@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 23:18:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5428, 0x0) 23:18:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5460, 0x0) [ 740.653353][ T5] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 740.709451][ T5] usb 5-1: language id specifier not provided by device, defaulting to English [ 740.862602][ T5] usb 5-1: New USB device found, idVendor=0b05, idProduct=1869, bcdDevice= 0.40 [ 740.872099][ T5] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 740.880299][ T5] usb 5-1: Product: syz [ 740.885050][ T5] usb 5-1: Manufacturer: 瀅䗚˲꾂랕䙫碉 [ 740.891580][ T5] usb 5-1: SerialNumber: syz [ 741.078040][ T5] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 741.323744][ T5] usb 5-1: USB disconnect, device number 24 23:18:22 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, r0/1000+10000}) 23:18:22 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000280)={0x0}) 23:18:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@pppol2tp, &(0x7f0000000140)=0x80) 23:18:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 23:18:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f000000e600)=[{&(0x7f0000000480)={0x10}, 0x10}, {0x0}, {0x0, 0x168}], 0x3}, 0x0) 23:18:22 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f000000e600)=[{&(0x7f0000000480)={0xec4, 0x0, 0x0, 0x0, 0x0, "", [@generic="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", @generic]}, 0xec4}], 0x1}, 0x0) 23:18:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5410, 0x0) 23:18:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 23:18:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5427, 0x0) 23:18:23 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD(r0, 0xc01064c1, &(0x7f0000000000)) 23:18:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5441, 0x0) 23:18:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 23:18:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000140)=0x1f, 0x4) 23:18:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5416, 0x0) 23:18:23 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:23 executing program 4: ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, 0x0) getpid() ptrace$setregset(0x4205, 0x0, 0x0, 0x0) clone3(&(0x7f0000000340)={0x41040200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[0x0], 0x1}, 0x58) 23:18:23 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000003c0), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)) 23:18:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5416, 0x0) 23:18:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 23:18:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'security\x00'}, &(0x7f00000000c0)=0x54) 23:18:24 executing program 5: execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100), &(0x7f0000000240)=[&(0x7f0000000140)='(!\x00'], 0x0) 23:18:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000040)=ANY=[@ANYBLOB="040600000d0a01030000000000000000050000010900010073797a3000000000a4050380cc0200800900090073797a30000000000c0004400000000000000000ac0202806c000100471d69de77069fdd2f37970493c22a55d4bea05542d67fe3bcc610a4e344f812d06de5ab4fb0771aebf2988f6dea9484ef9a854dda4e7ddbbcd1162d5067fbabd4a4291f38724ca02df9d76b91d620c9a8e27e507414abb825b62165c2ed5ebd18516d0b279b88bd160001003d93182ea08e0955108e58b6f4384c7ea2ec0000c2000100e5c68a3640f628ee615f9a23010001005730fee9695468130ed415b4ff3b4be502fc6a884caa6872dd136b5df2be65ce59bb64eb6b0666286c8137514bf6fd98530772f5137e7598610b528e318872d39ff3d58377fb38dd532c827091ecfe045aaf055a151543bf1f76bcda8b8c0bc612ba7e45a8e5013137f6775d318d5aa23f69ff4a007d218cfb47759f84ef59cbd9e539849dd37839098d373b04ab7310c66a45ed7b070fb979702287174d68e92700002000028008000180fffffffd08000180000000000900020073797a30000000002b00010049d2c51ab58d8a4d2f9e26a3387c432ee49635601ca1ce5a2b5c42ffe4803ea81c24afc2b57d6d00280002800900020073797a30000000000900020073797a30000000000900020073797a3200000000b60001003b2d54e5396939fab4e497eacf9fe1bfc78786320bf80747504a4fdbf57f6298ba7d6e3d2df5c1a29430af4e70b5540277b2a0d6fe23774a416833ee6f04779b0c9b8f464afa1bdf4a49538eb00b3f13801d11ac4bed7948217177386e96cc6420d6b91839cebf199d2a0c3081d121b8cc3502d192eed0d2d0a4071180abb86c0f5c9c5ee48529aa06dcaaea9bdf65c92e9eaf2bb18d48be1a6181ac83341eea04d986dcef043e7190b5e52f17b81ba887d70000230001009138d29bbc50b03520a52673bd61bdbf56291223a573e87c8ba945fe72539b000d000100ea28da3346ac7b0894000000040007800800008004000180cc0200803c01018069000100ed6b8565d0a4aac5027b632650d90c0bf08a9ebca2435402200dede7630f437545dfef2f6288e3f42320f1a20f8efc95e3e9f9ee12d29ccead5842523697666035646d7230ca928892b8dc69abf3bf4533636f485d5827a3640b7b5f651f0d17d43a23b094000000a0000100df3616d1ec463edf40a4d2ffeee69f