457744][T21553] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 13:58:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000007c80)={0x0, 0x0, &(0x7f0000007880)=[{&(0x7f0000000100)={0x10}, 0x10}], 0x1, &(0x7f0000007bc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee00}}}], 0x20}, 0x0) 13:58:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f780000000c0a01020000000000000000010000000900020073797a32000000004c000380480000800800034000004511a3710b80200001800e000100636f6e6e6c696d69740000000c00028008000140000000001800018005000100636f6e6e6c696d6974000000040002800900010073797a30"], 0xfc}}, 0x0) 13:58:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x890d, 0x0) 13:58:44 executing program 5: set_mempolicy(0x2, &(0x7f0000000000)=0x80000001, 0x8) r0 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 13:58:44 executing program 1: set_mempolicy(0x2, &(0x7f0000000000)=0x80000001, 0x8) r0 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 13:58:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x35}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)='E', 0x4}], 0x1) 13:58:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000007c80)={0x0, 0x0, &(0x7f0000007880)=[{&(0x7f0000000100)={0x10}, 0x10}], 0x1, &(0x7f0000007bc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee00}}}], 0x20}, 0x0) 13:58:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x890d, 0x0) 13:58:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000100)={'vlan0\x00', @ifru_data=0x0}) 13:58:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x104, 0x4, 0x3e8, 0x30a, 0x200, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'erspan0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x2, 0x4}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x2}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x2}}}], {{'\x00', 0xc0, 0xe8}, {0x24}}}}, 0x213) [ 832.582670][T21578] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 13:58:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001140)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x16}]}, @NFT_MSG_NEWSETELEM={0x54, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPR={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 13:58:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x890d, 0x0) 13:58:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000007c80)={0x0, 0x0, &(0x7f0000007880)=[{&(0x7f0000000100)={0x10}, 0x10}], 0x1, &(0x7f0000007bc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee00}}}], 0x20}, 0x0) 13:58:44 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000000)={@local, @random="25e347f37693", @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private=0xa010121, {[@noop, @ssrr={0x89, 0x3, 0x90}]}}}}}}, 0x0) 13:58:44 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 13:58:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x104, 0x4, 0x3e8, 0x30a, 0x200, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'erspan0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x2, 0x4}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x2}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x2}}}], {{'\x00', 0xc0, 0xe8}, {0x24}}}}, 0x213) 13:58:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000007c80)={0x0, 0x0, &(0x7f0000007880)=[{&(0x7f0000000100)={0x10}, 0x10}], 0x1, &(0x7f0000007bc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee00}}}], 0x20}, 0x0) 13:58:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001140)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x16}]}, @NFT_MSG_NEWSETELEM={0x54, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPR={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 13:58:44 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 13:58:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000100)={'vlan0\x00', @ifru_data=0x0}) 13:58:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '4\xe1\xe6\x95G9\xad\x1fK\xc7\xb92x\f\x906\xc1\x83\xd6\xc5\x8d}\x13pA\xcb|\x83\xb6\x95\x86\xcf\xc2\xa7#\x13\xb8\x9b\\\xd4\xac\xa8\xa8N\x03B3\xf3\xa8&\x19w\a\xd7!\x96Q\xe0\x88\x18\x04\x96DA\x17\x1f,\x12S\x0e\x83(%\x9b3m\xb6a\xeb\x88V.\x8aD\xf0U\x90\xa1i1\x12\xe3\xcb\"i\xe4!y\x8c\x14\x1a.\x06\x12!%\x02\xcf\xd1Z\xf3KI\x14\xd7\x95\xb1Q\xaey\xf3\xcf\xc5\xbb\x90\x82\xf7\xd2\xe0\x00A\tB\xb8F\xec\x92[\x91\x1b\x19[>\b\xf4\xb5\x01\xf5\rA\xd4\xee\xaf\v>\x0fX\x83\r\xf2\xd7\x8eN\xdf\xb5\xe5G\xa9;\xa03\xc8;\nU\xb0\x9d\v\xfe\xd8}\xa4\x82\xd9\xf3z\x94H\xee\x99\x8cw{5k\a\xef\x8b\x87\xab\xf9\xdd\xb5\x83\xaa\x9f\x86\xbc^\xaa\x9dN\xa0\xad\xd6\xac\xd8U~iC\xef\xed\xbe$Ki\x1bb\x0e\xca\xeb\x01\f$\x9c8\xd5\xc4\xe4>\xf7\xefi\x91\x92\x0f\f\x96[\xbe\xa9\x8al\xefe\v\xeb\xef\xda\f\x8at&=\xdc\xb5\xe7\x0fr\xcd'}]}, 0x11b) 13:58:44 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) 13:58:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x104, 0x4, 0x3e8, 0x30a, 0x200, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'erspan0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x2, 0x4}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x2}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x2}}}], {{'\x00', 0xc0, 0xe8}, {0x24}}}}, 0x213) 13:58:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '4\xe1\xe6\x95G9\xad\x1fK\xc7\xb92x\f\x906\xc1\x83\xd6\xc5\x8d}\x13pA\xcb|\x83\xb6\x95\x86\xcf\xc2\xa7#\x13\xb8\x9b\\\xd4\xac\xa8\xa8N\x03B3\xf3\xa8&\x19w\a\xd7!\x96Q\xe0\x88\x18\x04\x96DA\x17\x1f,\x12S\x0e\x83(%\x9b3m\xb6a\xeb\x88V.\x8aD\xf0U\x90\xa1i1\x12\xe3\xcb\"i\xe4!y\x8c\x14\x1a.\x06\x12!%\x02\xcf\xd1Z\xf3KI\x14\xd7\x95\xb1Q\xaey\xf3\xcf\xc5\xbb\x90\x82\xf7\xd2\xe0\x00A\tB\xb8F\xec\x92[\x91\x1b\x19[>\b\xf4\xb5\x01\xf5\rA\xd4\xee\xaf\v>\x0fX\x83\r\xf2\xd7\x8eN\xdf\xb5\xe5G\xa9;\xa03\xc8;\nU\xb0\x9d\v\xfe\xd8}\xa4\x82\xd9\xf3z\x94H\xee\x99\x8cw{5k\a\xef\x8b\x87\xab\xf9\xdd\xb5\x83\xaa\x9f\x86\xbc^\xaa\x9dN\xa0\xad\xd6\xac\xd8U~iC\xef\xed\xbe$Ki\x1bb\x0e\xca\xeb\x01\f$\x9c8\xd5\xc4\xe4>\xf7\xefi\x91\x92\x0f\f\x96[\xbe\xa9\x8al\xefe\v\xeb\xef\xda\f\x8at&=\xdc\xb5\xe7\x0fr\xcd'}]}, 0x11b) 13:58:44 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 13:58:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001140)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x16}]}, @NFT_MSG_NEWSETELEM={0x54, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPR={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 13:58:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x104, 0x4, 0x3e8, 0x30a, 0x200, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'erspan0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x2, 0x4}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x2}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x2}}}], {{'\x00', 0xc0, 0xe8}, {0x24}}}}, 0x213) 13:58:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000100)={'vlan0\x00', @ifru_data=0x0}) 13:58:44 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000300)='G', 0x7ffff000}], 0x1) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="ab", 0x1}], 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:58:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '4\xe1\xe6\x95G9\xad\x1fK\xc7\xb92x\f\x906\xc1\x83\xd6\xc5\x8d}\x13pA\xcb|\x83\xb6\x95\x86\xcf\xc2\xa7#\x13\xb8\x9b\\\xd4\xac\xa8\xa8N\x03B3\xf3\xa8&\x19w\a\xd7!\x96Q\xe0\x88\x18\x04\x96DA\x17\x1f,\x12S\x0e\x83(%\x9b3m\xb6a\xeb\x88V.\x8aD\xf0U\x90\xa1i1\x12\xe3\xcb\"i\xe4!y\x8c\x14\x1a.\x06\x12!%\x02\xcf\xd1Z\xf3KI\x14\xd7\x95\xb1Q\xaey\xf3\xcf\xc5\xbb\x90\x82\xf7\xd2\xe0\x00A\tB\xb8F\xec\x92[\x91\x1b\x19[>\b\xf4\xb5\x01\xf5\rA\xd4\xee\xaf\v>\x0fX\x83\r\xf2\xd7\x8eN\xdf\xb5\xe5G\xa9;\xa03\xc8;\nU\xb0\x9d\v\xfe\xd8}\xa4\x82\xd9\xf3z\x94H\xee\x99\x8cw{5k\a\xef\x8b\x87\xab\xf9\xdd\xb5\x83\xaa\x9f\x86\xbc^\xaa\x9dN\xa0\xad\xd6\xac\xd8U~iC\xef\xed\xbe$Ki\x1bb\x0e\xca\xeb\x01\f$\x9c8\xd5\xc4\xe4>\xf7\xefi\x91\x92\x0f\f\x96[\xbe\xa9\x8al\xefe\v\xeb\xef\xda\f\x8at&=\xdc\xb5\xe7\x0fr\xcd'}]}, 0x11b) 13:58:44 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 13:58:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001140)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x16}]}, @NFT_MSG_NEWSETELEM={0x54, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPR={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 13:58:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)={0x18, 0x52, 0x1, 0x0, 0x0, {0x1c}, [@nested={0x4, 0x1}]}, 0x18}}, 0x0) 13:58:44 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8942, &(0x7f0000000240)='lo:\x96o8\x14d\xa1\xe3\xd7\\\xa4\"\xe7\xca\xfe\xb0\xd4*!\xbb-b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8qX\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xf1\x0eV\xf9\x03\x18\xd1\xf1\x95\xf0\xd0\x13\xd2\xc8\xe3\xa6\xac~\xff\"\x95\xd6\x10\x16\xf4\xbc3\xe7\xc4\x1d\a\x96\xa6um2\xfc\xe0B\x10s\xf3E71%\x87RV\x1a\x89\xdc\v\x94\x8e,\xde\x1ba\xab\xfci\xe7w\x18\x00\x97:\xb5\x9d\x9b%R\x139\x96\xeb\"eL\"\x8f\xfe') 13:58:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000100)={'vlan0\x00', @ifru_data=0x0}) 13:58:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)={0x18, 0x52, 0x1, 0x0, 0x0, {0x1c}, [@nested={0x4, 0x1}]}, 0x18}}, 0x0) [ 832.869265][ T25] audit: type=1400 audit(1683208724.435:154936): avc: denied { read } for pid=21633 comm="syz-executor.0" path="socket:[62095]" dev="sockfs" ino=62095 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 13:58:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '4\xe1\xe6\x95G9\xad\x1fK\xc7\xb92x\f\x906\xc1\x83\xd6\xc5\x8d}\x13pA\xcb|\x83\xb6\x95\x86\xcf\xc2\xa7#\x13\xb8\x9b\\\xd4\xac\xa8\xa8N\x03B3\xf3\xa8&\x19w\a\xd7!\x96Q\xe0\x88\x18\x04\x96DA\x17\x1f,\x12S\x0e\x83(%\x9b3m\xb6a\xeb\x88V.\x8aD\xf0U\x90\xa1i1\x12\xe3\xcb\"i\xe4!y\x8c\x14\x1a.\x06\x12!%\x02\xcf\xd1Z\xf3KI\x14\xd7\x95\xb1Q\xaey\xf3\xcf\xc5\xbb\x90\x82\xf7\xd2\xe0\x00A\tB\xb8F\xec\x92[\x91\x1b\x19[>\b\xf4\xb5\x01\xf5\rA\xd4\xee\xaf\v>\x0fX\x83\r\xf2\xd7\x8eN\xdf\xb5\xe5G\xa9;\xa03\xc8;\nU\xb0\x9d\v\xfe\xd8}\xa4\x82\xd9\xf3z\x94H\xee\x99\x8cw{5k\a\xef\x8b\x87\xab\xf9\xdd\xb5\x83\xaa\x9f\x86\xbc^\xaa\x9dN\xa0\xad\xd6\xac\xd8U~iC\xef\xed\xbe$Ki\x1bb\x0e\xca\xeb\x01\f$\x9c8\xd5\xc4\xe4>\xf7\xefi\x91\x92\x0f\f\x96[\xbe\xa9\x8al\xefe\v\xeb\xef\xda\f\x8at&=\xdc\xb5\xe7\x0fr\xcd'}]}, 0x11b) 13:58:44 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010100000000000000000200fffc0900010073797a30000000000800024000000001cc000000030a01220000000000000000020000000900010073797a3000000000aa00030091abc12404cf8d"], 0x1e4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x7fff, 0x0) 13:58:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)={0x18, 0x52, 0x1, 0x0, 0x0, {0x1c}, [@nested={0x4, 0x1}]}, 0x18}}, 0x0) 13:58:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x1e, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x9c) 13:58:45 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000300)='G', 0x7ffff000}], 0x1) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="ab", 0x1}], 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:58:45 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8942, &(0x7f0000000240)='lo:\x96o8\x14d\xa1\xe3\xd7\\\xa4\"\xe7\xca\xfe\xb0\xd4*!\xbb-b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8qX\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xf1\x0eV\xf9\x03\x18\xd1\xf1\x95\xf0\xd0\x13\xd2\xc8\xe3\xa6\xac~\xff\"\x95\xd6\x10\x16\xf4\xbc3\xe7\xc4\x1d\a\x96\xa6um2\xfc\xe0B\x10s\xf3E71%\x87RV\x1a\x89\xdc\v\x94\x8e,\xde\x1ba\xab\xfci\xe7w\x18\x00\x97:\xb5\x9d\x9b%R\x139\x96\xeb\"eL\"\x8f\xfe') 13:58:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0x3a, 0x4, 0x338, 0xffffffff, 0x1a8, 0x0, 0x1a8, 0x110, 0xffffffff, 0x110, 0x2a0, 0x2a0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@set={{0x40}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}, {{@ip={@empty, @private, 0x0, 0x0, 'vlan0\x00', 'vlan0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) 13:58:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x1e, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x9c) 13:58:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)={0x18, 0x52, 0x1, 0x0, 0x0, {0x1c}, [@nested={0x4, 0x1}]}, 0x18}}, 0x0) 13:58:45 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010100000000000000000200fffc0900010073797a30000000000800024000000001cc000000030a01220000000000000000020000000900010073797a3000000000aa00030091abc12404cf8d"], 0x1e4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x7fff, 0x0) 13:58:45 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000300)='G', 0x7ffff000}], 0x1) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="ab", 0x1}], 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:58:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x1e, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x9c) 13:58:45 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8942, &(0x7f0000000240)='lo:\x96o8\x14d\xa1\xe3\xd7\\\xa4\"\xe7\xca\xfe\xb0\xd4*!\xbb-b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8qX\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xf1\x0eV\xf9\x03\x18\xd1\xf1\x95\xf0\xd0\x13\xd2\xc8\xe3\xa6\xac~\xff\"\x95\xd6\x10\x16\xf4\xbc3\xe7\xc4\x1d\a\x96\xa6um2\xfc\xe0B\x10s\xf3E71%\x87RV\x1a\x89\xdc\v\x94\x8e,\xde\x1ba\xab\xfci\xe7w\x18\x00\x97:\xb5\x9d\x9b%R\x139\x96\xeb\"eL\"\x8f\xfe') 13:58:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0x3a, 0x4, 0x338, 0xffffffff, 0x1a8, 0x0, 0x1a8, 0x110, 0xffffffff, 0x110, 0x2a0, 0x2a0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@set={{0x40}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}, {{@ip={@empty, @private, 0x0, 0x0, 'vlan0\x00', 'vlan0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) 13:58:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x1e, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x9c) [ 833.868889][T21673] x_tables: duplicate entry at hook 3 13:58:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0x3a, 0x4, 0x338, 0xffffffff, 0x1a8, 0x0, 0x1a8, 0x110, 0xffffffff, 0x110, 0x2a0, 0x2a0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@set={{0x40}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}, {{@ip={@empty, @private, 0x0, 0x0, 'vlan0\x00', 'vlan0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) [ 833.930346][T21689] x_tables: duplicate entry at hook 3 [ 833.971824][T21695] x_tables: duplicate entry at hook 3 13:58:46 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000300)='G', 0x7ffff000}], 0x1) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="ab", 0x1}], 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:58:46 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000300)='G', 0x7ffff000}], 0x1) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="ab", 0x1}], 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:58:46 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8942, &(0x7f0000000240)='lo:\x96o8\x14d\xa1\xe3\xd7\\\xa4\"\xe7\xca\xfe\xb0\xd4*!\xbb-b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8qX\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xf1\x0eV\xf9\x03\x18\xd1\xf1\x95\xf0\xd0\x13\xd2\xc8\xe3\xa6\xac~\xff\"\x95\xd6\x10\x16\xf4\xbc3\xe7\xc4\x1d\a\x96\xa6um2\xfc\xe0B\x10s\xf3E71%\x87RV\x1a\x89\xdc\v\x94\x8e,\xde\x1ba\xab\xfci\xe7w\x18\x00\x97:\xb5\x9d\x9b%R\x139\x96\xeb\"eL\"\x8f\xfe') 13:58:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0x3a, 0x4, 0x338, 0xffffffff, 0x1a8, 0x0, 0x1a8, 0x110, 0xffffffff, 0x110, 0x2a0, 0x2a0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@set={{0x40}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}, {{@ip={@empty, @private, 0x0, 0x0, 'vlan0\x00', 'vlan0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) 13:58:46 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010100000000000000000200fffc0900010073797a30000000000800024000000001cc000000030a01220000000000000000020000000900010073797a3000000000aa00030091abc12404cf8d"], 0x1e4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x7fff, 0x0) 13:58:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x1e, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x9c) 13:58:46 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000300)='G', 0x7ffff000}], 0x1) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="ab", 0x1}], 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:58:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x1e, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x9c) 13:58:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x1c, 0x35, 0x9, 0x0, 0x0, {0x1}, [@typed={0x4}, @nested={0x4, 0x1}]}, 0x1c}}, 0x0) [ 834.907654][T21705] x_tables: duplicate entry at hook 3 13:58:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x1e, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x9c) 13:58:46 executing program 5: r0 = io_uring_setup(0x76a7, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040)=[r1, r1], 0x2) 13:58:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x1c, 0x35, 0x9, 0x0, 0x0, {0x1}, [@typed={0x4}, @nested={0x4, 0x1}]}, 0x1c}}, 0x0) [ 834.977992][T21720] openvswitch: netlink: Flow actions attr not present in new flow. [ 835.006261][T21728] openvswitch: netlink: Flow actions attr not present in new flow. 13:58:48 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000300)='G', 0x7ffff000}], 0x1) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="ab", 0x1}], 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:58:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x1c, 0x35, 0x9, 0x0, 0x0, {0x1}, [@typed={0x4}, @nested={0x4, 0x1}]}, 0x1c}}, 0x0) 13:58:48 executing program 5: r0 = io_uring_setup(0x76a7, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040)=[r1, r1], 0x2) 13:58:48 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010100000000000000000200fffc0900010073797a30000000000800024000000001cc000000030a01220000000000000000020000000900010073797a3000000000aa00030091abc12404cf8d"], 0x1e4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x7fff, 0x0) 13:58:48 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000300)='G', 0x7ffff000}], 0x1) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="ab", 0x1}], 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:58:48 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000300)='G', 0x7ffff000}], 0x1) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="ab", 0x1}], 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:58:48 executing program 5: r0 = io_uring_setup(0x76a7, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040)=[r1, r1], 0x2) 13:58:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x1c, 0x35, 0x9, 0x0, 0x0, {0x1}, [@typed={0x4}, @nested={0x4, 0x1}]}, 0x1c}}, 0x0) 13:58:48 executing program 5: r0 = io_uring_setup(0x76a7, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040)=[r1, r1], 0x2) 13:58:48 executing program 2: r0 = io_uring_setup(0x76a7, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040)=[r1, r1], 0x2) 13:58:48 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x0, 0x0, 0x400000, 0x0, 0x1}, 0x48) 13:58:48 executing program 2: r0 = io_uring_setup(0x76a7, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040)=[r1, r1], 0x2) [ 836.940902][T21745] openvswitch: netlink: Flow actions attr not present in new flow. [ 836.967387][T21750] openvswitch: netlink: Flow actions attr not present in new flow. 13:58:51 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000300)='G', 0x7ffff000}], 0x1) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="ab", 0x1}], 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:58:51 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x0, 0x0, 0x400000, 0x0, 0x1}, 0x48) 13:58:51 executing program 2: r0 = io_uring_setup(0x76a7, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040)=[r1, r1], 0x2) 13:58:51 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x0, 0x0, 0x400000, 0x0, 0x1}, 0x48) 13:58:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000cc0), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) 13:58:51 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = io_uring_setup(0x67bb, &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0xf, &(0x7f0000000000), 0x18) 13:58:51 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x0, 0x0, 0x400000, 0x0, 0x1}, 0x48) 13:58:51 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x0, 0x0, 0x400000, 0x0, 0x1}, 0x48) 13:58:51 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1, 0x0, &(0x7f0000000040)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000023c0)={0x9}, 0x0, 0x0, 0x0, 0x0) 13:58:51 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = io_uring_setup(0x67bb, &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0xf, &(0x7f0000000000), 0x18) 13:58:51 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x0, 0x0, 0x400000, 0x0, 0x1}, 0x48) 13:58:51 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x0, 0x0, 0x400000, 0x0, 0x1}, 0x48) [ 839.985490][ T25] audit: type=1400 audit(1683208731.555:154937): avc: denied { mount } for pid=21792 comm="syz-executor.4" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 840.036611][ T25] audit: type=1400 audit(1683208731.595:154938): avc: denied { unmount } for pid=3443 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 13:58:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x8, 0x0, 0x0, 0x0, 0x0, 0xfff, 0xd00}) 13:58:52 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1, 0x0, &(0x7f0000000040)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000023c0)={0x9}, 0x0, 0x0, 0x0, 0x0) 13:58:52 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = io_uring_setup(0x67bb, &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0xf, &(0x7f0000000000), 0x18) 13:58:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000cc0), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) 13:58:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000cc0), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) 13:58:52 executing program 3: r0 = socket$phonet(0x23, 0x2, 0x1) sendto$phonet(r0, &(0x7f0000000000)="83", 0x1, 0x40, &(0x7f0000000040), 0x10) 13:58:52 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = io_uring_setup(0x67bb, &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0xf, &(0x7f0000000000), 0x18) 13:58:52 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1, 0x0, &(0x7f0000000040)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000023c0)={0x9}, 0x0, 0x0, 0x0, 0x0) [ 841.246027][T21810] EXT4-fs warning (device sda1): verify_group_input:172: Reserved blocks too high (4095) 13:58:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="85000000110000003500000000000000c50000002a0000009500000000000000f4670880271efa95b2c8c037c5a142c9a8d76287066c51adde96fcc309926fa397fabd5f9810e81ae0b7371268c04de89e5d7713e99211c7e1d7b2486ea6f7be39cd34d5ae35de18dd090000005c79949c00a7c09cc28d7673294f42a5f0a8320e13fecd45c0f8612c10b10000efffb0d3712c7e93363af3c075ff1e23166a32d95433bb755a2d1b0fb2d451e1cc4c45d576090c4867cab62a7e73a0c14e97dc30fd4b393e366c6386d5ec7209d031f40f3012e9576e51a7f578602f07785b92e544fc46c744ae6af3e4195c8037102124d85cec074c6949e1298901ebb39522f6649dd76d06ab800f4104dbaba46aa43a815a1e5c6d1d224b64be6c4d7f47ef21eb7e46f9aa4a9779f8555eaea768c1f2c221c410ef4b253d110ee282ab7894de93d928cf95846be6277c04b48556c870814ec532b66a696a623cd8a4f8dc8dcba00b1b2d2747c45b0c52087b5efabf8496b9a951667d510ba0e3c4c00356ffeb4839bebee58289e8b9f505346c73fb19a34268335648e1f844ce328c10752a42dca52fb98c1452b6518a6ef7297f7b3d0cd46dafc6ac5500f53e5309ec91d83cf4fbd775d9c07d8d591a4d8c60ff000000b78863e629b3b2000000000000000000000000000d3174c87e080000003126af7a8b20744ea9875b9cba735b9594aa904e5a4bb2c3dfa80564e3e7000860000000004a2147c1128c697d9966b3c9f0e9e203911a3fac929a4fc6e625247510bc24c60ad88d3442a5d143c3047dd18e56a1b9764270c6ab800451b95e22f30a85f5681ca30000000000041752e2fcf95c1ced98fdc4f4bf2157b261380307d943b34c489734d55c4e15bbda5f5e31371c5330d920b71fbaaabd572e73201b47f2c7e5e69a798f3c14f969fab1005e8ccedd9c46c3e39f949dd4c87ae724ef73e2abdb4485027139e9c45f77e8dd3af90248ede241b408a320e069f6becd0b8405d24fa5000000000000004f3e1eb6406c871efa68c3e89783e207697e252c72f9ba02f0bf89829302dbec43ec3c758d3d01537ae9f180039e8d000000000000000000969fa9c5db54e78f8ce25d378101f34be6a0670a5a2a5830d6dc1aa2ba0e622f01a862ccce3bd759d96517d306e4728d1a31af1a5c920ee1bdd3054fa281e42bb11ba89fcac013b09294b1a19d340806c58bca9698a8ede7fef52690eee38a6151f09934e96120fbb5f0e7788f45f70d2353321b0923755aebd768c7611d74c73b37edcdef6df5b9934efe20eddff8be45ff6f8318ce0a97731eb0ed9c96a765801aa640d9719f54c6a1334385e5243ae851dc3342b5ac2f3382b8e1a09ef15c7bc66013b01c3746e16f3293f0d9b07afdb5cf60f0f5ae606c815a59b94d71685a2567fd5e05d477d16cf51493863d5d9fccb4c02495bb5904ee0ca3becdf9b9ea6a9e9158ca7d98dc557bf3511d658f86750c2f34c43de47b1ba602269f72a76ba7ded8c60233eddfc065894585a57d92d5314f20e9c0ce2a3f967901aafb2c51038568bd1f0ca93d7cf2780719ffbc60a477987514045397c888e444005bb5ba7887b3d3fa4be01046ca93945f6a7a48aadab6835f0e53604fd421ae5808f1ff22dbb073b91c118ea7475e707edc351c4f7f095f59994317ddaf5948b8b63ea655a87e9da0c1d2cf9ae7fc2bfd79037d20d3bdea31289167a7f7939e203d433b8e57dc4e2b0af8f9ee5fe89d"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000cc0), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) 13:58:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000cc0), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) 13:58:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x8, 0x0, 0x0, 0x0, 0x0, 0xfff, 0xd00}) 13:58:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 3: r0 = socket$phonet(0x23, 0x2, 0x1) sendto$phonet(r0, &(0x7f0000000000)="83", 0x1, 0x40, &(0x7f0000000040), 0x10) [ 841.430071][ T25] audit: type=1400 audit(1683208732.995:154939): avc: denied { write } for pid=21806 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 13:58:53 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1, 0x0, &(0x7f0000000040)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000023c0)={0x9}, 0x0, 0x0, 0x0, 0x0) 13:58:53 executing program 3: r0 = socket$phonet(0x23, 0x2, 0x1) sendto$phonet(r0, &(0x7f0000000000)="83", 0x1, 0x40, &(0x7f0000000040), 0x10) [ 841.504346][T21827] EXT4-fs warning (device sda1): verify_group_input:172: Reserved blocks too high (4095) 13:58:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="85000000110000003500000000000000c50000002a0000009500000000000000f4670880271efa95b2c8c037c5a142c9a8d76287066c51adde96fcc309926fa397fabd5f9810e81ae0b7371268c04de89e5d7713e99211c7e1d7b2486ea6f7be39cd34d5ae35de18dd090000005c79949c00a7c09cc28d7673294f42a5f0a8320e13fecd45c0f8612c10b10000efffb0d3712c7e93363af3c075ff1e23166a32d95433bb755a2d1b0fb2d451e1cc4c45d576090c4867cab62a7e73a0c14e97dc30fd4b393e366c6386d5ec7209d031f40f3012e9576e51a7f578602f07785b92e544fc46c744ae6af3e4195c8037102124d85cec074c6949e1298901ebb39522f6649dd76d06ab800f4104dbaba46aa43a815a1e5c6d1d224b64be6c4d7f47ef21eb7e46f9aa4a9779f8555eaea768c1f2c221c410ef4b253d110ee282ab7894de93d928cf95846be6277c04b48556c870814ec532b66a696a623cd8a4f8dc8dcba00b1b2d2747c45b0c52087b5efabf8496b9a951667d510ba0e3c4c00356ffeb4839bebee58289e8b9f505346c73fb19a34268335648e1f844ce328c10752a42dca52fb98c1452b6518a6ef7297f7b3d0cd46dafc6ac5500f53e5309ec91d83cf4fbd775d9c07d8d591a4d8c60ff000000b78863e629b3b2000000000000000000000000000d3174c87e080000003126af7a8b20744ea9875b9cba735b9594aa904e5a4bb2c3dfa80564e3e7000860000000004a2147c1128c697d9966b3c9f0e9e203911a3fac929a4fc6e625247510bc24c60ad88d3442a5d143c3047dd18e56a1b9764270c6ab800451b95e22f30a85f5681ca30000000000041752e2fcf95c1ced98fdc4f4bf2157b261380307d943b34c489734d55c4e15bbda5f5e31371c5330d920b71fbaaabd572e73201b47f2c7e5e69a798f3c14f969fab1005e8ccedd9c46c3e39f949dd4c87ae724ef73e2abdb4485027139e9c45f77e8dd3af90248ede241b408a320e069f6becd0b8405d24fa5000000000000004f3e1eb6406c871efa68c3e89783e207697e252c72f9ba02f0bf89829302dbec43ec3c758d3d01537ae9f180039e8d000000000000000000969fa9c5db54e78f8ce25d378101f34be6a0670a5a2a5830d6dc1aa2ba0e622f01a862ccce3bd759d96517d306e4728d1a31af1a5c920ee1bdd3054fa281e42bb11ba89fcac013b09294b1a19d340806c58bca9698a8ede7fef52690eee38a6151f09934e96120fbb5f0e7788f45f70d2353321b0923755aebd768c7611d74c73b37edcdef6df5b9934efe20eddff8be45ff6f8318ce0a97731eb0ed9c96a765801aa640d9719f54c6a1334385e5243ae851dc3342b5ac2f3382b8e1a09ef15c7bc66013b01c3746e16f3293f0d9b07afdb5cf60f0f5ae606c815a59b94d71685a2567fd5e05d477d16cf51493863d5d9fccb4c02495bb5904ee0ca3becdf9b9ea6a9e9158ca7d98dc557bf3511d658f86750c2f34c43de47b1ba602269f72a76ba7ded8c60233eddfc065894585a57d92d5314f20e9c0ce2a3f967901aafb2c51038568bd1f0ca93d7cf2780719ffbc60a477987514045397c888e444005bb5ba7887b3d3fa4be01046ca93945f6a7a48aadab6835f0e53604fd421ae5808f1ff22dbb073b91c118ea7475e707edc351c4f7f095f59994317ddaf5948b8b63ea655a87e9da0c1d2cf9ae7fc2bfd79037d20d3bdea31289167a7f7939e203d433b8e57dc4e2b0af8f9ee5fe89d"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000cc0), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) 13:58:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000cc0), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) 13:58:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x8, 0x0, 0x0, 0x0, 0x0, 0xfff, 0xd00}) 13:58:53 executing program 3: r0 = socket$phonet(0x23, 0x2, 0x1) sendto$phonet(r0, &(0x7f0000000000)="83", 0x1, 0x40, &(0x7f0000000040), 0x10) 13:58:53 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f00000004c0)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8}, {0x5, 0x2, [@TCA_RED_FLAGS={0xc}]}}]}, 0x3c}}, 0x0) [ 841.636034][T21840] EXT4-fs warning (device sda1): verify_group_input:172: Reserved blocks too high (4095) 13:58:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) [ 841.676224][T19484] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65380 sclass=netlink_xfrm_socket pid=19484 comm=kworker/1:16 13:58:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x8, 0x0, 0x0, 0x0, 0x0, 0xfff, 0xd00}) 13:58:53 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) [ 841.782893][T19484] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65380 sclass=netlink_xfrm_socket pid=19484 comm=kworker/1:16 [ 841.796443][T21855] EXT4-fs warning (device sda1): verify_group_input:172: Reserved blocks too high (4095) [ 841.803458][T11564] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65380 sclass=netlink_xfrm_socket pid=11564 comm=kworker/0:5 [ 841.819382][T21852] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 13:58:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f00000004c0)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8}, {0x5, 0x2, [@TCA_RED_FLAGS={0xc}]}}]}, 0x3c}}, 0x0) [ 841.841107][T21852] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. 13:58:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) [ 841.913746][T11564] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65380 sclass=netlink_xfrm_socket pid=11564 comm=kworker/0:5 [ 841.918110][T19484] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65380 sclass=netlink_xfrm_socket pid=19484 comm=kworker/1:16 [ 841.944617][T21868] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 841.954004][T21868] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. 13:58:53 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f00000004c0)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8}, {0x5, 0x2, [@TCA_RED_FLAGS={0xc}]}}]}, 0x3c}}, 0x0) [ 841.958430][T11564] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65380 sclass=netlink_xfrm_socket pid=11564 comm=kworker/0:5 [ 841.966988][T19484] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65380 sclass=netlink_xfrm_socket pid=19484 comm=kworker/1:16 [ 841.997264][T19484] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65380 sclass=netlink_xfrm_socket pid=19484 comm=kworker/1:16 13:58:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) [ 841.999539][T11564] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65380 sclass=netlink_xfrm_socket pid=11564 comm=kworker/0:5 13:58:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) [ 842.058114][T21874] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 842.079015][T21874] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. 13:58:53 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f00000004c0)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8}, {0x5, 0x2, [@TCA_RED_FLAGS={0xc}]}}]}, 0x3c}}, 0x0) 13:58:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) [ 842.098593][T11564] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65380 sclass=netlink_xfrm_socket pid=11564 comm=kworker/0:5 13:58:53 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 4: add_key$user(&(0x7f0000000000), 0x0, &(0x7f00000000c0)="e9", 0x1, 0xfffffffffffffffd) [ 842.146430][T21884] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 842.160690][T21884] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. 13:58:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000540)=""/188, 0x724) mount$bind(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x38400ac, 0x0) 13:58:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 3: set_mempolicy(0x2, &(0x7f0000000240)=0x87, 0x3) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0200000020"], 0x24, 0x0) [ 842.239367][ T25] audit: type=1400 audit(1683208733.805:154940): avc: denied { mount } for pid=21896 comm="syz-executor.4" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 13:58:53 executing program 3: set_mempolicy(0x2, &(0x7f0000000240)=0x87, 0x3) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0200000020"], 0x24, 0x0) 13:58:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000540)=""/188, 0x724) mount$bind(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x38400ac, 0x0) 13:58:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000540)=""/188, 0x724) mount$bind(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x38400ac, 0x0) [ 842.283136][ T25] audit: type=1400 audit(1683208733.845:154941): avc: denied { remount } for pid=21896 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 13:58:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x2000000, &(0x7f0000000140)={[{@norecovery}, {@sysvgroups}, {@user_xattr}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x1ff}}, {@resgid}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x200006}}, {@discard}, {@nodelalloc}]}, 0x12, 0x4b2, &(0x7f0000000540)="$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") open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 13:58:53 executing program 3: set_mempolicy(0x2, &(0x7f0000000240)=0x87, 0x3) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0200000020"], 0x24, 0x0) 13:58:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000540)=""/188, 0x724) mount$bind(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x38400ac, 0x0) 13:58:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000540)=""/188, 0x724) mount$bind(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x38400ac, 0x0) 13:58:54 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x1, 0x8f, &(0x7f00000003c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x21408, 0x0, 0x1, 0x0, &(0x7f0000006380)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x7, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xd}, {0xd, 0x1}]}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x3}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x10, 0xb}, @restrict={0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x2, 0x101}, {0x7, 0x5, 0x1}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x5f, 0x30]}}, &(0x7f00000005c0)=""/166, 0xb7, 0xa6}, 0x20) syz_open_procfs$userns(0x0, &(0x7f0000000100)) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='cachefiles_vfs_error\x00', r0}, 0x10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in6=@private2, 0x0, 0x32}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x2}}]}, 0x184}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty}, {@in=@multicast1, 0x0, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x65}, {}, {0x0, 0x6}, 0x0, 0x0, 0xa, 0x1, 0x84}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x40011}, 0x5) r8 = dup(r7) mount$9p_fd(0x2078f463, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[], [], 0x6b}}) 13:58:54 executing program 3: set_mempolicy(0x2, &(0x7f0000000240)=0x87, 0x3) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0200000020"], 0x24, 0x0) 13:58:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000540)=""/188, 0x724) mount$bind(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x38400ac, 0x0) 13:58:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000540)=""/188, 0x724) mount$bind(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x38400ac, 0x0) 13:58:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2) write$evdev(r0, &(0x7f000004d000)=[{}], 0xfffffe82) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 13:58:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) name_to_handle_at(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@xfs={0x1c}, &(0x7f0000000240), 0x0) [ 842.393610][T21911] loop2: detected capacity change from 0 to 512 [ 842.407741][ T25] audit: type=1400 audit(1683208733.875:154942): avc: denied { unmount } for pid=3443 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 13:58:54 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB], 0x20000600}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ff", @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='\f\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x9a\xd5>oJ\x02u\x9b\x94a\xac\xfe6A', 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) [ 842.503928][T21911] EXT4-fs error (device loop2): mb_free_blocks:1790: group 0, inode 16: block 39:freeing already freed block (bit 39); block bitmap corrupt. [ 842.505357][ T25] audit: type=1326 audit(1683208734.065:154943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21930 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0ad399b169 code=0x7ffc0000 [ 842.542582][ T25] audit: type=1326 audit(1683208734.065:154944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21930 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0ad399b169 code=0x7ffc0000 [ 842.542947][T21911] Quota error (device loop2): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 842.566832][ T25] audit: type=1326 audit(1683208734.065:154945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21930 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0ad399b169 code=0x7ffc0000 13:58:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) name_to_handle_at(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@xfs={0x1c}, &(0x7f0000000240), 0x0) [ 842.601740][T21911] EXT4-fs (loop2): 1 orphan inode deleted [ 842.607706][T21911] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 842.638493][T21911] ext4 filesystem being mounted at /root/syzkaller-testdir463753530/syzkaller.232Ln0/712/file1 supports timestamps until 2038-01-19 (0x7fffffff) 13:58:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x2000000, &(0x7f0000000140)={[{@norecovery}, {@sysvgroups}, {@user_xattr}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x1ff}}, {@resgid}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x200006}}, {@discard}, {@nodelalloc}]}, 0x12, 0x4b2, &(0x7f0000000540)="$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") open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 13:58:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) name_to_handle_at(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@xfs={0x1c}, &(0x7f0000000240), 0x0) 13:58:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) name_to_handle_at(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@xfs={0x1c}, &(0x7f0000000240), 0x0) 13:58:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) name_to_handle_at(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@xfs={0x1c}, &(0x7f0000000240), 0x0) 13:58:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000180000003d030100000000009500f000000000006926000000000000bf67000000000000560602000fff07006706000020000000170200000ee601e1bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad35010000000000840400000000000014000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800ea6553f304000000815dcf00c3eebc52267b042d19"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:58:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000180000003d030100000000009500f000000000006926000000000000bf67000000000000560602000fff07006706000020000000170200000ee601e1bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad35010000000000840400000000000014000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800ea6553f304000000815dcf00c3eebc52267b042d19"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:58:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) name_to_handle_at(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@xfs={0x1c}, &(0x7f0000000240), 0x0) [ 842.677439][T21911] EXT4-fs error (device loop2): ext4_lookup:1832: inode #2: comm syz-executor.2: 'file0' linked to parent dir [ 842.701174][ T3437] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:58:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) name_to_handle_at(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@xfs={0x1c}, &(0x7f0000000240), 0x0) [ 842.748623][T21962] loop2: detected capacity change from 0 to 512 [ 842.809230][T21962] EXT4-fs error (device loop2): mb_free_blocks:1790: group 0, inode 16: block 39:freeing already freed block (bit 39); block bitmap corrupt. [ 842.830145][T21962] EXT4-fs (loop2): 1 orphan inode deleted [ 842.836020][T21962] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 842.848398][T21962] ext4 filesystem being mounted at /root/syzkaller-testdir463753530/syzkaller.232Ln0/713/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 842.873754][T21962] EXT4-fs error (device loop2): ext4_lookup:1832: inode #2: comm syz-executor.2: 'file0' linked to parent dir [ 842.897068][ T3437] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:58:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000003d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 13:58:55 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) name_to_handle_at(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@xfs={0x1c}, &(0x7f0000000240), 0x0) 13:58:55 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) name_to_handle_at(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@xfs={0x1c}, &(0x7f0000000240), 0x0) 13:58:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000180000003d030100000000009500f000000000006926000000000000bf67000000000000560602000fff07006706000020000000170200000ee601e1bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad35010000000000840400000000000014000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800ea6553f304000000815dcf00c3eebc52267b042d19"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:58:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x2000000, &(0x7f0000000140)={[{@norecovery}, {@sysvgroups}, {@user_xattr}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x1ff}}, {@resgid}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x200006}}, {@discard}, {@nodelalloc}]}, 0x12, 0x4b2, &(0x7f0000000540)="$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") open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 13:58:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x2000000, &(0x7f0000000140)={[{@norecovery}, {@sysvgroups}, {@user_xattr}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x1ff}}, {@resgid}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x200006}}, {@discard}, {@nodelalloc}]}, 0x12, 0x4b2, &(0x7f0000000540)="$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") open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 13:58:55 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) name_to_handle_at(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@xfs={0x1c}, &(0x7f0000000240), 0x0) 13:58:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000180000003d030100000000009500f000000000006926000000000000bf67000000000000560602000fff07006706000020000000170200000ee601e1bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad35010000000000840400000000000014000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800ea6553f304000000815dcf00c3eebc52267b042d19"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:58:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x11, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 13:58:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x11, 0x0, 0x0, [{}]}]}}, &(0x7f0000000140)=""/177, 0x32, 0xb1, 0x1}, 0x20) [ 843.594394][T22063] loop2: detected capacity change from 0 to 512 [ 843.603208][T22068] loop3: detected capacity change from 0 to 512 13:58:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001940), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001980)={'syzkaller0\x00', 0x1}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000580)) 13:58:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x11, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) [ 