7b7331206dd8f8163c5308f653077d440b748152b0dd591e8bb5596bdc720db205bc03212726e96a9cea9dd11399823978990a339cf232c35ee84c8f71bc227f2d62061d12c9573750160896032816f2f09f1ff027f1dfeeb906ccc99613ff3ec262c52de2d1ea8ca47f4a1d22617cfaee4579342882174de05abbceedd13d05eb15e45555d12cc3aa0507c9072c0002800900020073797a320000000008000180ffffffff08000180fffffffc0900020073797a31000000000c0004400000000000000005800101802800028008000180fffffffd08000180fffffffc0900020073797a320000000008000180fffffffd2800028008000180fffffffd08000180fffffffe08000180fffffffe0900020073797a3000000000600002800900020073797a310000000008000180fffffffd08000180000000000900020073797a31000000000900020073797a310000000008000180fffffffd0900020073797a310000000008000180fffffffe0900020073797a3000000000100002800900020073797a32000000002000028008000180fffffffe0900020073797a310000000008000180fffffffe440002800900020073797a32000000000900020073797a310000000008000180fffffffc0900020073797a30000000000900020073797a320000000008000180fffffffb580002800900020073797a31000000000900020073797a30000000000900020073797a300000000008000180fffffffb08000180fffffffb0900020073797a310000000008000180fffffffd0900020073797a32000000000900010073797a3100000000090002"], 0x604}}, 0x0) 23:18:24 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000003000000000100000000000000000000010000000000007200000000000010000000100000001000"/255, 0xff, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 743.719423][T19924] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. 23:18:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:18:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000016b00)) [ 743.925411][T19928] loop2: detected capacity change from 0 to 256 23:18:25 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000180), r0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, r2, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) [ 744.002380][T19928] BTRFS: device fsid e76ed352-74d7-4461-bdaa-670e3acfe92b devid 1 transid 7 /dev/loop2 scanned by syz-executor.2 (19928) [ 744.123755][T19928] BTRFS error (device loop2): superblock checksum mismatch 23:18:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 744.193702][T19928] BTRFS error (device loop2): open_ctree failed 23:18:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x0, 0x0, 0x4000000000f}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @empty}, @vsock={0x28, 0x0, 0xffffd8ef, @host}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0xbb0b, &(0x7f0000000340)='veth0_macvtap\x00', 0x0, 0x400000, 0x114}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000003c0)) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f00000000c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) [ 744.318466][T19937] loop0: detected capacity change from 0 to 256 [ 744.389204][T19937] BTRFS: device fsid e76ed352-74d7-4461-bdaa-670e3acfe92b devid 0 transid 0 /dev/loop0 scanned by syz-executor.0 (19937) 23:18:25 executing program 2: syslog(0x3, &(0x7f0000000000)=""/23, 0x17) 23:18:25 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:25 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:25 executing program 0: add_key$user(0x0, &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="99f37920f52b60a209868a0a0295cc5cc5f0c2bdcf2bc66915d757e2c059a1a4e1eda9e44cf9507ff38f78f90c91f150ceea4ae6b51ce48a517ab187feb866d7b459fb645af4ef4490a599c237", 0x4d, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) prctl$PR_GET_THP_DISABLE(0x2a) 23:18:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 23:18:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000030000000001", 0xca, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 23:18:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000000)) 23:18:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="2800000010000108000000000054000000000000", @ANYRES32=0x0, @ANYBLOB="0000f69fd5faf00008001b"], 0x28}}, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@local, 0x0, r4}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000380)={0x0, 0x81000000, &(0x7f00000001c0)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 23:18:27 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:27 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="00012abd7000fedbdf2545000000080001007063690011000200303030303a30303a31302e300000000008008e00030000000e0001006e655464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e000100000073ff01006e657464657673696d0001000000000000007464657673696d30000008008e00030000000e0001006e657464657673696d0000000f0002006e657464657673696d30510008008e00000000005a8ae51da72bf276c93e0baf635876b5c4aa6ddffa99bbaaafcdfb48dffa8472a1e79d997f468a873f85136ce9c42a8f1af71af25a0786d4dafeaf89063b1e69b2f56051a8711f3be6be"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') [ 