843.650302][T22063] EXT4-fs error (device loop2): mb_free_blocks:1790: group 0, inode 16: block 39:freeing already freed block (bit 39); block bitmap corrupt. [ 843.680636][T22063] EXT4-fs (loop2): 1 orphan inode deleted [ 843.686465][T22063] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 843.699015][T22063] ext4 filesystem being mounted at /root/syzkaller-testdir463753530/syzkaller.232Ln0/714/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 843.718663][T22063] EXT4-fs error (device loop2): ext4_lookup:1832: inode #2: comm syz-executor.2: 'file0' linked to parent dir [ 843.726342][T22068] EXT4-fs error (device loop3): mb_free_blocks:1790: group 0, inode 16: block 39:freeing already freed block (bit 39); block bitmap corrupt. [ 843.746353][T22068] EXT4-fs (loop3): 1 orphan inode deleted [ 843.752177][T22068] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 843.764479][T22068] ext4 filesystem being mounted at /root/syzkaller-testdir2873134436/syzkaller.L2VnsO/816/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 843.769027][ T3437] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 843.794112][T22068] EXT4-fs error (device loop3): ext4_lookup:1832: inode #2: comm syz-executor.3: 'file0' linked to parent dir [ 843.811727][ T3448] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:58:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000003d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 13:58:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x11, 0x0, 0x0, [{}]}]}}, &(0x7f0000000140)=""/177, 0x32, 0xb1, 0x1}, 0x20) 13:58:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x11, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 13:58:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x2000000, &(0x7f0000000140)={[{@norecovery}, {@sysvgroups}, {@user_xattr}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x1ff}}, {@resgid}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x200006}}, {@discard}, {@nodelalloc}]}, 0x12, 0x4b2, &(0x7f0000000540)="$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") open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 13:58:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x2000000, &(0x7f0000000140)={[{@norecovery}, {@sysvgroups}, {@user_xattr}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x1ff}}, {@resgid}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x200006}}, {@discard}, {@nodelalloc}]}, 0x12, 0x4b2, &(0x7f0000000540)="$eJzs3d9rXFkdAPDvvcnU/khNqj7UgrXYSlK0M0lj2+BDrSD6VFDre4zJJIRMMiEzaZtQJMU/QBBRwSeffBH8AwTpnyBCQd+X3WWXZbfdfdiH3Z1lZu502+xMk9JJLkw+Hzi959w7M9/vaZgzc+49zA3gyLoQEbciYigiLkfEaLY/zcpss7HTftzTJw/mmyWJRuPO+0kk2b7OayXZ9lT7KXE8In75s4jfJF+OW9vaXpmrVMobWbtUX10v1ba2ryyvzi2Vl8pr09NT12duzFybmexLP8ci4uZP3v7T7//+05v//v69N2bfnfhtM62R7Pjz/eindtcLrf+LjuGI2DiIYDkYyvpTyDsRAAD2ZSIivhYR32l9/x+Noda3OQAAAGCQNH40Ep8kEQ0AAABgYKWtNbBJWszW+45EmhaL7TW834iTaaVaq39vsbq5ttA+PhaFdHG5Up7M1gqPRSFptqeyNbad9tVd7emIOBMRfxw90WoX56uVhbxPfgAAAMARcWrX/P+j0fb8HwAAABgwY3knAAAAABw4838AAAAYfOb/AAAAMNB+fvt2szQ6979euLu1uVK9e2WhXFsprm7OF+erG+vFpWp1qfWbfat7vV6lWl3/Qaxt3i/Vy7V6qba1Pbta3Vyrzy6/cAtsAAAA4BCd+faj/ycRsfPDE63SdCzvpIBDkb7Kg986uDyAwzeUdwJAbobzTgDITSHvBIDcJXsc77l45z/9zwUAADgY49/sff3fuQEYbK90/R8AGAiu/8PRVbACEI68r+5x/PWv/zcar5QQAADQdyOtkqTF7FrgSKRpsRhxunVbgEKyuFwpT2bzg/+NFr7SbE+1npnsuWYYAAAAAAAAAAAAAAAAAAAAAAAAAGhrNJJoAAAAAAMtIn0naf2af8T46KWR3ecHjiUfj7a2EXHvr3f+fH+uXt+Yau7/4Nn++l+y/VfzOIMBAAAA7NaZp3fm8QAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQT0+fPJjvlMOM+96PI2KsW/zhON7aHo9CRJz8MInh556XRMRQH+LvPIyIs93iJ820YizLolv8EznGTyPiVB/iw1H2qDn+3Or2/kvjQmvb/f03nJXX1Xv8S5+Nf0M9xp/T+4xx7vE/Sz3jP4w4N9x9/OnET3rEv7jP+L/+1fZ2r2ONv0WMd/38SV6IVaqvrpdqW9tXllfnlspL5bXp6anrMzdmrs1MlhaXK+Xs364x/vCtf332sv6f7BF/bI/+X9pn/z99fP/J19vVQrf4Exe7f/6e7RE/zT77vpvVm8fHO/Wddv155//x3/Mv6/9Cj/7v9fef2Gf/L//id2/u86EAwCGobW2vzFUq5Q0VFRWVZ5W8RyYAAKDfvvjSn3cmAAAAAAAAAAAAAAAAAAAAcHQdxs+J7Y65k09XAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABe6vMAAAD//3aV1SY=") open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 13:58:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001940), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001980)={'syzkaller0\x00', 0x1}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000580)) 13:58:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x11, 0x0, 0x0, [{}]}]}}, &(0x7f0000000140)=""/177, 0x32, 0xb1, 0x1}, 0x20) 13:58:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x11, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) [ 844.465838][T22094] loop3: detected capacity change from 0 to 512 [ 844.486843][T22097] loop2: detected capacity change from 0 to 512 13:58:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001940), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001980)={'syzkaller0\x00', 0x1}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000580)) 13:58:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x11, 0x0, 0x0, [{}]}]}}, &(0x7f0000000140)=""/177, 0x32, 0xb1, 0x1}, 0x20) [ 844.508962][T22097] EXT4-fs error (device loop2): mb_free_blocks:1790: group 0, inode 16: block 39:freeing already freed block (bit 39); block bitmap corrupt. [ 844.516596][T22094] EXT4-fs error (device loop3): mb_free_blocks:1790: group 0, inode 16: block 39:freeing already freed block (bit 39); block bitmap corrupt. [ 844.531714][T22097] EXT4-fs (loop2): 1 orphan inode deleted [ 844.543577][T22097] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 13:58:56 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x801c581f, 0x0) [ 844.560462][T22097] ext4 filesystem being mounted at /root/syzkaller-testdir463753530/syzkaller.232Ln0/715/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 844.575279][T22094] EXT4-fs (loop3): 1 orphan inode deleted [ 844.581089][T22094] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 844.584296][T22097] EXT4-fs error (device loop2): ext4_lookup:1832: inode #2: comm syz-executor.2: 'file0' linked to parent dir 13:58:56 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 844.605379][T22094] ext4 filesystem being mounted at /root/syzkaller-testdir2873134436/syzkaller.L2VnsO/817/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 844.654037][T22094] EXT4-fs error (device loop3): ext4_lookup:1832: inode #2: comm syz-executor.3: 'file0' linked to parent dir [ 844.654666][ T3437] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 844.690435][ T3448] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:58:56 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) bind$phonet(r0, &(0x7f0000000100), 0x10) sendto$phonet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x23, 0x0, 0x20}, 0x10) 13:58:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x2000000, &(0x7f0000000140)={[{@norecovery}, {@sysvgroups}, {@user_xattr}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x1ff}}, {@resgid}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x200006}}, {@discard}, {@nodelalloc}]}, 0x12, 0x4b2, &(0x7f0000000540)="$eJzs3d9rXFkdAPDvvcnU/khNqj7UgrXYSlK0M0lj2+BDrSD6VFDre4zJJIRMMiEzaZtQJMU/QBBRwSeffBH8AwTpnyBCQd+X3WWXZbfdfdiH3Z1lZu502+xMk9JJLkw+Hzi959w7M9/vaZgzc+49zA3gyLoQEbciYigiLkfEaLY/zcpss7HTftzTJw/mmyWJRuPO+0kk2b7OayXZ9lT7KXE8In75s4jfJF+OW9vaXpmrVMobWbtUX10v1ba2ryyvzi2Vl8pr09NT12duzFybmexLP8ci4uZP3v7T7//+05v//v69N2bfnfhtM62R7Pjz/eindtcLrf+LjuGI2DiIYDkYyvpTyDsRAAD2ZSIivhYR32l9/x+Noda3OQAAAGCQNH40Ep8kEQ0AAABgYKWtNbBJWszW+45EmhaL7TW834iTaaVaq39vsbq5ttA+PhaFdHG5Up7M1gqPRSFptqeyNbad9tVd7emIOBMRfxw90WoX56uVhbxPfgAAAMARcWrX/P+j0fb8HwAAABgwY3knAAAAABw4838AAAAYfOb/AAAAMNB+fvt2szQ6979euLu1uVK9e2WhXFsprm7OF+erG+vFpWp1qfWbfat7vV6lWl3/Qaxt3i/Vy7V6qba1Pbta3Vyrzy6/cAtsAAAA4BCd+faj/ycRsfPDE63SdCzvpIBDkb7Kg986uDyAwzeUdwJAbobzTgDITSHvBIDcJXsc77l45z/9zwUAADgY49/sff3fuQEYbK90/R8AGAiu/8PRVbACEI68r+5x/PWv/zcar5QQAADQdyOtkqTF7FrgSKRpsRhxunVbgEKyuFwpT2bzg/+NFr7SbE+1npnsuWYYAAAAAAAAAAAAAAAAAAAAAAAAAGhrNJJoAAAAAAMtIn0naf2af8T46KWR3ecHjiUfj7a2EXHvr3f+fH+uXt+Yau7/4Nn++l+y/VfzOIMBAAAA7NaZp3fm8QAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQT0+fPJjvlMOM+96PI2KsW/zhON7aHo9CRJz8MInh556XRMRQH+LvPIyIs93iJ820YizLolv8EznGTyPiVB/iw1H2qDn+3Or2/kvjQmvb/f03nJXX1Xv8S5+Nf0M9xp/T+4xx7vE/Sz3jP4w4N9x9/OnET3rEv7jP+L/+1fZ2r2ONv0WMd/38SV6IVaqvrpdqW9tXllfnlspL5bXp6anrMzdmrs1MlhaXK+Xs364x/vCtf332sv6f7BF/bI/+X9pn/z99fP/J19vVQrf4Exe7f/6e7RE/zT77vpvVm8fHO/Wddv155//x3/Mv6/9Cj/7v9fef2Gf/L//id2/u86EAwCGobW2vzFUq5Q0VFRWVZ5W8RyYAAKDfvvjSn3cmAAAAAAAAAAAAAAAAAAAAcHQdxs+J7Y65k09XAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABe6vMAAAD//3aV1SY=") open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 13:58:56 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x801c581f, 0x0) 13:58:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000003d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 13:58:56 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:58:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001940), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001980)={'syzkaller0\x00', 0x1}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000580)) 13:58:56 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) bind$phonet(r0, &(0x7f0000000100), 0x10) sendto$phonet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x23, 0x0, 0x20}, 0x10) 13:58:56 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x801c581f, 0x0) 13:58:56 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) bind$phonet(r0, &(0x7f0000000100), 0x10) sendto$phonet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x23, 0x0, 0x20}, 0x10) 13:58:56 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x801c581f, 0x0) [ 845.340299][ T25] kauditd_printk_skb: 133 callbacks suppressed [ 845.340323][ T25] audit: type=1400 audit(1683208736.905:155074): avc: denied { bind } for pid=22118 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 845.372278][T22125] loop3: detected capacity change from 0 to 512 13:58:57 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:58:57 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) bind$phonet(r0, &(0x7f0000000100), 0x10) sendto$phonet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x23, 0x0, 0x20}, 0x10) 13:58:57 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 845.453398][T22125] EXT4-fs error (device loop3): mb_free_blocks:1790: group 0, inode 16: block 39:freeing already freed block (bit 39); block bitmap corrupt. [ 845.475719][T22125] Quota error (device loop3): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 845.491108][T22125] EXT4-fs (loop3): 1 orphan inode deleted [ 845.496937][T22125] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 845.509371][T22125] ext4 filesystem being mounted at /root/syzkaller-testdir2873134436/syzkaller.L2VnsO/818/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 845.528617][T22125] EXT4-fs error (device loop3): ext4_lookup:1832: inode #2: comm syz-executor.3: 'file0' linked to parent dir [ 845.555646][ T3448] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:58:57 executing program 4: prctl$PR_SET_SPECULATION_CTRL(0x2, 0xffaf928d457f0000) 13:58:57 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x40101288, 0x0) 13:58:57 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) bind$phonet(r0, &(0x7f0000000100), 0x10) sendto$phonet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x23, 0x0, 0x20}, 0x10) 13:58:57 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) bind$phonet(r0, &(0x7f0000000100), 0x10) sendto$phonet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x23, 0x0, 0x20}, 0x10) 13:58:57 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000003d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 13:58:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000400)={0x0, 0x1c, "c78fa1628ab0ce78191fd7b2f7753dea3fe37534fe9921132e223b5a"}, &(0x7f00000004c0)=0x24) 13:58:57 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) bind$phonet(r0, &(0x7f0000000100), 0x10) sendto$phonet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x23, 0x0, 0x20}, 0x10) 13:58:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xf0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 13:58:57 executing program 4: prctl$PR_SET_SPECULATION_CTRL(0x2, 0xffaf928d457f0000) 13:58:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:58:57 executing program 4: prctl$PR_SET_SPECULATION_CTRL(0x2, 0xffaf928d457f0000) 13:58:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000002080)=ANY=[@ANYBLOB="850000004f000000350000000000ba00a50000007d00000095000000000000004cf12aa5cbd56806f81f06a9cf2bf5e0a141d524581835d805086a8cfebf67234fa878bc3a6400005f906152bfebff20d3c6dd8442230e8353f91536aa1f7035175135230163cf094949977df40e7361549059f1e0a96f6f110754d35fe51b0a847687a1ef1f83dd6c1001158a1086f7d0f9dc7de9f13a796b723c167e4080bf668ce021879c820f9b80fe2330a820d3940600000000000000b1f6ef7cd0d00ad054c2d8625efeb18ce20300000008cbf8168785bce09cb1fd8a42481b138200000000000000033b99a589000000000000008a44735dd7562600ff00000000b962a3b3ed4eb8b7b3c3acadee9d6659d53feac1b779fb3654ce2ff6eb24abcb1f6cffee836857e9760cfe164c396d7fd440daa3ed506d5ef9e483b746407866ca71e5a60b381e40d9c925fe9a9a4c76350dc65f177c81c03a1e7ead9eaf72ce6e7d390000000000006f3039f31866cb91a85ff3ae5324a80000c2376392aae03a05c95b92c1c098b68937dd0000000000009d1cb9d2861becec1ae9481484ca8bc1f2134018ca403d82398a2f1a4f65ee862d507996e7fcee7b02ec59202c1e9ab037763c12be975b55e4ceab751b0aa8d569faef3ce194a97146c25f4c7a5417d6f55a98939a1332629c28701688e5ad876b63dd26261698fba015a5032a207a6e03000000ca603fbfde23a5b502f2000d7cefd96e907c7fa14559761df7be396f450ccc8731d1412ba3049552222c0df57c901291975b3d622c702ab2679f8cb538bee0014165dc6650678ae25060c3e8e00da7987b8f7cab76ce7aa870f34da5df14e1bcd308d80540dfb8d67748b42d62ba73ab41ce34ef9a858a98559d97a6cc71d2b51b1b963e28bfbbd90a3058312680499701e1077b1621b4d26ddded16d68be4d1b21c52a416bfee6ca7c9140de7b4a6fdff08e300000000000000000000000000007db5265b4549a384a1dcf17866bf5fd06fe9876c946514c2006cc734983ebbb7246875ea15740e2e9b71ad6cfe1c3fa2f794f750859dbba9217a35565fad537f49338b0c95f0dc8b3607535fc1800081426a1b91b81cb97acd19f306c5b968b75cf2256f7dd22b1fa51e5ebae10d5b08f24b8f43ed4032f8e2015e916851e18d0b7d9fe4bf3d61a52ec7ce2bad84e706d9975322ded6bd8996fc2baa8983f106537961caf1705603a4cf15081501ccc6a972b969a92530e9199fab92be278dbbb116e363ebfb1383119f8b9bf53374aff56787a7ac163cc0308eb4484af8d1dfe30239d538d156c2c4e03f63"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xf0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 846.301943][T22166] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 846.310277][T22166] Y4`Ҙ: left promiscuous mode [ 846.315385][T22166] Y4`Ҙ: left allmulticast mode 13:58:58 executing program 4: prctl$PR_SET_SPECULATION_CTRL(0x2, 0xffaf928d457f0000) 13:58:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000002080)=ANY=[@ANYBLOB="850000004f000000350000000000ba00a50000007d00000095000000000000004cf12aa5cbd56806f81f06a9cf2bf5e0a141d524581835d805086a8cfebf67234fa878bc3a6400005f906152bfebff20d3c6dd8442230e8353f91536aa1f7035175135230163cf094949977df40e7361549059f1e0a96f6f110754d35fe51b0a847687a1ef1f83dd6c1001158a1086f7d0f9dc7de9f13a796b723c167e4080bf668ce021879c820f9b80fe2330a820d3940600000000000000b1f6ef7cd0d00ad054c2d8625efeb18ce20300000008cbf8168785bce09cb1fd8a42481b138200000000000000033b99a589000000000000008a44735dd7562600ff00000000b962a3b3ed4eb8b7b3c3acadee9d6659d53feac1b779fb3654ce2ff6eb24abcb1f6cffee836857e9760cfe164c396d7fd440daa3ed506d5ef9e483b746407866ca71e5a60b381e40d9c925fe9a9a4c76350dc65f177c81c03a1e7ead9eaf72ce6e7d390000000000006f3039f31866cb91a85ff3ae5324a80000c2376392aae03a05c95b92c1c098b68937dd0000000000009d1cb9d2861becec1ae9481484ca8bc1f2134018ca403d82398a2f1a4f65ee862d507996e7fcee7b02ec59202c1e9ab037763c12be975b55e4ceab751b0aa8d569faef3ce194a97146c25f4c7a5417d6f55a98939a1332629c28701688e5ad876b63dd26261698fba015a5032a207a6e03000000ca603fbfde23a5b502f2000d7cefd96e907c7fa14559761df7be396f450ccc8731d1412ba3049552222c0df57c901291975b3d622c702ab2679f8cb538bee0014165dc6650678ae25060c3e8e00da7987b8f7cab76ce7aa870f34da5df14e1bcd308d80540dfb8d67748b42d62ba73ab41ce34ef9a858a98559d97a6cc71d2b51b1b963e28bfbbd90a3058312680499701e1077b1621b4d26ddded16d68be4d1b21c52a416bfee6ca7c9140de7b4a6fdff08e300000000000000000000000000007db5265b4549a384a1dcf17866bf5fd06fe9876c946514c2006cc734983ebbb7246875ea15740e2e9b71ad6cfe1c3fa2f794f750859dbba9217a35565fad537f49338b0c95f0dc8b3607535fc1800081426a1b91b81cb97acd19f306c5b968b75cf2256f7dd22b1fa51e5ebae10d5b08f24b8f43ed4032f8e2015e916851e18d0b7d9fe4bf3d61a52ec7ce2bad84e706d9975322ded6bd8996fc2baa8983f106537961caf1705603a4cf15081501ccc6a972b969a92530e9199fab92be278dbbb116e363ebfb1383119f8b9bf53374aff56787a7ac163cc0308eb4484af8d1dfe30239d538d156c2c4e03f63"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xf0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 13:58:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xf0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 13:58:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:58:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000400)={0x0, 0x1c, "c78fa1628ab0ce78191fd7b2f7753dea3fe37534fe9921132e223b5a"}, &(0x7f00000004c0)=0x24) 13:58:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:58:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xf0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 13:58:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:58:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000002080)=ANY=[@ANYBLOB="850000004f000000350000000000ba00a50000007d00000095000000000000004cf12aa5cbd56806f81f06a9cf2bf5e0a141d524581835d805086a8cfebf67234fa878bc3a6400005f906152bfebff20d3c6dd8442230e8353f91536aa1f7035175135230163cf094949977df40e7361549059f1e0a96f6f110754d35fe51b0a847687a1ef1f83dd6c1001158a1086f7d0f9dc7de9f13a796b723c167e4080bf668ce021879c820f9b80fe2330a820d3940600000000000000b1f6ef7cd0d00ad054c2d8625efeb18ce20300000008cbf8168785bce09cb1fd8a42481b138200000000000000033b99a589000000000000008a44735dd7562600ff00000000b962a3b3ed4eb8b7b3c3acadee9d6659d53feac1b779fb3654ce2ff6eb24abcb1f6cffee836857e9760cfe164c396d7fd440daa3ed506d5ef9e483b746407866ca71e5a60b381e40d9c925fe9a9a4c76350dc65f177c81c03a1e7ead9eaf72ce6e7d390000000000006f3039f31866cb91a85ff3ae5324a80000c2376392aae03a05c95b92c1c098b68937dd0000000000009d1cb9d2861becec1ae9481484ca8bc1f2134018ca403d82398a2f1a4f65ee862d507996e7fcee7b02ec59202c1e9ab037763c12be975b55e4ceab751b0aa8d569faef3ce194a97146c25f4c7a5417d6f55a98939a1332629c28701688e5ad876b63dd26261698fba015a5032a207a6e03000000ca603fbfde23a5b502f2000d7cefd96e907c7fa14559761df7be396f450ccc8731d1412ba3049552222c0df57c901291975b3d622c702ab2679f8cb538bee0014165dc6650678ae25060c3e8e00da7987b8f7cab76ce7aa870f34da5df14e1bcd308d80540dfb8d67748b42d62ba73ab41ce34ef9a858a98559d97a6cc71d2b51b1b963e28bfbbd90a3058312680499701e1077b1621b4d26ddded16d68be4d1b21c52a416bfee6ca7c9140de7b4a6fdff08e300000000000000000000000000007db5265b4549a384a1dcf17866bf5fd06fe9876c946514c2006cc734983ebbb7246875ea15740e2e9b71ad6cfe1c3fa2f794f750859dbba9217a35565fad537f49338b0c95f0dc8b3607535fc1800081426a1b91b81cb97acd19f306c5b968b75cf2256f7dd22b1fa51e5ebae10d5b08f24b8f43ed4032f8e2015e916851e18d0b7d9fe4bf3d61a52ec7ce2bad84e706d9975322ded6bd8996fc2baa8983f106537961caf1705603a4cf15081501ccc6a972b969a92530e9199fab92be278dbbb116e363ebfb1383119f8b9bf53374aff56787a7ac163cc0308eb4484af8d1dfe30239d538d156c2c4e03f63"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xf0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 847.153207][T22185] batadv_slave_0: entered promiscuous mode [ 847.166316][T22181] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 847.178472][T22190] batadv_slave_0: entered promiscuous mode [ 847.189285][T22185] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 847.197499][T22185] Y4`Ҙ: left promiscuous mode 13:58:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xf0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 13:58:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) [ 847.202528][T22185] Y4`Ҙ: left allmulticast mode [ 847.208167][T22190] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 847.216465][T22190] Y4`Ҙ: left promiscuous mode [ 847.221507][T22190] Y4`Ҙ: left allmulticast mode 13:58:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) [ 847.248930][T22200] batadv_slave_0: entered promiscuous mode [ 847.259308][T22200] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 847.267540][T22200] Y4`Ҙ: left promiscuous mode [ 847.272580][T22200] Y4`Ҙ: left allmulticast mode 13:58:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) [ 847.333354][T22183] batadv_slave_0: left promiscuous mode [ 847.339311][T22189] batadv_slave_0: left promiscuous mode [ 847.345239][T22199] batadv_slave_0: left promiscuous mode [ 847.352613][T22212] batadv_slave_0: entered promiscuous mode [ 847.368312][T22204] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 847.376570][T22204] Y4`Ҙ: left promiscuous mode 13:58:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:58:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:58:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) [ 847.381699][T22204] Y4`Ҙ: left allmulticast mode [ 847.401243][T22214] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 847.410812][T22217] batadv_slave_0: entered promiscuous mode [ 847.418284][T22218] batadv_slave_0: entered promiscuous mode [ 847.425962][T22220] batadv_slave_0: entered promiscuous mode [ 847.432617][T22220] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 847.442107][T22218] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 847.451028][T22202] batadv_slave_0: left promiscuous mode [ 847.456931][T22217] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 847.482199][T22219] batadv_slave_0: left promiscuous mode [ 847.505361][T22216] batadv_slave_0: left promiscuous mode [ 847.527032][T22215] batadv_slave_0: left promiscuous mode 13:58:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000400)={0x0, 0x1c, "c78fa1628ab0ce78191fd7b2f7753dea3fe37534fe9921132e223b5a"}, &(0x7f00000004c0)=0x24) 13:58:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:58:59 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:58:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:58:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:58:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:58:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) [ 848.015185][T22235] batadv_slave_0: entered promiscuous mode [ 848.024058][T22240] batadv_slave_0: entered promiscuous mode [ 848.031507][T22239] batadv_slave_0: entered promiscuous mode [ 848.040691][T22238] batadv_slave_0: entered promiscuous mode 13:58:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:58:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) [ 848.085731][T22233] batadv_slave_0: left promiscuous mode [ 848.100463][T22232] batadv_slave_0: left promiscuous mode 13:58:59 executing program 0: unshare(0x20000400) r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, &(0x7f0000000080)) 13:58:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x82}, [@ldst={0x7}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 848.134714][T22236] batadv_slave_0: left promiscuous mode [ 848.153825][T22264] batadv_slave_0: entered promiscuous mode [ 848.162796][T22234] batadv_slave_0: left promiscuous mode 13:58:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) [ 848.169334][ T25] audit: type=1400 audit(1683208739.735:155075): avc: denied { getopt } for pid=22266 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 848.225428][T22275] batadv_slave_0: entered promiscuous mode [ 848.254949][T22263] batadv_slave_0: left promiscuous mode [ 848.260663][T22272] batadv_slave_0: left promiscuous mode 13:59:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000400)={0x0, 0x1c, "c78fa1628ab0ce78191fd7b2f7753dea3fe37534fe9921132e223b5a"}, &(0x7f00000004c0)=0x24) 13:59:00 executing program 0: unshare(0x20000400) r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, &(0x7f0000000080)) 13:59:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xa, 0x0, 0x0) 13:59:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:59:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:59:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x82}, [@ldst={0x7}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 13:59:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x82}, [@ldst={0x7}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 13:59:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xa, 0x0, 0x0) 13:59:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x82}, [@ldst={0x7}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 13:59:00 executing program 0: unshare(0x20000400) r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, &(0x7f0000000080)) 13:59:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000100)=0x1, 0x4) 13:59:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000100)=0x1, 0x4) [ 848.897091][T22288] batadv_slave_0: entered promiscuous mode [ 848.972919][T22285] batadv_slave_0: left promiscuous mode 13:59:01 executing program 0: unshare(0x20000400) r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, &(0x7f0000000080)) 13:59:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xa, 0x0, 0x0) 13:59:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000100)=0x1, 0x4) 13:59:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[], 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000500)={'wg2\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000001c0)={r7, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x34, 0x10, 0x1, 0x0, 0xfffffffd, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x3, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}]}, 0x34}], 0x1}, 0x0) r9 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000140)=0x48a, 0x4) bind$packet(r9, &(0x7f0000000080)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$packet(r9, &(0x7f0000000040)="bb53a945842851722bb479853e60", 0xe, 0x0, 0x0, 0x0) recvmsg(r9, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2022) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000e4", @ANYRES16=0x0, @ANYBLOB="ffdbdf256800000008000300000000000000", @ANYRES32=r11, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000006c0)={0xb8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0xfd, 0x3e}}}}, [@NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}, @NL80211_KEY_IDX={0x5, 0x2, 0x1}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "aa6a63989205ded5b573273871"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6018ce2fdd39b99012be0befda"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "a472ae6af2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x200c000) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf256300000008000300", @ANYRES32=r11, @ANYBLOB="074fd458e02235d96e764f1fc8688a9223a1e8eea38ea6c94cdba294f3d915931172a3a5196168796728475a93b8f67f99cc8b7f733e95efd0c2ab0795e0debfb76e335c0685bdd18ca4acbf3f0ff0302eae5e9243a20299d3aecff16c730000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8810) sendmsg$NL80211_CMD_SET_PMKSA(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r6, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x80000000}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x611}, @NL80211_ATTR_PMKID={0x14, 0x55, "2b0d417bc8fa9e45ba1c0b5ae853c261"}, @NL80211_ATTR_PMKID={0x14, 0x55, "75cef63104e3a6926efb653fed5929a7"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x2}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x5e}, @NL80211_ATTR_PMKID={0x14, 0x55, "f467c0ae0fde5bb43c8ce71ed0ad5732"}, @NL80211_ATTR_PMK={0x14, 0xfe, "851a1e9d6557ee5187fcf05f38784389"}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x58}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 13:59:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) 13:59:01 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x4, 0x0, 0x0) 13:59:01 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x0, 0x0, 0x2, 0x1}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000100)=0x1, 0x4) 13:59:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xa, 0x0, 0x0) 13:59:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) 13:59:01 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x4, 0x0, 0x0) 13:59:01 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x0, 0x0, 0x2, 0x1}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 849.752758][T22316] batadv_slave_0: entered promiscuous mode 13:59:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) 13:59:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) 13:59:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) 13:59:01 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x0, 0x0, 0x2, 0x1}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:01 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x4, 0x0, 0x0) 13:59:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) 13:59:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) 13:59:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) [ 849.834910][T22314] batadv_slave_0: left promiscuous mode 13:59:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) 13:59:01 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x0, 0x0, 0x2, 0x1}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) 13:59:01 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x4, 0x0, 0x0) 13:59:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) 13:59:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) 13:59:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_buf(r0, 0x84, 0x66, &(0x7f0000000740)=""/4096, &(0x7f00000004c0)=0x1000) 13:59:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000000)="0000000000000002", 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000140)={0x0, 0x0, 0x1, 'w'}, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000500)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, 0xffffffffffffffec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140), 0x4) 13:59:01 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000002f00)={0x0, 0x10, &(0x7f0000002ec0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000040)) 13:59:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x5b, &(0x7f0000000300)={&(0x7f0000000100)=@RTM_DELMDB={0x38, 0x1e, 0x225, 0x0, 0x0, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x0, {@ip4=@broadcast}}}]}, 0x38}}, 0x0) 13:59:01 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002180)={&(0x7f0000002080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002240)={0x18, 0x3, &(0x7f0000001f00)=@framed, &(0x7f0000001f40)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000021c0), 0x8, 0x10, 0x0}, 0x80) 13:59:01 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x1, 0x3d, &(0x7f00000002c0), 0x8) sendmsg$sock(r0, &(0x7f00000007c0)={&(0x7f0000000240)=@in6={0x2, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@txtime={{0x18}}], 0x18}, 0x0) 13:59:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_buf(r0, 0x84, 0x66, &(0x7f0000000740)=""/4096, &(0x7f00000004c0)=0x1000) 13:59:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) 13:59:01 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002180)={&(0x7f0000002080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002240)={0x18, 0x3, &(0x7f0000001f00)=@framed, &(0x7f0000001f40)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000021c0), 0x8, 0x10, 0x0}, 0x80) 13:59:01 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x1, 0x3d, &(0x7f00000002c0), 0x8) sendmsg$sock(r0, &(0x7f00000007c0)={&(0x7f0000000240)=@in6={0x2, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@txtime={{0x18}}], 0x18}, 0x0) [ 850.023796][T22373] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 13:59:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_buf(r0, 0x84, 0x66, &(0x7f0000000740)=""/4096, &(0x7f00000004c0)=0x1000) 13:59:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x5b, &(0x7f0000000300)={&(0x7f0000000100)=@RTM_DELMDB={0x38, 0x1e, 0x225, 0x0, 0x0, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x0, {@ip4=@broadcast}}}]}, 0x38}}, 0x0) 13:59:01 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002180)={&(0x7f0000002080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002240)={0x18, 0x3, &(0x7f0000001f00)=@framed, &(0x7f0000001f40)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000021c0), 0x8, 0x10, 0x0}, 0x80) 13:59:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) [ 850.065981][ T25] audit: type=1400 audit(1683208741.635:155076): avc: denied { setopt } for pid=22377 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 850.137987][T22393] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 850.139757][ T25] audit: type=1400 audit(1683208741.655:155077): avc: denied { bind } for pid=22377 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 850.167251][ T25] audit: type=1400 audit(1683208741.655:155078): avc: denied { name_bind } for pid=22377 comm="syz-executor.1" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 850.188667][ T25] audit: type=1400 audit(1683208741.655:155079): avc: denied { node_bind } for pid=22377 comm="syz-executor.1" saddr=fe80:: src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 13:59:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000002f00)={0x0, 0x10, &(0x7f0000002ec0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000040)) 13:59:02 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x1, 0x3d, &(0x7f00000002c0), 0x8) sendmsg$sock(r0, &(0x7f00000007c0)={&(0x7f0000000240)=@in6={0x2, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@txtime={{0x18}}], 0x18}, 0x0) 13:59:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_buf(r0, 0x84, 0x66, &(0x7f0000000740)=""/4096, &(0x7f00000004c0)=0x1000) 13:59:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x5b, &(0x7f0000000300)={&(0x7f0000000100)=@RTM_DELMDB={0x38, 0x1e, 0x225, 0x0, 0x0, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x0, {@ip4=@broadcast}}}]}, 0x38}}, 0x0) 13:59:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) 13:59:02 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002180)={&(0x7f0000002080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002240)={0x18, 0x3, &(0x7f0000001f00)=@framed, &(0x7f0000001f40)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000021c0), 0x8, 0x10, 0x0}, 0x80) 13:59:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) 13:59:02 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) 13:59:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) 13:59:02 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x1, 0x3d, &(0x7f00000002c0), 0x8) sendmsg$sock(r0, &(0x7f00000007c0)={&(0x7f0000000240)=@in6={0x2, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@txtime={{0x18}}], 0x18}, 0x0) 13:59:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x5b, &(0x7f0000000300)={&(0x7f0000000100)=@RTM_DELMDB={0x38, 0x1e, 0x225, 0x0, 0x0, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x0, {@ip4=@broadcast}}}]}, 0x38}}, 0x0) 13:59:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) [ 850.867116][T22403] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 850.951695][T22418] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 13:59:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) 13:59:03 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002180)={&(0x7f0000002080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002240)={0x18, 0x3, &(0x7f0000001f00)=@framed, &(0x7f0000001f40)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000021c0), 0x8, 0x10, 0x0}, 0x80) 13:59:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) 13:59:03 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x1, 0x3d, &(0x7f00000002c0), 0x8) sendmsg$sock(r0, &(0x7f00000007c0)={&(0x7f0000000240)=@in6={0x2, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@txtime={{0x18}}], 0x18}, 0x0) 13:59:03 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000002f00)={0x0, 0x10, &(0x7f0000002ec0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000040)) 13:59:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) 13:59:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) 13:59:03 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x1, 0x3d, &(0x7f00000002c0), 0x8) sendmsg$sock(r0, &(0x7f00000007c0)={&(0x7f0000000240)=@in6={0x2, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@txtime={{0x18}}], 0x18}, 0x0) 13:59:03 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002180)={&(0x7f0000002080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002240)={0x18, 0x3, &(0x7f0000001f00)=@framed, &(0x7f0000001f40)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000021c0), 0x8, 0x10, 0x0}, 0x80) 13:59:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) 13:59:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x24, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='\x15\x00'}, @typed={0x8, 0xa, 0x0, 0x0, @u32=0x1}]}, 0x24}}, 0x0) 13:59:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x102440, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYRES64=0x0, @ANYRES8=0x0, @ANYRES8, @ANYRESDEC], 0x1, 0x75b, &(0x7f0000000840)="$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") 13:59:03 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x1, 0x3d, &(0x7f00000002c0), 0x8) sendmsg$sock(r0, &(0x7f00000007c0)={&(0x7f0000000240)=@in6={0x2, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@txtime={{0x18}}], 0x18}, 0x0) 13:59:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000002f00)={0x0, 0x10, &(0x7f0000002ec0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000040)) 13:59:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x24, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='\x15\x00'}, @typed={0x8, 0xa, 0x0, 0x0, @u32=0x1}]}, 0x24}}, 0x0) 13:59:04 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002180)={&(0x7f0000002080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002240)={0x18, 0x3, &(0x7f0000001f00)=@framed, &(0x7f0000001f40)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000021c0), 0x8, 0x10, 0x0}, 0x80) 13:59:04 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @dev, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4ea4, 0x0, @dev, 0x1}, 0x1c) 13:59:04 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @random="2eebfdce1dda", @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, "e73198a00c9a121c0cb2def3348ddbcdfc168ef06ed892a6a1ca9554"}}}}, 0x0) 13:59:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x24, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='\x15\x00'}, @typed={0x8, 0xa, 0x0, 0x0, @u32=0x1}]}, 0x24}}, 0x0) 13:59:04 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@bridge_getneigh={0x28, 0x1e, 0x901, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 13:59:04 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$nfs(&(0x7f0000000400)='[(\'\'@%\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480), 0x0, &(0x7f00000004c0)) 13:59:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:04 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$nfs(&(0x7f0000000400)='[(\'\'@%\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480), 0x0, &(0x7f00000004c0)) 13:59:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x24, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='\x15\x00'}, @typed={0x8, 0xa, 0x0, 0x0, @u32=0x1}]}, 0x24}}, 0x0) 13:59:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@bridge_getneigh={0x28, 0x1e, 0x901, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 13:59:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:05 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$nfs(&(0x7f0000000400)='[(\'\'@%\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480), 0x0, &(0x7f00000004c0)) 13:59:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x21, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:59:05 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$nfs(&(0x7f0000000400)='[(\'\'@%\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480), 0x0, &(0x7f00000004c0)) 13:59:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000540)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@bridge_getneigh={0x28, 0x1e, 0x901, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 13:59:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000000140)="2fa2", 0x584}], 0x1}, 0x0) 13:59:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x21, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:59:05 executing program 0: sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000030605000000aa0000000000000000000500010007"], 0x1c}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x1000000000000330, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:59:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@bridge_getneigh={0x28, 0x1e, 0x901, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 13:59:05 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x2, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$inet(r3, &(0x7f0000001500)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) ftruncate(r2, 0x200002) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0x8000009, 0x4) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 13:59:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x21, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:59:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000000140)="2fa2", 0x584}], 0x1}, 0x0) 13:59:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000001240), 0x8) readv(r0, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000040)=""/145, 0x91}], 0x2) 13:59:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x21, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:59:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000001240), 0x8) readv(r0, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000040)=""/145, 0x91}], 0x2) 13:59:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x600000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) 13:59:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000000140)="2fa2", 0x584}], 0x1}, 0x0) 13:59:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3f4, 0x0, 0x30}, 0x9c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee7, 0x4000084, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x20) write$binfmt_elf64(r0, &(0x7f0000002640)=ANY=[], 0x939) 13:59:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000001240), 0x8) readv(r0, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000040)=""/145, 0x91}], 0x2) 13:59:05 executing program 0: sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000030605000000aa0000000000000000000500010007"], 0x1c}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x1000000000000330, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:59:05 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x2, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$inet(r3, &(0x7f0000001500)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) ftruncate(r2, 0x200002) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0x8000009, 0x4) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 13:59:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000000140)="2fa2", 0x584}], 0x1}, 0x0) 13:59:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000001240), 0x8) readv(r0, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000040)=""/145, 0x91}], 0x2) 13:59:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x600000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) 13:59:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3f4, 0x0, 0x30}, 0x9c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee7, 0x4000084, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x20) write$binfmt_elf64(r0, &(0x7f0000002640)=ANY=[], 0x939) 13:59:05 executing program 4: sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000030605000000aa0000000000000000000500010007"], 0x1c}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x1000000000000330, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:59:05 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x2, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$inet(r3, &(0x7f0000001500)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) ftruncate(r2, 0x200002) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0x8000009, 0x4) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 13:59:05 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x2, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$inet(r3, &(0x7f0000001500)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) ftruncate(r2, 0x200002) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0x8000009, 0x4) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 13:59:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3f4, 0x0, 0x30}, 0x9c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee7, 0x4000084, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x20) write$binfmt_elf64(r0, &(0x7f0000002640)=ANY=[], 0x939) 13:59:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x600000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) 13:59:05 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x2, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$inet(r3, &(0x7f0000001500)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) ftruncate(r2, 0x200002) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0x8000009, 0x4) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 13:59:06 executing program 0: sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000030605000000aa0000000000000000000500010007"], 0x1c}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x1000000000000330, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:59:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3f4, 0x0, 0x30}, 0x9c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee7, 0x4000084, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x20) write$binfmt_elf64(r0, &(0x7f0000002640)=ANY=[], 0x939) 13:59:06 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x2, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$inet(r3, &(0x7f0000001500)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) ftruncate(r2, 0x200002) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0x8000009, 0x4) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 13:59:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x600000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) 13:59:06 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x2, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$inet(r3, &(0x7f0000001500)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) ftruncate(r2, 0x200002) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0x8000009, 0x4) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 13:59:06 executing program 4: sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000030605000000aa0000000000000000000500010007"], 0x1c}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x1000000000000330, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:59:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x38, r2, 0x615, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x38}}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14, r2, 0x409}, 0x14}}, 0x0) 13:59:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 13:59:06 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_LP_INTERVAL={0x8}, @IFLA_BOND_MIN_LINKS={0x8}]}}}]}, 0x44}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000005000000000000000000", @ANYRES32=0x0, @ANYBLOB="0092000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 13:59:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x38, r2, 0x615, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x38}}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14, r2, 0x409}, 0x14}}, 0x0) 13:59:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 13:59:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x38, r2, 0x615, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x38}}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14, r2, 0x409}, 0x14}}, 0x0) [ 854.822136][T22579] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 854.831547][T22579] validate_nla: 12 callbacks suppressed [ 854.831557][T22579] netlink: 'syz-executor.5': attribute type 19 has an invalid length. [ 854.845366][T22579] netlink: 'syz-executor.5': attribute type 18 has an invalid length. [ 854.876828][T22579] vxlan0: entered allmulticast mode 13:59:06 executing program 0: sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000030605000000aa0000000000000000000500010007"], 0x1c}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x1000000000000330, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:59:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x38, r2, 0x615, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x38}}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14, r2, 0x409}, 0x14}}, 0x0) 13:59:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 13:59:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x38, r2, 0x615, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x38}}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14, r2, 0x409}, 0x14}}, 0x0) 13:59:06 executing program 4: sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000030605000000aa0000000000000000000500010007"], 0x1c}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x1000000000000330, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:59:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff04ffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000004ffffffff000000000900010063616b65000000000c00020008000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x5fed8bed0a984a58, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$packet(r0, &(0x7f0000000240)="93a749700b71659fbc09a7b586dd", 0x36, 0x0, 0x0, 0x0) 13:59:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 13:59:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x38, r2, 0x615, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x38}}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14, r2, 0x409}, 0x14}}, 0x0) [ 855.344104][T22595] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 13:59:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x38, r2, 0x615, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x38}}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14, r2, 0x409}, 0x14}}, 0x0) 13:59:07 executing program 1: mq_open(&(0x7f0000000000)='I\xad\xa7r[|]\xab[\xaep\xaa\xae\xc5\x83!\b\xa6\x05\xa8~\xae\x96K\xf7\n\x06\x99+\xad \v\xc8\x84\x87y\xaaG\a\xbf\xe70\xc6\x06\xcc\xc8)\xd1\xbd\x93\x19\xed\x93\xeb\x12\xb1\xa9>!O\xfe\xe9\x10\x87=&wO\xe8\xe9]\xfa\xcb&\xbb\xc0\xd3[\xa8\x03\xa4\x18\x06\x84', 0x41, 0x0, 0x0) 13:59:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff04ffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000004ffffffff000000000900010063616b65000000000c00020008000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x5fed8bed0a984a58, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$packet(r0, &(0x7f0000000240)="93a749700b71659fbc09a7b586dd", 0x36, 0x0, 0x0, 0x0) 13:59:07 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_LP_INTERVAL={0x8}, @IFLA_BOND_MIN_LINKS={0x8}]}}}]}, 0x44}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000005000000000000000000", @ANYRES32=0x0, @ANYBLOB="0092000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) [ 855.616718][T22604] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 855.699038][T22608] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 855.708389][T22608] netlink: 'syz-executor.5': attribute type 19 has an invalid length. [ 855.716589][T22608] netlink: 'syz-executor.5': attribute type 18 has an invalid length. 13:59:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff04ffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000004ffffffff000000000900010063616b65000000000c00020008000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x5fed8bed0a984a58, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$packet(r0, &(0x7f0000000240)="93a749700b71659fbc09a7b586dd", 0x36, 0x0, 0x0, 0x0) 13:59:07 executing program 1: mq_open(&(0x7f0000000000)='I\xad\xa7r[|]\xab[\xaep\xaa\xae\xc5\x83!\b\xa6\x05\xa8~\xae\x96K\xf7\n\x06\x99+\xad \v\xc8\x84\x87y\xaaG\a\xbf\xe70\xc6\x06\xcc\xc8)\xd1\xbd\x93\x19\xed\x93\xeb\x12\xb1\xa9>!O\xfe\xe9\x10\x87=&wO\xe8\xe9]\xfa\xcb&\xbb\xc0\xd3[\xa8\x03\xa4\x18\x06\x84', 0x41, 0x0, 0x0) 13:59:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff04ffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000004ffffffff000000000900010063616b65000000000c00020008000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x5fed8bed0a984a58, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$packet(r0, &(0x7f0000000240)="93a749700b71659fbc09a7b586dd", 0x36, 0x0, 0x0, 0x0) 13:59:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff04ffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000004ffffffff000000000900010063616b65000000000c00020008000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x5fed8bed0a984a58, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$packet(r0, &(0x7f0000000240)="93a749700b71659fbc09a7b586dd", 0x36, 0x0, 0x0, 0x0) 13:59:07 executing program 0: futex(0x0, 0xb, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x0) 13:59:07 executing program 1: mq_open(&(0x7f0000000000)='I\xad\xa7r[|]\xab[\xaep\xaa\xae\xc5\x83!\b\xa6\x05\xa8~\xae\x96K\xf7\n\x06\x99+\xad \v\xc8\x84\x87y\xaaG\a\xbf\xe70\xc6\x06\xcc\xc8)\xd1\xbd\x93\x19\xed\x93\xeb\x12\xb1\xa9>!O\xfe\xe9\x10\x87=&wO\xe8\xe9]\xfa\xcb&\xbb\xc0\xd3[\xa8\x03\xa4\x18\x06\x84', 0x41, 0x0, 0x0) [ 855.916409][T22615] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 855.937617][T22613] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 13:59:07 executing program 1: mq_open(&(0x7f0000000000)='I\xad\xa7r[|]\xab[\xaep\xaa\xae\xc5\x83!\b\xa6\x05\xa8~\xae\x96K\xf7\n\x06\x99+\xad \v\xc8\x84\x87y\xaaG\a\xbf\xe70\xc6\x06\xcc\xc8)\xd1\xbd\x93\x19\xed\x93\xeb\x12\xb1\xa9>!O\xfe\xe9\x10\x87=&wO\xe8\xe9]\xfa\xcb&\xbb\xc0\xd3[\xa8\x03\xa4\x18\x06\x84', 0x41, 0x0, 0x0) 13:59:07 executing program 0: futex(0x0, 0xb, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x0) 13:59:07 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0xe) splice(r0, 0x0, r2, 0x0, 0x100000800ff01, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xfffffc8f) 13:59:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff04ffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000004ffffffff000000000900010063616b65000000000c00020008000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x5fed8bed0a984a58, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$packet(r0, &(0x7f0000000240)="93a749700b71659fbc09a7b586dd", 0x36, 0x0, 0x0, 0x0) [ 855.957945][T22616] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:59:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff04ffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000004ffffffff000000000900010063616b65000000000c00020008000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x5fed8bed0a984a58, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$packet(r0, &(0x7f0000000240)="93a749700b71659fbc09a7b586dd", 0x36, 0x0, 0x0, 0x0) [ 856.038695][T22631] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 856.051970][T22632] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 13:59:08 executing program 0: futex(0x0, 0xb, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x0) 13:59:08 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_LP_INTERVAL={0x8}, @IFLA_BOND_MIN_LINKS={0x8}]}}}]}, 0x44}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000005000000000000000000", @ANYRES32=0x0, @ANYBLOB="0092000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 13:59:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff04ffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000004ffffffff000000000900010063616b65000000000c00020008000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x5fed8bed0a984a58, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$packet(r0, &(0x7f0000000240)="93a749700b71659fbc09a7b586dd", 0x36, 0x0, 0x0, 0x0) 13:59:08 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) 13:59:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff04ffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000004ffffffff000000000900010063616b65000000000c00020008000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x5fed8bed0a984a58, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$packet(r0, &(0x7f0000000240)="93a749700b71659fbc09a7b586dd", 0x36, 0x0, 0x0, 0x0) 13:59:08 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) 13:59:08 executing program 0: futex(0x0, 0xb, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x0) 13:59:08 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) 13:59:08 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) [ 856.482344][T22639] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 856.504294][T22637] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 856.567138][T22650] netlink: 'syz-executor.5': attribute type 19 has an invalid length. [ 856.575466][T22650] netlink: 'syz-executor.5': attribute type 18 has an invalid length. 13:59:08 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0xe) splice(r0, 0x0, r2, 0x0, 0x100000800ff01, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xfffffc8f) 13:59:08 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) 13:59:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff04ffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000004ffffffff000000000900010063616b65000000000c00020008000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x5fed8bed0a984a58, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$packet(r0, &(0x7f0000000240)="93a749700b71659fbc09a7b586dd", 0x36, 0x0, 0x0, 0x0) 13:59:08 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) 13:59:08 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_LP_INTERVAL={0x8}, @IFLA_BOND_MIN_LINKS={0x8}]}}}]}, 0x44}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000005000000000000000000", @ANYRES32=0x0, @ANYBLOB="0092000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 13:59:08 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) 13:59:08 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) 13:59:08 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) 13:59:08 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0xe) splice(r0, 0x0, r2, 0x0, 0x100000800ff01, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xfffffc8f) 13:59:08 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) [ 857.431188][T22675] netlink: 'syz-executor.5': attribute type 19 has an invalid length. [ 857.439572][T22675] netlink: 'syz-executor.5': attribute type 18 has an invalid length. 13:59:09 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 13:59:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) close(r0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="930c808c6d27810f334403e9", 0xc}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x3ff, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 13:59:09 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0xe) splice(r0, 0x0, r2, 0x0, 0x100000800ff01, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xfffffc8f) 13:59:09 executing program 3: syz_clone(0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3f) capset(&(0x7f0000000040)={0x20071026}, 0x0) 13:59:09 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 13:59:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) close(r0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="930c808c6d27810f334403e9", 0xc}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x3ff, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 857.821980][T22691] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure 13:59:09 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0xe) splice(r0, 0x0, r2, 0x0, 0x100000800ff01, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xfffffc8f) 13:59:09 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 13:59:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) close(r0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="930c808c6d27810f334403e9", 0xc}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x3ff, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 13:59:09 executing program 3: syz_clone(0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3f) capset(&(0x7f0000000040)={0x20071026}, 0x0) 13:59:09 executing program 5: syz_clone(0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3f) capset(&(0x7f0000000040)={0x20071026}, 0x0) 13:59:09 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 13:59:09 executing program 0: syz_clone(0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3f) capset(&(0x7f0000000040)={0x20071026}, 0x0) 13:59:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) close(r0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="930c808c6d27810f334403e9", 0xc}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x3ff, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 13:59:10 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0xe) splice(r0, 0x0, r2, 0x0, 0x100000800ff01, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xfffffc8f) 13:59:10 executing program 3: syz_clone(0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3f) capset(&(0x7f0000000040)={0x20071026}, 0x0) 13:59:10 executing program 5: syz_clone(0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3f) capset(&(0x7f0000000040)={0x20071026}, 0x0) 13:59:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) close(r0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="930c808c6d27810f334403e9", 0xc}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x3ff, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 13:59:10 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0xe) splice(r0, 0x0, r2, 0x0, 0x100000800ff01, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xfffffc8f) 13:59:10 executing program 0: syz_clone(0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3f) capset(&(0x7f0000000040)={0x20071026}, 0x0) 13:59:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) close(r0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="930c808c6d27810f334403e9", 0xc}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x3ff, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 13:59:10 executing program 3: syz_clone(0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3f) capset(&(0x7f0000000040)={0x20071026}, 0x0) 13:59:10 executing program 5: syz_clone(0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3f) capset(&(0x7f0000000040)={0x20071026}, 0x0) 13:59:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) close(r0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="930c808c6d27810f334403e9", 0xc}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) io_setup(0x3ff, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 13:59:10 executing program 3: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c09000f008000a000", 0x33a) 13:59:10 executing program 0: syz_clone(0x6000, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3f) capset(&(0x7f0000000040)={0x20071026}, 0x0) [ 859.262986][T22765] netlink: 'syz-executor.3': attribute type 15 has an invalid length. 13:59:10 executing program 3: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c09000f008000a000", 0x33a) 13:59:10 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x143042, 0x0) set_mempolicy(0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, 0x0) 13:59:10 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000180)=0x5, 0x4) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, 0x0) r1 = socket(0xa, 0x806, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = epoll_create1(0x0) dup2(r2, r1) 13:59:11 executing program 1: getresuid(0x0, 0x0, 0x0) [ 859.448863][T22779] netlink: 'syz-executor.3': attribute type 15 has an invalid length. 13:59:11 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000180)=0x5, 0x4) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, 0x0) r1 = socket(0xa, 0x806, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = epoll_create1(0x0) dup2(r2, r1) 13:59:11 executing program 1: r0 = socket(0x2b, 0x801, 0x1) mmap(&(0x7f000087d000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f000087cf79)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x0, 0x0, "0000000000000099010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000be4f28860000000000000000ffe300"}, 0xd8) 13:59:11 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x143042, 0x0) set_mempolicy(0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, 0x0) 13:59:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_NUM_PEER_NOTIF={0x5}, @IFLA_BOND_MODE={0x5, 0x11}]}}}]}, 0x44}}, 0x0) 13:59:11 executing program 3: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c09000f008000a000", 0x33a) 13:59:11 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000180)=0x5, 0x4) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, 0x0) r1 = socket(0xa, 0x806, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = epoll_create1(0x0) dup2(r2, r1) 13:59:11 executing program 1: r0 = socket(0x2b, 0x801, 0x1) mmap(&(0x7f000087d000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f000087cf79)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x0, 0x0, "0000000000000099010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000be4f28860000000000000000ffe300"}, 0xd8) 13:59:11 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000180)=0x5, 0x4) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, 0x0) r1 = socket(0xa, 0x806, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = epoll_create1(0x0) dup2(r2, r1) 13:59:11 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x143042, 0x0) set_mempolicy(0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, 0x0) 13:59:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_NUM_PEER_NOTIF={0x5}, @IFLA_BOND_MODE={0x5, 0x11}]}}}]}, 0x44}}, 0x0) 13:59:11 executing program 3: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c09000f008000a000", 0x33a) 13:59:11 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000180)=0x5, 0x4) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, 0x0) r1 = socket(0xa, 0x806, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = epoll_create1(0x0) dup2(r2, r1) [ 859.946776][T22787] netlink: 'syz-executor.3': attribute type 15 has an invalid length. 13:59:11 executing program 5: open(&(0x7f0000000080)='./bus\x00', 0x143042, 0x0) set_mempolicy(0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, 0x0) 13:59:11 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000180)=0x5, 0x4) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, 0x0) r1 = socket(0xa, 0x806, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = epoll_create1(0x0) dup2(r2, r1) 13:59:11 executing program 5: sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) syz_clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0], 0x1}, 0x58) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:59:11 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000180)=0x5, 0x4) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, 0x0) r1 = socket(0xa, 0x806, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = epoll_create1(0x0) dup2(r2, r1) [ 860.018481][T22803] netlink: 'syz-executor.3': attribute type 15 has an invalid length. 13:59:11 executing program 1: r0 = socket(0x2b, 0x801, 0x1) mmap(&(0x7f000087d000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f000087cf79)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x0, 0x0, "0000000000000099010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000be4f28860000000000000000ffe300"}, 0xd8) 13:59:11 executing program 2: r0 = socket(0x848000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) getsockname$packet(r0, 0x0, &(0x7f0000000140)) 13:59:11 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000b40)={@random="ff1bfc0d7bb3", @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "014b58", 0x18, 0x3a, 0xff, @remote, @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0x60, '\x00', @dev}}}}}}, 0x0) 13:59:11 executing program 5: sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) syz_clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0], 0x1}, 0x58) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:59:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_NUM_PEER_NOTIF={0x5}, @IFLA_BOND_MODE={0x5, 0x11}]}}}]}, 0x44}}, 0x0) 13:59:11 executing program 4: sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) syz_clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0], 0x1}, 0x58) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:59:11 executing program 1: r0 = socket(0x2b, 0x801, 0x1) mmap(&(0x7f000087d000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f000087cf79)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x0, 0x0, "0000000000000099010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000be4f28860000000000000000ffe300"}, 0xd8) 13:59:11 executing program 2: r0 = socket(0x848000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) getsockname$packet(r0, 0x0, &(0x7f0000000140)) 13:59:11 executing program 3: r0 = socket(0x848000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) getsockname$packet(r0, 0x0, &(0x7f0000000140)) 13:59:11 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @multicast}, 0x10) 13:59:11 executing program 5: sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) syz_clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0], 0x1}, 0x58) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:59:11 executing program 2: r0 = socket(0x848000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) getsockname$packet(r0, 0x0, &(0x7f0000000140)) 13:59:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_NUM_PEER_NOTIF={0x5}, @IFLA_BOND_MODE={0x5, 0x11}]}}}]}, 0x44}}, 0x0) 13:59:11 executing program 3: r0 = socket(0x848000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) getsockname$packet(r0, 0x0, &(0x7f0000000140)) 13:59:11 executing program 4: sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) syz_clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0], 0x1}, 0x58) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:59:11 executing program 3: r0 = socket(0x848000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) getsockname$packet(r0, 0x0, &(0x7f0000000140)) 13:59:11 executing program 2: r0 = socket(0x848000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) getsockname$packet(r0, 0x0, &(0x7f0000000140)) 13:59:11 executing program 3: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10010, &(0x7f00000000c0)=ANY=[], 0x5, 0x4f7, &(0x7f0000000500)="$eJzs3bFvW8cZAPCPlGjRsmzJrYe2aGvXdesWhimJtgXDS92lRWEYKGp06mCrEi0IIkVBlNxK8SCP2QPEQKbkT8gQIEMATxmyZUu2LM4QwEmMBHaADAzeI2XLMinJtkQm4u8HPL27e4/87iS8O/JIvQugZ52IiLWIOBARNyJiuFmeaW5xubEl5z16eHvq8cPbU5mo1699lUmPJ2Wx4TGJQ83nzEfEv/4e8d/M83FrK6tzk+VyabGZH12qLIzWVlbPzlYmZ0ozpflicWJ8YuziuQvFXWvr8cq7D/42e+XfH7z/m/sfr/35taRaQ68fTo9tbMduajQ9F0Mbyvoj4speBOuCvmZ7DnS7IryUbET8LCJOptf/cPSlf00AYD+r14ejPrwxDwDsd8n7/6HIZAvNuYChyGYLhcYc3rEYzJartaUzN6vL89ORzmGNRC57c7ZcGmvOFY5ELpPkx9P003xxU/5cRByNiDcGDqb5wlS1PN3NFz4A0MMObRr/vx1ojP8AwD6X73YFAICO2zz+t/i+LgCwz3j/DwC9x/gPAL3H+A8Avcf4DwC9Z9vx/05n6gEAdMQ/r15Ntvrj5v2vp2+tLM9Vb52dLtXmCpXlqcJUdXGhMFOtzqT37Kls93zlanVh/PyTbG1l9Xqlujy/dD29r/f1Um6P2wMAbO/o8XufZiJi7dLBdIsNazkYq2F/y3a7AkDX9HW7AkDXWO0Lepf3+MB2t/xq+xWhu7tfF6AzTv/S/D/0qpee//fBAfzkPTP/f2Snj/rLntQF6Czz/9C76vWMNf8BoMeY4wd28Pl/61N8/g8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAPG0q3TLbQXNJ7KLLZQiHicESMRC5zc7ZcGmsuDfzJQG4gyY93u9IAwCvKfpFprP81cHr41NDmowcy3w2k+4j431vX3vz/5NLS4nhS/vWT8qW7zfJiN+oPAGxnfZxeH8fXPXp4e2p962R9Dv61sbhoEvdxc2sc6Y/+dJ+PXEQMfpNp5huS1yx9uxB/7U5E/KJV+zPp3MhIUrkW8ZPYhzsaP/tM/Gx6LNnn0t/Fz3ehLtBr7iX9z+VW1182TqT71td/Pu2hXt2DZv/X6PuevcLX+7++Nv3fiZ3GOP/hP54rrA83jt2J+FX/evyN/e/6cs/5NNUq/qmtguafJj/79W9Ptjut/nbE6dgqfiXtZkeXKgujtZXVs7OVyZnSTGm+WJwYnxi7eO5CcTSdo278/KhVjC8vnTnSLn7S/sE28fPbtP8PW7V/g3e+v/Gf320R/0+/bxU/G8e2iJ+MiX/cYfzJwffy7Y4l8afbtL9/i/hJ2Zkdxr//+er0Dk8FADqgtrI6N1kulxZfKFFMXlW88KPaJer1en03nmdXEuWI+BFUQ0Kiu4lu90zAXnt60Xe7JgAAAAAAAAAAAAAAQDu1ldW5gdjbfyfqdhsBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYv34IAAD//ztv1CI=") chdir(&(0x7f0000000040)='./file0\x00') removexattr(&(0x7f0000000080)='.\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00') 13:59:11 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @multicast}, 0x10) 13:59:11 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @multicast}, 0x10) 13:59:11 executing program 4: sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) syz_clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0], 0x1}, 0x58) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 13:59:11 executing program 5: sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) syz_clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0], 0x1}, 0x58) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) [ 860.268013][T22835] batadv_slave_1: entered promiscuous mode [ 860.274047][T22832] batadv_slave_1: left promiscuous mode [ 860.289544][T22851] loop3: detected capacity change from 0 to 512 13:59:11 executing program 0: accept(0xffffffffffffffff, &(0x7f0000000340)=@tipc, &(0x7f0000000080)=0x80) r0 = socket(0xa, 0x2, 0x3a) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg$rds(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)=""/198, 0xc6}], 0x1, &(0x7f0000000240)=[@cswp={0x58, 0x29, 0xc6, {{}, 0x0, 0x0}}], 0x58}, 0x0) 13:59:11 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @multicast}, 0x10) [ 860.334005][T22856] batadv_slave_1: entered promiscuous mode [ 860.340314][T22852] batadv_slave_1: left promiscuous mode [ 860.346629][T22855] batadv_slave_1: entered promiscuous mode [ 860.370568][T22864] batadv_slave_1: entered promiscuous mode 13:59:12 executing program 0: accept(0xffffffffffffffff, &(0x7f0000000340)=@tipc, &(0x7f0000000080)=0x80) r0 = socket(0xa, 0x2, 0x3a) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg$rds(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)=""/198, 0xc6}], 0x1, &(0x7f0000000240)=[@cswp={0x58, 0x29, 0xc6, {{}, 0x0, 0x0}}], 0x58}, 0x0) 13:59:12 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @multicast}, 0x10) [ 860.377206][ T25] audit: type=1400 audit(1683208751.945:155080): avc: denied { connect } for pid=22862 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 860.380210][T22863] batadv_slave_1: left promiscuous mode [ 860.403162][T22853] batadv_slave_1: left promiscuous mode [ 860.406731][ T25] audit: type=1400 audit(1683208751.965:155081): avc: denied { write } for pid=22862 comm="syz-executor.0" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 13:59:12 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @multicast}, 0x10) 13:59:12 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 13:59:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x23d) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) [ 860.440133][T22851] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 860.444141][T22868] batadv_slave_1: entered promiscuous mode [ 860.463503][T22867] batadv_slave_1: left promiscuous mode [ 860.472047][T22851] ext4 filesystem being mounted at /root/syzkaller-testdir2873134436/syzkaller.L2VnsO/863/file0 supports timestamps until 2038-01-19 (0x7fffffff) 13:59:12 executing program 3: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10010, &(0x7f00000000c0)=ANY=[], 0x5, 0x4f7, &(0x7f0000000500)="$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") chdir(&(0x7f0000000040)='./file0\x00') removexattr(&(0x7f0000000080)='.\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00') 13:59:12 executing program 0: accept(0xffffffffffffffff, &(0x7f0000000340)=@tipc, &(0x7f0000000080)=0x80) r0 = socket(0xa, 0x2, 0x3a) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg$rds(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)=""/198, 0xc6}], 0x1, &(0x7f0000000240)=[@cswp={0x58, 0x29, 0xc6, {{}, 0x0, 0x0}}], 0x58}, 0x0) 13:59:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x5, "3185c6eabcf8d5ecf2d0a540a39373623932f3ee9d0bd3037394b169d0e7e82b", "752d27e4260532ea70f5846046175732970da28b78ad33509e15f2af0a2cd05b", "f0198d2f18b1dc67eb78beac45d0982ad85b9dc9a4fada2383280a819f96e0a8", "b5ac8ec35f344226d35f659c7096fc61cf62c71eb0b59663a415fda9f3080860", "a1be7fabbc172b23a3245c0ba4b051ce57a4725ed419c7870b62201f16ea21cc", "a772adfcd5dae1a11f3007a5"}}) 13:59:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x23d) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 13:59:12 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) [ 860.521668][T22875] batadv_slave_1: entered promiscuous mode [ 860.533433][T22873] batadv_slave_1: left promiscuous mode [ 860.541866][ T25] audit: type=1400 audit(1683208752.105:155082): avc: denied { setattr } for pid=22850 comm="syz-executor.3" name="file0" dev="loop3" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 13:59:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x23d) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 13:59:12 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @multicast}, 0x10) 13:59:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x5, "3185c6eabcf8d5ecf2d0a540a39373623932f3ee9d0bd3037394b169d0e7e82b", "752d27e4260532ea70f5846046175732970da28b78ad33509e15f2af0a2cd05b", "f0198d2f18b1dc67eb78beac45d0982ad85b9dc9a4fada2383280a819f96e0a8", "b5ac8ec35f344226d35f659c7096fc61cf62c71eb0b59663a415fda9f3080860", "a1be7fabbc172b23a3245c0ba4b051ce57a4725ed419c7870b62201f16ea21cc", "a772adfcd5dae1a11f3007a5"}}) 13:59:12 executing program 0: accept(0xffffffffffffffff, &(0x7f0000000340)=@tipc, &(0x7f0000000080)=0x80) r0 = socket(0xa, 0x2, 0x3a) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg$rds(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)=""/198, 0xc6}], 0x1, &(0x7f0000000240)=[@cswp={0x58, 0x29, 0xc6, {{}, 0x0, 0x0}}], 0x58}, 0x0) 13:59:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x23d) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) [ 860.576577][ T3448] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 860.616068][T22887] batadv_slave_1: entered promiscuous mode 13:59:12 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 13:59:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x5, "3185c6eabcf8d5ecf2d0a540a39373623932f3ee9d0bd3037394b169d0e7e82b", "752d27e4260532ea70f5846046175732970da28b78ad33509e15f2af0a2cd05b", "f0198d2f18b1dc67eb78beac45d0982ad85b9dc9a4fada2383280a819f96e0a8", "b5ac8ec35f344226d35f659c7096fc61cf62c71eb0b59663a415fda9f3080860", "a1be7fabbc172b23a3245c0ba4b051ce57a4725ed419c7870b62201f16ea21cc", "a772adfcd5dae1a11f3007a5"}}) [ 860.633292][T22885] batadv_slave_1: left promiscuous mode [ 860.673841][T22898] loop3: detected capacity change from 0 to 512 13:59:12 executing program 3: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10010, &(0x7f00000000c0)=ANY=[], 0x5, 0x4f7, &(0x7f0000000500)="$eJzs3bFvW8cZAPCPlGjRsmzJrYe2aGvXdesWhimJtgXDS92lRWEYKGp06mCrEi0IIkVBlNxK8SCP2QPEQKbkT8gQIEMATxmyZUu2LM4QwEmMBHaADAzeI2XLMinJtkQm4u8HPL27e4/87iS8O/JIvQugZ52IiLWIOBARNyJiuFmeaW5xubEl5z16eHvq8cPbU5mo1699lUmPJ2Wx4TGJQ83nzEfEv/4e8d/M83FrK6tzk+VyabGZH12qLIzWVlbPzlYmZ0ozpflicWJ8YuziuQvFXWvr8cq7D/42e+XfH7z/m/sfr/35taRaQ68fTo9tbMduajQ9F0Mbyvoj4speBOuCvmZ7DnS7IryUbET8LCJOptf/cPSlf00AYD+r14ejPrwxDwDsd8n7/6HIZAvNuYChyGYLhcYc3rEYzJartaUzN6vL89ORzmGNRC57c7ZcGmvOFY5ELpPkx9P003xxU/5cRByNiDcGDqb5wlS1PN3NFz4A0MMObRr/vx1ojP8AwD6X73YFAICO2zz+t/i+LgCwz3j/DwC9x/gPAL3H+A8Avcf4DwC9Z9vx/05n6gEAdMQ/r15Ntvrj5v2vp2+tLM9Vb52dLtXmCpXlqcJUdXGhMFOtzqT37Kls93zlanVh/PyTbG1l9Xqlujy/dD29r/f1Um6P2wMAbO/o8XufZiJi7dLBdIsNazkYq2F/y3a7AkDX9HW7AkDXWO0Lepf3+MB2t/xq+xWhu7tfF6AzTv/S/D/0qpee//fBAfzkPTP/f2Snj/rLntQF6Czz/9C76vWMNf8BoMeY4wd28Pl/61N8/g8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAPG0q3TLbQXNJ7KLLZQiHicESMRC5zc7ZcGmsuDfzJQG4gyY93u9IAwCvKfpFprP81cHr41NDmowcy3w2k+4j431vX3vz/5NLS4nhS/vWT8qW7zfJiN+oPAGxnfZxeH8fXPXp4e2p962R9Dv61sbhoEvdxc2sc6Y/+dJ+PXEQMfpNp5huS1yx9uxB/7U5E/KJV+zPp3MhIUrkW8ZPYhzsaP/tM/Gx6LNnn0t/Fz3ehLtBr7iX9z+VW1182TqT71td/Pu2hXt2DZv/X6PuevcLX+7++Nv3fiZ3GOP/hP54rrA83jt2J+FX/evyN/e/6cs/5NNUq/qmtguafJj/79W9Ptjut/nbE6dgqfiXtZkeXKgujtZXVs7OVyZnSTGm+WJwYnxi7eO5CcTSdo278/KhVjC8vnTnSLn7S/sE28fPbtP8PW7V/g3e+v/Gf320R/0+/bxU/G8e2iJ+MiX/cYfzJwffy7Y4l8afbtL9/i/hJ2Zkdxr//+er0Dk8FADqgtrI6N1kulxZfKFFMXlW88KPaJer1en03nmdXEuWI+BFUQ0Kiu4lu90zAXnt60Xe7JgAAAAAAAAAAAAAAQDu1ldW5gdjbfyfqdhsBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYv34IAAD//ztv1CI=") chdir(&(0x7f0000000040)='./file0\x00') removexattr(&(0x7f0000000080)='.\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00') 13:59:12 executing program 5: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10010, &(0x7f00000000c0)=ANY=[], 0x5, 0x4f7, &(0x7f0000000500)="$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") chdir(&(0x7f0000000040)='./file0\x00') removexattr(&(0x7f0000000080)='.\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00') 13:59:12 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000130000000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x1503, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r1, 0x13, &(0x7f0000001580)=[0x0, 0xffffffff], 0x2) 13:59:12 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000280)=""/38, 0x26}, {&(0x7f0000000580)=""/202, 0xca}, {&(0x7f0000000680)=""/134, 0x86}], 0x3) 13:59:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x5, "3185c6eabcf8d5ecf2d0a540a39373623932f3ee9d0bd3037394b169d0e7e82b", "752d27e4260532ea70f5846046175732970da28b78ad33509e15f2af0a2cd05b", "f0198d2f18b1dc67eb78beac45d0982ad85b9dc9a4fada2383280a819f96e0a8", "b5ac8ec35f344226d35f659c7096fc61cf62c71eb0b59663a415fda9f3080860", "a1be7fabbc172b23a3245c0ba4b051ce57a4725ed419c7870b62201f16ea21cc", "a772adfcd5dae1a11f3007a5"}}) 13:59:12 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) [ 860.721669][T22898] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 860.733874][T22898] ext4 filesystem being mounted at /root/syzkaller-testdir2873134436/syzkaller.L2VnsO/864/file0 supports timestamps until 2038-01-19 (0x7fffffff) 13:59:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x7}, @NFULA_CFG_CMD={0x5}]}, 0x24}}, 0x0) [ 860.770806][ T3448] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 860.784198][T22912] loop5: detected capacity change from 0 to 512 13:59:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x7}, @NFULA_CFG_CMD={0x5}]}, 0x24}}, 0x0) 13:59:12 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000130000000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x1503, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r1, 0x13, &(0x7f0000001580)=[0x0, 0xffffffff], 0x2) 13:59:12 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) sendmsg$802154_dgram(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x24, @none={0x2}}, 0x14, &(0x7f00000001c0)={0x0}}, 0x0) 13:59:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x7}, @NFULA_CFG_CMD={0x5}]}, 0x24}}, 0x0) [ 860.816056][T22915] loop3: detected capacity change from 0 to 512 [ 860.839981][T22912] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 13:59:12 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000130000000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x1503, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r1, 0x13, &(0x7f0000001580)=[0x0, 0xffffffff], 0x2) [ 860.858402][ T25] audit: type=1400 audit(1683208752.425:155083): avc: denied { bind } for pid=22919 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 860.877652][T22912] ext4 filesystem being mounted at /root/syzkaller-testdir4137457173/syzkaller.M6BKjP/802/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 860.902484][ T25] audit: type=1400 audit(1683208752.445:155084): avc: denied { write } for pid=22919 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 860.905447][T22915] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 860.942690][T22915] ext4 filesystem being mounted at /root/syzkaller-testdir2873134436/syzkaller.L2VnsO/865/file0 supports timestamps until 2038-01-19 (0x7fffffff) 13:59:12 executing program 3: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10010, &(0x7f00000000c0)=ANY=[], 0x5, 0x4f7, &(0x7f0000000500)="$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") chdir(&(0x7f0000000040)='./file0\x00') removexattr(&(0x7f0000000080)='.\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00') 13:59:12 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) sendmsg$802154_dgram(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x24, @none={0x2}}, 0x14, &(0x7f00000001c0)={0x0}}, 0x0) 13:59:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x7}, @NFULA_CFG_CMD={0x5}]}, 0x24}}, 0x0) [ 860.980765][ T3410] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 860.998753][ T3448] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 861.036778][T22937] loop3: detected capacity change from 0 to 512 [ 861.046577][T22937] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 861.058915][T22937] ext4 filesystem being mounted at /root/syzkaller-testdir2873134436/syzkaller.L2VnsO/866/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 861.088710][ T3448] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:59:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x176}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f0000000280)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) sched_setscheduler(0x0, 0x1, &(0x7f0000000540)=0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 13:59:13 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000130000000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x1503, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r1, 0x13, &(0x7f0000001580)=[0x0, 0xffffffff], 0x2) 13:59:13 executing program 5: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10010, &(0x7f00000000c0)=ANY=[], 0x5, 0x4f7, &(0x7f0000000500)="$eJzs3bFvW8cZAPCPlGjRsmzJrYe2aGvXdesWhimJtgXDS92lRWEYKGp06mCrEi0IIkVBlNxK8SCP2QPEQKbkT8gQIEMATxmyZUu2LM4QwEmMBHaADAzeI2XLMinJtkQm4u8HPL27e4/87iS8O/JIvQugZ52IiLWIOBARNyJiuFmeaW5xubEl5z16eHvq8cPbU5mo1699lUmPJ2Wx4TGJQ83nzEfEv/4e8d/M83FrK6tzk+VyabGZH12qLIzWVlbPzlYmZ0ozpflicWJ8YuziuQvFXWvr8cq7D/42e+XfH7z/m/sfr/35taRaQ68fTo9tbMduajQ9F0Mbyvoj4speBOuCvmZ7DnS7IryUbET8LCJOptf/cPSlf00AYD+r14ejPrwxDwDsd8n7/6HIZAvNuYChyGYLhcYc3rEYzJartaUzN6vL89ORzmGNRC57c7ZcGmvOFY5ELpPkx9P003xxU/5cRByNiDcGDqb5wlS1PN3NFz4A0MMObRr/vx1ojP8AwD6X73YFAICO2zz+t/i+LgCwz3j/DwC9x/gPAL3H+A8Avcf4DwC9Z9vx/05n6gEAdMQ/r15Ntvrj5v2vp2+tLM9Vb52dLtXmCpXlqcJUdXGhMFOtzqT37Kls93zlanVh/PyTbG1l9Xqlujy/dD29r/f1Um6P2wMAbO/o8XufZiJi7dLBdIsNazkYq2F/y3a7AkDX9HW7AkDXWO0Lepf3+MB2t/xq+xWhu7tfF6AzTv/S/D/0qpee//fBAfzkPTP/f2Snj/rLntQF6Czz/9C76vWMNf8BoMeY4wd28Pl/61N8/g8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAPG0q3TLbQXNJ7KLLZQiHicESMRC5zc7ZcGmsuDfzJQG4gyY93u9IAwCvKfpFprP81cHr41NDmowcy3w2k+4j431vX3vz/5NLS4nhS/vWT8qW7zfJiN+oPAGxnfZxeH8fXPXp4e2p962R9Dv61sbhoEvdxc2sc6Y/+dJ+PXEQMfpNp5huS1yx9uxB/7U5E/KJV+zPp3MhIUrkW8ZPYhzsaP/tM/Gx6LNnn0t/Fz3ehLtBr7iX9z+VW1182TqT71td/Pu2hXt2DZv/X6PuevcLX+7++Nv3fiZ3GOP/hP54rrA83jt2J+FX/evyN/e/6cs/5NNUq/qmtguafJj/79W9Ptjut/nbE6dgqfiXtZkeXKgujtZXVs7OVyZnSTGm+WJwYnxi7eO5CcTSdo278/KhVjC8vnTnSLn7S/sE28fPbtP8PW7V/g3e+v/Gf320R/0+/bxU/G8e2iJ+MiX/cYfzJwffy7Y4l8afbtL9/i/hJ2Zkdxr//+er0Dk8FADqgtrI6N1kulxZfKFFMXlW88KPaJer1en03nmdXEuWI+BFUQ0Kiu4lu90zAXnt60Xe7JgAAAAAAAAAAAAAAQDu1ldW5gdjbfyfqdhsBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYv34IAAD//ztv1CI=") chdir(&(0x7f0000000040)='./file0\x00') removexattr(&(0x7f0000000080)='.\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00') 13:59:13 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) sendmsg$802154_dgram(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x24, @none={0x2}}, 0x14, &(0x7f00000001c0)={0x0}}, 0x0) 13:59:13 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) sendmsg$802154_dgram(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x24, @none={0x2}}, 0x14, &(0x7f00000001c0)={0x0}}, 0x0) 13:59:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x9}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r3}, 0x8) 13:59:13 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) sendmsg$802154_dgram(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x24, @none={0x2}}, 0x14, &(0x7f00000001c0)={0x0}}, 0x0) 13:59:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x9}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r3}, 0x8) 13:59:13 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) sendmsg$802154_dgram(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x24, @none={0x2}}, 0x14, &(0x7f00000001c0)={0x0}}, 0x0) 13:59:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x9}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r3}, 0x8) 13:59:13 executing program 4: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000100)={[{@fat=@fmask}, {@fat=@tz_utc}, {@fat=@uid}, {@nodots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@nfs}]}, 0x1, 0x560, &(0x7f00000005c0)="$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") mkdir(&(0x7f0000000140)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') [ 861.623064][T22944] loop5: detected capacity change from 0 to 512 13:59:13 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) sendmsg$802154_dgram(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x24, @none={0x2}}, 0x14, &(0x7f00000001c0)={0x0}}, 0x0) [ 861.669809][T22944] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 861.690445][T22944] ext4 filesystem being mounted at /root/syzkaller-testdir4137457173/syzkaller.M6BKjP/803/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 861.768579][T22965] loop4: detected capacity change from 0 to 2048 [ 861.982786][ T3410] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:59:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x176}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f0000000280)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) sched_setscheduler(0x0, 0x1, &(0x7f0000000540)=0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 13:59:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x9}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r3}, 0x8) 13:59:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x9}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r3}, 0x8) 13:59:14 executing program 5: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10010, &(0x7f00000000c0)=ANY=[], 0x5, 0x4f7, &(0x7f0000000500)="$eJzs3bFvW8cZAPCPlGjRsmzJrYe2aGvXdesWhimJtgXDS92lRWEYKGp06mCrEi0IIkVBlNxK8SCP2QPEQKbkT8gQIEMATxmyZUu2LM4QwEmMBHaADAzeI2XLMinJtkQm4u8HPL27e4/87iS8O/JIvQugZ52IiLWIOBARNyJiuFmeaW5xubEl5z16eHvq8cPbU5mo1699lUmPJ2Wx4TGJQ83nzEfEv/4e8d/M83FrK6tzk+VyabGZH12qLIzWVlbPzlYmZ0ozpflicWJ8YuziuQvFXWvr8cq7D/42e+XfH7z/m/sfr/35taRaQ68fTo9tbMduajQ9F0Mbyvoj4speBOuCvmZ7DnS7IryUbET8LCJOptf/cPSlf00AYD+r14ejPrwxDwDsd8n7/6HIZAvNuYChyGYLhcYc3rEYzJartaUzN6vL89ORzmGNRC57c7ZcGmvOFY5ELpPkx9P003xxU/5cRByNiDcGDqb5wlS1PN3NFz4A0MMObRr/vx1ojP8AwD6X73YFAICO2zz+t/i+LgCwz3j/DwC9x/gPAL3H+A8Avcf4DwC9Z9vx/05n6gEAdMQ/r15Ntvrj5v2vp2+tLM9Vb52dLtXmCpXlqcJUdXGhMFOtzqT37Kls93zlanVh/PyTbG1l9Xqlujy/dD29r/f1Um6P2wMAbO/o8XufZiJi7dLBdIsNazkYq2F/y3a7AkDX9HW7AkDXWO0Lepf3+MB2t/xq+xWhu7tfF6AzTv/S/D/0qpee//fBAfzkPTP/f2Snj/rLntQF6Czz/9C76vWMNf8BoMeY4wd28Pl/61N8/g8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAPG0q3TLbQXNJ7KLLZQiHicESMRC5zc7ZcGmsuDfzJQG4gyY93u9IAwCvKfpFprP81cHr41NDmowcy3w2k+4j431vX3vz/5NLS4nhS/vWT8qW7zfJiN+oPAGxnfZxeH8fXPXp4e2p962R9Dv61sbhoEvdxc2sc6Y/+dJ+PXEQMfpNp5huS1yx9uxB/7U5E/KJV+zPp3MhIUrkW8ZPYhzsaP/tM/Gx6LNnn0t/Fz3ehLtBr7iX9z+VW1182TqT71td/Pu2hXt2DZv/X6PuevcLX+7++Nv3fiZ3GOP/hP54rrA83jt2J+FX/evyN/e/6cs/5NNUq/qmtguafJj/79W9Ptjut/nbE6dgqfiXtZkeXKgujtZXVs7OVyZnSTGm+WJwYnxi7eO5CcTSdo278/KhVjC8vnTnSLn7S/sE28fPbtP8PW7V/g3e+v/Gf320R/0+/bxU/G8e2iJ+MiX/cYfzJwffy7Y4l8afbtL9/i/hJ2Zkdxr//+er0Dk8FADqgtrI6N1kulxZfKFFMXlW88KPaJer1en03nmdXEuWI+BFUQ0Kiu4lu90zAXnt60Xe7JgAAAAAAAAAAAAAAQDu1ldW5gdjbfyfqdhsBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYv34IAAD//ztv1CI=") chdir(&(0x7f0000000040)='./file0\x00') removexattr(&(0x7f0000000080)='.\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00') 13:59:14 executing program 4: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000100)={[{@fat=@fmask}, {@fat=@tz_utc}, {@fat=@uid}, {@nodots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@nfs}]}, 0x1, 0x560, &(0x7f00000005c0)="$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") mkdir(&(0x7f0000000140)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') 13:59:14 executing program 1: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000100)={[{@fat=@fmask}, {@fat=@tz_utc}, {@fat=@uid}, {@nodots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@nfs}]}, 0x1, 0x560, &(0x7f00000005c0)="$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") mkdir(&(0x7f0000000140)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') 13:59:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x9}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r3}, 0x8) 13:59:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x9}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r3}, 0x8) [ 862.507297][T22977] loop5: detected capacity change from 0 to 512 [ 862.516253][T22975] loop4: detected capacity change from 0 to 2048 13:59:14 executing program 4: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000100)={[{@fat=@fmask}, {@fat=@tz_utc}, {@fat=@uid}, {@nodots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@nfs}]}, 0x1, 0x560, &(0x7f00000005c0)="$eJzs2kGLEm8cB/Bn1b8re/l7jg4DXTot1StIYoNICIw5FB0aWDvkRDADMXppX0ivoNfTK/EQezN0xF3bNkgcx/LzAXm++lX8PRdnhOft3Q+j84/5uzffvoTO4yi0QgiNyxC6oRGaoXS0XBuL3A7XXQQA4G8zGCS9umdgG1q3NlnWS+b3cMc3mvhrxUMBAAAAAAAAAABQEef/AeDwOP//78uyXtJe3r+tc/4fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAqM/lbPb/7DePuucDALbP9R8ADs8fXv9bq9Te+agAwJb4/w8Ah+flq9fPe/3+2SCKOiFML4q4iMu17J8+6589iBa6V5+aFkXcXPUPyz5a7/8LJ8v+0S/7drh/r+zn3ZMX/Z/643Be/fYBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAa06jle7Vq9OiiJtlf3pbP18/tcvn5RvW+1a409rVLgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBtyMeTUZKmw6yy8DmMTyr+ig3D0X6McSN09mMMYcPw/vtsYV/m2SzU/csEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADUJR9PRkmaDrO87kkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgH2RjyejJE2HWYWh7j0CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwez8CAAD//y5rkz8=") mkdir(&(0x7f0000000140)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') 13:59:14 executing program 1: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000100)={[{@fat=@fmask}, {@fat=@tz_utc}, {@fat=@uid}, {@nodots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@nfs}]}, 0x1, 0x560, &(0x7f00000005c0)="$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") mkdir(&(0x7f0000000140)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') 13:59:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000100)={[{@fat=@fmask}, {@fat=@tz_utc}, {@fat=@uid}, {@nodots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@nfs}]}, 0x1, 0x560, &(0x7f00000005c0)="$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") mkdir(&(0x7f0000000140)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') [ 862.668075][T22986] loop4: detected capacity change from 0 to 2048 [ 862.686836][T22977] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 862.702623][T22977] ext4 filesystem being mounted at /root/syzkaller-testdir4137457173/syzkaller.M6BKjP/804/file0 supports timestamps until 2038-01-19 (0x7fffffff) 13:59:14 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000300)={0x6, 0x8}, 0x0) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/1817], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pidfd_open(r0, 0x0) [ 862.803165][T22992] loop2: detected capacity change from 0 to 2048 [ 862.864518][ T3410] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:59:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x176}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f0000000280)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) sched_setscheduler(0x0, 0x1, &(0x7f0000000540)=0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 13:59:14 executing program 1: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000100)={[{@fat=@fmask}, {@fat=@tz_utc}, {@fat=@uid}, {@nodots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@nfs}]}, 0x1, 0x560, &(0x7f00000005c0)="$eJzs2kGLEm8cB/Bn1b8re/l7jg4DXTot1StIYoNICIw5FB0aWDvkRDADMXppX0ivoNfTK/EQezN0xF3bNkgcx/LzAXm++lX8PRdnhOft3Q+j84/5uzffvoTO4yi0QgiNyxC6oRGaoXS0XBuL3A7XXQQA4G8zGCS9umdgG1q3NlnWS+b3cMc3mvhrxUMBAAAAAAAAAABQEef/AeDwOP//78uyXtJe3r+tc/4fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAqM/lbPb/7DePuucDALbP9R8ADs8fXv9bq9Te+agAwJb4/w8Ah+flq9fPe/3+2SCKOiFML4q4iMu17J8+6589iBa6V5+aFkXcXPUPyz5a7/8LJ8v+0S/7drh/r+zn3ZMX/Z/643Be/fYBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAa06jle7Vq9OiiJtlf3pbP18/tcvn5RvW+1a409rVLgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBtyMeTUZKmw6yy8DmMTyr+ig3D0X6McSN09mMMYcPw/vtsYV/m2SzU/csEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADUJR9PRkmaDrO87kkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgH2RjyejJE2HWYWh7j0CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwez8CAAD//y5rkz8=") mkdir(&(0x7f0000000140)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') 13:59:14 executing program 3: setuid(0xee01) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f00000001c0)='=', 0x1) 13:59:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000100)={[{@fat=@fmask}, {@fat=@tz_utc}, {@fat=@uid}, {@nodots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@nfs}]}, 0x1, 0x560, &(0x7f00000005c0)="$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") mkdir(&(0x7f0000000140)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') 13:59:14 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000300)={0x6, 0x8}, 0x0) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/1817], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pidfd_open(r0, 0x0) 13:59:14 executing program 4: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000100)={[{@fat=@fmask}, {@fat=@tz_utc}, {@fat=@uid}, {@nodots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@nfs}]}, 0x1, 0x560, &(0x7f00000005c0)="$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") mkdir(&(0x7f0000000140)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') 13:59:14 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000300)={0x6, 0x8}, 0x0) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/1817], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pidfd_open(r0, 0x0) 13:59:14 executing program 3: setuid(0xee01) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f00000001c0)='=', 0x1) 13:59:15 executing program 3: setuid(0xee01) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f00000001c0)='=', 0x1) 13:59:15 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000300)={0x6, 0x8}, 0x0) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/1817], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pidfd_open(r0, 0x0) [ 863.392851][T23001] loop2: detected capacity change from 0 to 2048 [ 863.402976][T23005] loop4: detected capacity change from 0 to 2048 13:59:15 executing program 2: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000100)={[{@fat=@fmask}, {@fat=@tz_utc}, {@fat=@uid}, {@nodots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@nfs}]}, 0x1, 0x560, &(0x7f00000005c0)="$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") mkdir(&(0x7f0000000140)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') 13:59:15 executing program 4: prlimit64(0x0, 0x7, &(0x7f0000000300)={0x6, 0x8}, 0x0) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/1817], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pidfd_open(r0, 0x0) [ 863.683890][T23022] loop2: detected capacity change from 0 to 2048 13:59:15 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x176}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f0000000280)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) sched_setscheduler(0x0, 0x1, &(0x7f0000000540)=0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 13:59:15 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000001040)=[{0x0, 0xf02}], 0x1) 13:59:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1027f2", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 13:59:15 executing program 3: setuid(0xee01) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f00000001c0)='=', 0x1) 13:59:15 executing program 4: prlimit64(0x0, 0x7, &(0x7f0000000300)={0x6, 0x8}, 0x0) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/1817], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pidfd_open(r0, 0x0) 13:59:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x25, 0x0, 0x1, 0xfffffffe}, {}, {0x6, 0x0, 0x0, 0xffffff97}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) 13:59:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) mmap(&(0x7f0000297000/0x4000)=nil, 0x4000, 0xc, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ff00000000001fff00"/56, @ANYRES32=0x0, @ANYBLOB="e1ff004900000000c72569b211f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r2, 0x0, 0x21fd1ee9) 13:59:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x25, 0x0, 0x1, 0xfffffffe}, {}, {0x6, 0x0, 0x0, 0xffffff97}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) 13:59:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x25, 0x0, 0x1, 0xfffffffe}, {}, {0x6, 0x0, 0x0, 0xffffff97}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) 13:59:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7fffffff}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}]}, 0x38}}, 0x0) 13:59:15 executing program 4: prlimit64(0x0, 0x7, &(0x7f0000000300)={0x6, 0x8}, 0x0) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/1817], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pidfd_open(r0, 0x0) 13:59:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7fffffff}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}]}, 0x38}}, 0x0) 13:59:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x25, 0x0, 0x1, 0xfffffffe}, {}, {0x6, 0x0, 0x0, 0xffffff97}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) 13:59:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x25, 0x0, 0x1, 0xfffffffe}, {}, {0x6, 0x0, 0x0, 0xffffff97}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) 13:59:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x2000480, &(0x7f00000000c0)=ANY=[], 0x1, 0x7b1, &(0x7f00000007c0)="$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") open(&(0x7f0000007f80)='./bus\x00', 0x143042, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x4102, 0x0) preadv2(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/76, 0x7ffff050}], 0x3, 0x0, 0x0, 0x3) 13:59:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7fffffff}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}]}, 0x38}}, 0x0) 13:59:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x52}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x25, 0x0, 0x1, 0xfffffffe}, {}, {0x6, 0x0, 0x0, 0xffffff97}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) 13:59:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) mmap(&(0x7f0000297000/0x4000)=nil, 0x4000, 0xc, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ff00000000001fff00"/56, @ANYRES32=0x0, @ANYBLOB="e1ff004900000000c72569b211f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r2, 0x0, 0x21fd1ee9) 13:59:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7fffffff}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}]}, 0x38}}, 0x0) 13:59:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x52}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x25, 0x0, 0x1, 0xfffffffe}, {}, {0x6, 0x0, 0x0, 0xffffff97}]}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) 13:59:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x8, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:59:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x8, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:59:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) mmap(&(0x7f0000297000/0x4000)=nil, 0x4000, 0xc, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ff00000000001fff00"/56, @ANYRES32=0x0, @ANYBLOB="e1ff004900000000c72569b211f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r2, 0x0, 0x21fd1ee9) 13:59:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x52}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 865.162790][T23055] loop4: detected capacity change from 0 to 2048 [ 865.188998][T23055] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 13:59:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x2000480, &(0x7f00000000c0)=ANY=[], 0x1, 0x7b1, &(0x7f00000007c0)="$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") open(&(0x7f0000007f80)='./bus\x00', 0x143042, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x4102, 0x0) preadv2(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/76, 0x7ffff050}], 0x3, 0x0, 0x0, 0x3) 13:59:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x52}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:59:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) mmap(&(0x7f0000297000/0x4000)=nil, 0x4000, 0xc, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ff00000000001fff00"/56, @ANYRES32=0x0, @ANYBLOB="e1ff004900000000c72569b211f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r2, 0x0, 0x21fd1ee9) 13:59:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x8, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 865.360312][ T3443] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 865.439220][T23092] loop4: detected capacity change from 0 to 2048 [ 865.468197][T23092] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 865.509830][T23096] ================================================================== [ 865.517951][T23096] BUG: KCSAN: data-race in generic_write_end / next_uptodate_page [ 865.525828][T23096] [ 865.528173][T23096] write to 0xffff888109fff680 of 8 bytes by task 23077 on cpu 1: [ 865.535904][T23096] generic_write_end+0xb4/0x360 [ 865.540771][T23096] ext4_da_write_end+0x4df/0x690 [ 865.545730][T23096] generic_perform_write+0x253/0x3d0 [ 865.551045][T23096] ext4_buffered_write_iter+0x234/0x3e0 [ 865.556597][T23096] ext4_file_write_iter+0xd7/0x10e0 [ 865.561836][T23096] vfs_write+0x463/0x760 [ 865.566098][T23096] ksys_write+0xeb/0x1a0 [ 865.570355][T23096] __x64_sys_write+0x42/0x50 [ 865.574966][T23096] do_syscall_64+0x41/0xc0 [ 865.579422][T23096] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 865.585348][T23096] [ 865.587687][T23096] read to 0xffff888109fff680 of 8 bytes by task 23096 on cpu 0: [ 865.595326][T23096] next_uptodate_page+0x47b/0x560 [ 865.600358][T23096] filemap_map_pages+0x73c/0x860 [ 865.605314][T23096] handle_mm_fault+0x1120/0x2c60 [ 865.610277][T23096] __get_user_pages+0x363/0xc30 [ 865.615136][T23096] __mm_populate+0x23d/0x370 [ 865.619752][T23096] vm_mmap_pgoff+0x1a3/0x240 [ 865.624351][T23096] ksys_mmap_pgoff+0x2ac/0x320 [ 865.629130][T23096] do_syscall_64+0x41/0xc0 [ 865.633651][T23096] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 865.639589][T23096] [ 865.641922][T23096] value changed: 0x0000000000c7d000 -> 0x0000000000c7e000 [ 865.649034][T23096] [ 865.651356][T23096] Reported by Kernel Concurrency Sanitizer on: [ 865.657507][T23096] CPU: 0 PID: 23096 Comm: syz-executor.3 Not tainted 6.3.0-syzkaller-13027-g1a5304fecee5 #0 [ 865.667585][T23096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 865.677665][T23096] ================================================================== [ 865.691806][ T3443] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:59:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) mmap(&(0x7f0000297000/0x4000)=nil, 0x4000, 0xc, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ff00000000001fff00"/56, @ANYRES32=0x0, @ANYBLOB="e1ff004900000000c72569b211f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r2, 0x0, 0x21fd1ee9) 13:59:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_BLKTRACESTART(r0, 0x1274, 0x0) 13:59:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x8, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:59:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x2000480, &(0x7f00000000c0)=ANY=[], 0x1, 0x7b1, &(0x7f00000007c0)="$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") open(&(0x7f0000007f80)='./bus\x00', 0x143042, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x4102, 0x0) preadv2(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/76, 0x7ffff050}], 0x3, 0x0, 0x0, 0x3) 13:59:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) mmap(&(0x7f0000297000/0x4000)=nil, 0x4000, 0xc, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ff00000000001fff00"/56, @ANYRES32=0x0, @ANYBLOB="e1ff004900000000c72569b211f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r2, 0x0, 0x21fd1ee9) 13:59:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x460, 0x258, 0x4c, 0x200, 0x0, 0x0, 0x390, 0x2e8, 0x2e8, 0x390, 0x2e8, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'veth1_to_bond\x00', 'ip6gre0\x00'}, 0x0, 0x230, 0x258, 0x0, {}, [@common=@unspec=@cluster={{0x30}}, @common=@inet=@policy={{0x158}, {[{@ipv4=@dev, [], @ipv4=@multicast1}, {@ipv4, [], @ipv4=@broadcast}, {@ipv4=@multicast2, [], @ipv6=@mcast1}, {@ipv6=@loopback, [], @ipv6=@private2}], 0x1, 0x300}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private1, [], [], 'team_slave_0\x00', 'xfrm0\x00'}, 0x0, 0x100, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@realm={{0x30}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c0) 13:59:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_BLKTRACESTART(r0, 0x1274, 0x0) 13:59:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) mmap(&(0x7f0000297000/0x4000)=nil, 0x4000, 0xc, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ff00000000001fff00"/56, @ANYRES32=0x0, @ANYBLOB="e1ff004900000000c72569b211f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r2, 0x0, 0x21fd1ee9) [ 866.110504][ T25] audit: type=1400 audit(1683208757.675:155085): avc: denied { read } for pid=23097 comm="syz-executor.0" name="sg0" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 13:59:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_BLKTRACESTART(r0, 0x1274, 0x0) 13:59:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x460, 0x258, 0x4c, 0x200, 0x0, 0x0, 0x390, 0x2e8, 0x2e8, 0x390, 0x2e8, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'veth1_to_bond\x00', 'ip6gre0\x00'}, 0x0, 0x230, 0x258, 0x0, {}, [@common=@unspec=@cluster={{0x30}}, @common=@inet=@policy={{0x158}, {[{@ipv4=@dev, [], @ipv4=@multicast1}, {@ipv4, [], @ipv4=@broadcast}, {@ipv4=@multicast2, [], @ipv6=@mcast1}, {@ipv6=@loopback, [], @ipv6=@private2}], 0x1, 0x300}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private1, [], [], 'team_slave_0\x00', 'xfrm0\x00'}, 0x0, 0x100, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@realm={{0x30}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c0) [ 866.170928][T23106] xt_policy: too many policy elements [ 866.188335][T23102] loop4: detected capacity change from 0 to 2048 [ 866.198260][ T25] audit: type=1400 audit(1683208757.705:155086): avc: denied { ioctl } for pid=23097 comm="syz-executor.0" path="/dev/sg0" dev="devtmpfs" ino=113 ioctlcmd=0x1274 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 13:59:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_BLKTRACESTART(r0, 0x1274, 0x0) 13:59:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x460, 0x258, 0x4c, 0x200, 0x0, 0x0, 0x390, 0x2e8, 0x2e8, 0x390, 0x2e8, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'veth1_to_bond\x00', 'ip6gre0\x00'}, 0x0, 0x230, 0x258, 0x0, {}, [@common=@unspec=@cluster={{0x30}}, @common=@inet=@policy={{0x158}, {[{@ipv4=@dev, [], @ipv4=@multicast1}, {@ipv4, [], @ipv4=@broadcast}, {@ipv4=@multicast2, [], @ipv6=@mcast1}, {@ipv6=@loopback, [], @ipv6=@private2}], 0x1, 0x300}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private1, [], [], 'team_slave_0\x00', 'xfrm0\x00'}, 0x0, 0x100, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@realm={{0x30}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c0) [ 866.243022][T23116] xt_policy: too many policy elements [ 866.274682][T23102] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 866.328115][T23126] xt_policy: too many policy elements [ 866.381446][ T3443] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:59:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) mmap(&(0x7f0000297000/0x4000)=nil, 0x4000, 0xc, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ff00000000001fff00"/56, @ANYRES32=0x0, @ANYBLOB="e1ff004900000000c72569b211f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r2, 0x0, 0x21fd1ee9) 13:59:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}}, 0xa0) 13:59:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x460, 0x258, 0x4c, 0x200, 0x0, 0x0, 0x390, 0x2e8, 0x2e8, 0x390, 0x2e8, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'veth1_to_bond\x00', 'ip6gre0\x00'}, 0x0, 0x230, 0x258, 0x0, {}, [@common=@unspec=@cluster={{0x30}}, @common=@inet=@policy={{0x158}, {[{@ipv4=@dev, [], @ipv4=@multicast1}, {@ipv4, [], @ipv4=@broadcast}, {@ipv4=@multicast2, [], @ipv6=@mcast1}, {@ipv6=@loopback, [], @ipv6=@private2}], 0x1, 0x300}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private1, [], [], 'team_slave_0\x00', 'xfrm0\x00'}, 0x0, 0x100, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@realm={{0x30}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c0) 13:59:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x2000480, &(0x7f00000000c0)=ANY=[], 0x1, 0x7b1, &(0x7f00000007c0)="$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") open(&(0x7f0000007f80)='./bus\x00', 0x143042, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x4102, 0x0) preadv2(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/76, 0x7ffff050}], 0x3, 0x0, 0x0, 0x3) 13:59:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) mmap(&(0x7f0000297000/0x4000)=nil, 0x4000, 0xc, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ff00000000001fff00"/56, @ANYRES32=0x0, @ANYBLOB="e1ff004900000000c72569b211f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r2, 0x0, 0x21fd1ee9) 13:59:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) mmap(&(0x7f0000297000/0x4000)=nil, 0x4000, 0xc, 0x20010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ff00000000001fff00"/56, @ANYRES32=0x0, @ANYBLOB="e1ff004900000000c72569b211f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r2, 0x0, 0x21fd1ee9) 13:59:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}}, 0xa0) 13:59:18 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x1c) 13:59:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}}, 0xa0) [ 867.120216][T23138] xt_policy: too many policy elements [ 867.141446][T23137] loop4: detected capacity change from 0 to 2048 13:59:18 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x1c) 13:59:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}}, 0xa0) [ 867.203169][T23137] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 13:59:18 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x1c) [ 867.327958][ T3443] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:59:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000006c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x58, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x30, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0x14, 0x4, "1d5d8967e9598625719312cfdd374033"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0x10, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x4}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}]}]}, 0x58}}, 0x0) 13:59:19 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x1c) 13:59:19 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) 13:59:19 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) memfd_secret(0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x1f23, 0x12) 13:59:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000002d00)=[{&(0x7f0000000080)=@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000002640)=[{&(0x7f00000000c0)='!', 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000002740)=[@sndinfo={0x20}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @sndinfo={0x20, 0x84, 0x2, {0xf437, 0x1}}], 0x58}], 0x1, 0x0) 13:59:19 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000cc0)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setxattr$incfs_metadata(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) 13:59:19 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) memfd_secret(0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x1f23, 0x12) 13:59:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000006c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x58, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x30, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0x14, 0x4, "1d5d8967e9598625719312cfdd374033"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0x10, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x4}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}]}]}, 0x58}}, 0x0) 13:59:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000002d00)=[{&(0x7f0000000080)=@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000002640)=[{&(0x7f00000000c0)='!', 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000002740)=[@sndinfo={0x20}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @sndinfo={0x20, 0x84, 0x2, {0xf437, 0x1}}], 0x58}], 0x1, 0x0) 13:59:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x200040, &(0x7f0000000000)=ANY=[], 0x1, 0x5cc, &(0x7f0000000600)="$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") close(r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0x0, 0x3c}, 0x1, 0x0, 0x0, 0x4004050}, 0x48004) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'netpci0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x70bd26, 0x25dfdbfd, {0x2, 0x18, 0x12, 0xc8, r1}, [@IFA_ADDRESS={0x8, 0x1, @remote}]}, 0x20}}, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000080)='./file0\x00', r2, &(0x7f00000000c0)='./bus\x00', 0x4) 13:59:19 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000cc0)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setxattr$incfs_metadata(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) 13:59:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000002d00)=[{&(0x7f0000000080)=@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000002640)=[{&(0x7f00000000c0)='!', 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000002740)=[@sndinfo={0x20}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @sndinfo={0x20, 0x84, 0x2, {0xf437, 0x1}}], 0x58}], 0x1, 0x0) 13:59:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000006c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x58, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x30, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0x14, 0x4, "1d5d8967e9598625719312cfdd374033"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0x10, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x4}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}]}]}, 0x58}}, 0x0) [ 868.072428][T23178] loop5: detected capacity change from 0 to 1024 [ 868.154965][T23186] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 868.163168][T23186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 868.171503][T23186] 8021q: adding VLAN 0 to HW filter on device team0 [ 868.182893][T23186] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:59:19 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) memfd_secret(0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x1f23, 0x12) [ 868.205511][T23186] selinux_netlink_send: 12 callbacks suppressed [ 868.205529][T23186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23186 comm=syz-executor.1 13:59:19 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000cc0)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setxattr$incfs_metadata(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) [ 868.344449][T23178] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 868.428342][T23178] EXT4-fs error (device loop5): ext4_find_dest_de:2092: inode #2: block 16: comm syz-executor.5: bad entry in directory: inode out of bounds - offset=76, inode=196624, rec_len=16, size=1024 fake=0 [ 868.504023][ T3410] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:59:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000002d00)=[{&(0x7f0000000080)=@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000002640)=[{&(0x7f00000000c0)='!', 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000002740)=[@sndinfo={0x20}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @sndinfo={0x20, 0x84, 0x2, {0xf437, 0x1}}], 0x58}], 0x1, 0x0) 13:59:20 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x121a02, 0x0) memfd_secret(0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x1f23, 0x12) 13:59:20 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000006c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x58, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x30, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0x14, 0x4, "1d5d8967e9598625719312cfdd374033"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0x10, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x4}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}]}]}, 0x58}}, 0x0) 13:59:20 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x200040, &(0x7f0000000000)=ANY=[], 0x1, 0x5cc, &(0x7f0000000600)="$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") close(r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0x0, 0x3c}, 0x1, 0x0, 0x0, 0x4004050}, 0x48004) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'netpci0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x70bd26, 0x25dfdbfd, {0x2, 0x18, 0x12, 0xc8, r1}, [@IFA_ADDRESS={0x8, 0x1, @remote}]}, 0x20}}, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000080)='./file0\x00', r2, &(0x7f00000000c0)='./bus\x00', 0x4) 13:59:20 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) 13:59:20 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000cc0)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setxattr$incfs_metadata(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) 13:59:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) 13:59:20 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) 13:59:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) 13:59:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) [ 868.893404][T23203] loop5: detected capacity change from 0 to 1024 [ 868.927447][T23203] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 13:59:21 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x200040, &(0x7f0000000000)=ANY=[], 0x1, 0x5cc, &(0x7f0000000600)="$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") close(r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0x0, 0x3c}, 0x1, 0x0, 0x0, 0x4004050}, 0x48004) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'netpci0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x70bd26, 0x25dfdbfd, {0x2, 0x18, 0x12, 0xc8, r1}, [@IFA_ADDRESS={0x8, 0x1, @remote}]}, 0x20}}, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000080)='./file0\x00', r2, &(0x7f00000000c0)='./bus\x00', 0x4) [ 870.000398][T23203] EXT4-fs error (device loop5): ext4_find_dest_de:2092: inode #2: block 16: comm syz-executor.5: bad entry in directory: inode out of bounds - offset=76, inode=196624, rec_len=16, size=1024 fake=0 [ 870.029162][ T3410] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 870.990906][T23222] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23222 comm=syz-executor.2 [ 871.004856][T23227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23227 comm=syz-executor.0 [ 871.034855][T23221] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23221 comm=syz-executor.1 [ 871.044412][T23229] loop5: detected capacity change from 0 to 1024 [ 871.047810][T23224] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23224 comm=syz-executor.3 [ 871.063918][T23229] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 871.067134][T23217] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 871.114757][T23229] EXT4-fs error (device loop5): ext4_find_dest_de:2092: inode #2: block 16: comm syz-executor.5: bad entry in directory: inode out of bounds - offset=76, inode=196624, rec_len=16, size=1024 fake=0 [ 871.168805][T23217] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 871.176645][T23217] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 871.184240][T23217] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 871.192035][T23217] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 871.200011][T23217] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 871.207790][T23217] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 871.222669][T23217] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 871.230537][T23217] 8021q: adding VLAN 0 to HW filter on device bond0 [ 871.238375][T23217] 8021q: adding VLAN 0 to HW filter on device team0 [ 871.248453][T23217] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:59:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) 13:59:22 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x200040, &(0x7f0000000000)=ANY=[], 0x1, 0x5cc, &(0x7f0000000600)="$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") close(r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0x0, 0x3c}, 0x1, 0x0, 0x0, 0x4004050}, 0x48004) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'netpci0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x70bd26, 0x25dfdbfd, {0x2, 0x18, 0x12, 0xc8, r1}, [@IFA_ADDRESS={0x8, 0x1, @remote}]}, 0x20}}, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000080)='./file0\x00', r2, &(0x7f00000000c0)='./bus\x00', 0x4) 13:59:22 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) [ 871.267937][T23216] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 871.279057][T23216] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 871.294663][T23219] Y4`Ҙ: left promiscuous mode [ 871.299847][T23219] Y4`Ҙ: left allmulticast mode [ 871.310616][T23219] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 871.330124][T23219] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 871.342269][ T3410] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 871.359271][T23219] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 871.367076][T23219] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 871.374690][T23219] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 871.382533][T23219] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 871.390406][T23219] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 871.398350][T23219] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 871.415121][T23219] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 871.423054][T23219] 8021q: adding VLAN 0 to HW filter on device bond0 [ 871.431119][T23219] 8021q: adding VLAN 0 to HW filter on device team0 [ 871.945954][T23239] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23239 comm=syz-executor.2 [ 871.959206][T23219] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:59:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) [ 871.983887][T23241] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23241 comm=syz-executor.1 [ 872.013249][T23220] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 872.034599][T23220] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 872.042469][T23220] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 872.050197][T23220] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 872.058415][T23220] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 872.066487][T23220] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 872.074604][T23220] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 872.094870][T23220] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 872.103128][T23220] 8021q: adding VLAN 0 to HW filter on device bond0 [ 872.111305][T23220] 8021q: adding VLAN 0 to HW filter on device team0 13:59:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) [ 872.147742][T23220] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 872.179896][T23223] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 872.197698][T23223] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 872.205600][T23223] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 872.213319][T23223] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 872.221103][T23223] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 872.229085][T23223] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 872.229456][T23223] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 872.237302][T23223] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 872.238225][T23223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 872.260644][T23223] 8021q: adding VLAN 0 to HW filter on device team0 [ 872.269937][T23223] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:59:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) [ 872.775051][T23248] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23248 comm=syz-executor.3 [ 872.788595][T23238] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 872.797219][T23252] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23252 comm=syz-executor.4 [ 872.815566][T23238] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 872.823022][T23238] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 872.830346][T23238] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 872.837899][T23238] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 872.845532][T23238] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 872.853206][T23238] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 872.862780][T23238] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 872.872667][T23238] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 872.907702][T23240] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:59:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) 13:59:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) [ 872.919106][T23240] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 872.952472][T23246] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 872.987989][T23254] loop5: detected capacity change from 0 to 1024 [ 872.997593][T23246] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 873.005173][T23246] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 873.012445][T23246] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 873.019968][T23246] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 873.027496][T23246] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 873.033195][T23254] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 873.035107][T23246] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 873.056159][T23246] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 873.127946][T23254] EXT4-fs error (device loop5): ext4_find_dest_de:2092: inode #2: block 16: comm syz-executor.5: bad entry in directory: inode out of bounds - offset=76, inode=196624, rec_len=16, size=1024 fake=0 [ 873.159243][T23259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23259 comm=syz-executor.0 13:59:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) [ 874.061959][T23246] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 874.089268][T23249] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 874.108217][T23249] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 874.115652][T23249] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 874.122935][T23249] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 874.130550][T23249] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 874.138166][T23249] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 874.145987][T23249] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 874.155730][T23249] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 874.167196][T23331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23331 comm=syz-executor.2 [ 874.247252][T23249] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:59:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) 13:59:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) 13:59:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) [ 874.355340][T23258] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 874.371749][ T3410] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 874.381157][T23258] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 874.388666][T23258] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready 13:59:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) [ 874.396161][T23258] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 874.396225][T23258] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 874.396359][T23258] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 874.396482][T23258] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 874.398311][T23258] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 874.400596][T23258] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 874.400707][T23270] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 874.432527][T23270] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 874.432696][T23270] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 874.432816][T23270] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready 13:59:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000300)) dup(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000340)=0xae) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000280)='cgroup.procs\x00', &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64=0xfffffffffffffffd}]}, 0x40}], 0x1}, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r8, 0x6628) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)}, 0x4000) process_vm_readv(0x0, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) [ 874.499830][T23270] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 874.500017][T23270] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 874.500259][T23270] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 874.502091][T23270] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 874.504415][T23270] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check.