746.095797][T19964] loop0: detected capacity change from 0 to 256 23:18:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 23:18:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="2800000010000108000000000054000000000000", @ANYRES32=0x0, @ANYBLOB="0000f69fd5faf00008001b"], 0x28}}, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x81000000, &(0x7f00000001c0)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 23:18:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1}, 0x0) [ 746.660386][T19993] loop0: detected capacity change from 0 to 256 23:18:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1}, 0x0) [ 747.587315][T20087] loop0: detected capacity change from 0 to 256 23:18:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1}, 0x0) 23:18:29 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000016b00)) [ 748.454367][T20094] loop0: detected capacity change from 0 to 256 [ 749.864869][T19966] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.872700][T19966] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.362048][T19966] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 751.516956][T19966] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 752.957138][T19966] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 752.966326][T19966] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 752.975554][T19966] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 752.987027][T19966] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 23:18:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xb) 23:18:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef", 0x45}], 0x1}, 0x0) 23:18:34 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:34 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000016b00)) [ 753.532657][T20099] loop0: detected capacity change from 0 to 256 [ 755.386523][T19988] bridge0: port 2(bridge_slave_1) entered disabled state [ 755.394375][T19988] bridge0: port 1(bridge_slave_0) entered disabled state [ 756.938874][T19988] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 758.269430][T19988] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 758.278570][T19988] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 758.287793][T19988] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 758.296950][T19988] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 758.759851][T19994] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 758.771638][T19994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 758.782678][T19994] 8021q: adding VLAN 0 to HW filter on device team0 23:18:39 executing program 5: io_setup(0xa83, &(0x7f0000000000)=0x0) io_destroy(r0) 23:18:39 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:39 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef", 0x45}], 0x1}, 0x0) 23:18:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xc) [ 758.804088][T19994] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 23:18:40 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') [ 758.978473][T20117] loop0: detected capacity change from 0 to 256 23:18:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000007bc0)=[{&(0x7f00000022c0)={0x14, 0x2e, 0x1, 0x0, 0x0, "", [@generic="16"]}, 0x14}], 0x1}, 0x0) 23:18:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef", 0x45}], 0x1}, 0x0) 23:18:40 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:40 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r0, 0x28, 0x6, &(0x7f0000000300)={0x77359400}, 0x10) 23:18:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x26) 23:18:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455", 0x67}], 0x1}, 0x0) [ 759.692888][T20132] loop0: detected capacity change from 0 to 256 23:18:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:41 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x32) 23:18:41 executing program 5: r0 = epoll_create(0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 23:18:41 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455", 0x67}], 0x1}, 0x0) [ 760.245697][T20142] loop0: detected capacity change from 0 to 256 23:18:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:41 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:41 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000006080)='ns/mnt\x00') 23:18:41 executing program 2: r0 = getpid() r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000002900)={&(0x7f0000000080)=@proc, 0x3, &(0x7f0000002880)=[{&(0x7f00000000c0)={0x10}, 0x10}], 0x1, &(0x7f00000028c0)=[@cred={{0x1c, 0x1, 0x2, {r0}}}], 0x20}, 0x0) 23:18:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455", 0x67}], 0x1}, 0x0) [ 760.740631][ T1201] ieee802154 phy0 wpan0: encryption failed: -22 [ 760.747448][ T1201] ieee802154 phy1 wpan1: encryption failed: -22 [ 760.821699][T20158] loop0: detected capacity change from 0 to 256 23:18:42 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:42 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:42 executing program 5: r0 = epoll_create1(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000280)={0x30000000}) 23:18:42 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000002040)=[{&(0x7f0000001e00)='*', 0x1}, {&(0x7f0000001ec0)="f8", 0x1, 0xaf9f}, {&(0x7f0000001fc0)='d', 0x1}], 0x0, 0x0) 23:18:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13", 0x78}], 0x1}, 0x0) [ 761.390454][T20170] loop0: detected capacity change from 0 to 256 [ 761.448943][T20172] loop2: detected capacity change from 0 to 175 23:18:42 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000016b00)) 23:18:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)="b7", 0x1, 0x3f}, {&(0x7f00000004c0)="7ae4", 0x2, 0xfff}, {&(0x7f0000000540)="05", 0x1}], 0x0, 0x0) 23:18:42 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000001400)=[{&(0x7f0000001300)='n', 0x1, 0xd0b64ef00000000}], 0x0, 0x0) 23:18:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13", 0x78}], 0x1}, 0x0) 23:18:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000016b00)) [ 762.070527][T20190] loop2: detected capacity change from 0 to 15 23:18:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x93}]}) 23:18:43 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x7, &(0x7f0000001400)=[{&(0x7f0000000080)="de8910f439eaebbecf42097af89b5c0121cfb36d4e0ecd404ed73937a0122217dea2cdbe6cfdafe0c38029f418ab1757d943b9111c279dcdc21eca0a303e1edd", 0x40, 0x7}, {&(0x7f0000000100)="ffad071257a26cdf9ffd3639d993ae85233e3978855f0de5a17dcf2f2439b3bd6b70b312", 0x24, 0x3}, {&(0x7f0000000180), 0x0, 0x7ff}, {&(0x7f0000000240)="23da99f2ace3ebdce6dabb0d2a1c1c22d42abdd060b3deace91182168134e1b9725c8022ddea9365adf5e82b1f9295f35463eb0c44d2a1cddfd15f3345a67a2e2001007f362b20e5bc885c070c87793993b6138fc7c0045fd4e62b8942a9f7565150dcc483561b953d9f8f5e03a070fd7ce4b38599f4c6652ca380b2e09ffa3be798e1d05fabe87ae84ab7f0017270e23738234b1c7a0faa614f", 0x9a, 0x4}, {&(0x7f0000000300)="fcc912e0765d3af467a10e08f776f29a13513c9c2760310caab269eff2584d305dfdf71837e504fe08b2dd9f46c5b29123f531f60485e699cbb8da3fa2741dd6e9a23f7a110aa3a42937ec651aae345f95d40c677f7feeecc3c490a68d79456be6c8e2b2bbcab600a27e9ba6dbb0295ed15e7950bbfecf7bdc361906096b365e252f33b7f81dab9d17631962debdaf56eb30de228af2a6bd5062c7cb1dc8cfcce7127130820b19533edf45d5c276a9535ab5beeaa6df32bdde26531c15257d3351c0020b2561d41c44958e6b4389d60ee37e5015749e13f44172e1dbc9fe844bdb4a838192d0655ceda4c4ef93896a1692ca59de9412a765793488ccb0c8344af29db0b9087eab8aa71b70ba195e4a0386af0514055ed8a8480b37f53adfcd51cf3bc123198205f9f37526473ccb588d77cf44b4159132e000bdec77b2f799c077137539ae6d7a13868a370db1f210b677a6c265ec70ec391345af84cea4cd4bb0463d9d5683b0a9bb56b5c7240968f45431c079df809bc7ca1ead81b79f15b29218823bb62bd570a90381b4e02543bb7603737b3cd33cb14b5ea0f4df3436fd2cbaf9ada03540bbe9b8b521f19892c1a4b1a3401759b65809a87e76ad5c9984ec4d62a2d683c50d79eb506f3837faa7f02120b5ead14ae69e5b17c34dfdfb338f055c3aa9da4b08dd6c917371bc53e837e78f552260b037bc21ea6b69c1aa6c17110085ff7ace30c180401046e95bea5e816471bd675392b6305d19b170af9adf4b335b2f9b9c7738a70ed765375cb20555d4b5ea7eafa97aa656c64178b3f06e482ff09d8f7a7c97f0be5fe7942fd1e3c32ff04958ceca13cf32ba7e18150d80898638c2276554da214da7fac13ee19dece365fe87905b5b2545a7207239c5f14c49f75fe47ea479a8bef4476a3039a8c30e87c19dc5a12884422328fefb2d5db57d8486e07765e937c3baa21393ccd13821792d8f2104807a5f429a3703788a86645f0acd5959d6a54f5926d6bb6be2659d1da1a6fea24393f259da6f961fd724d919d3956e6149b7bdf581fd53e6646d28e62d4f979b6ba437af3b40883afaa81812613cb3ef1601f6ace113150522d6fca7643138ac56149c5535c31cacaa608d89d291839727459ba1a3887f93193060a7f9428fdde91982d8d6ea8337fd88d767864fdb9d4e3e95e950ac8f45bac827c40244f4f3b120bd6f281bdf226f937c386ef4e376e583894c18c81b9cbc859d8c969ad0ae5f12178787c8120e1c5e10fce8048184d0826c82737800b19536015e8991c47f61661f70ebe12aa84d1efdbdf43cb04c2b6091f41539b473d31f1b6af572198baa98bc925f705f44130fd577fddd38dd5b3542844c032b58a94a0043dfa6952478842706f83c894e8465a154497616a8a5c547d27f1e2a0c224aa015ec0f47b9c0eaab9d29b8fb7fa05d1bc91b6e0a815421c62947ce012dec9ee92f6b1894bd979478a4097b9801528578d22a293fb298a683d58d2f6b0dceca15785a1d7822f33e08e99f9ebb0e99756a0981454b6d497b8cf39429d2bb1f8cdef9c7368797be38a9ffabfa19a657bb4d263ed174b573f130035883053da3d3043a9fc18799a6439d3bbcc863fbe8efe1cd27321208556ee97cbfe47b1864f113fa7b98adfc2a2748adfa27696ef9c5269eee030e5c7020c606041bb30e6c7c0e4616c306c31b5e1a0f0c2b4635fd5a58dd915ac7f4adf840b7539d52fd30f675d3ff8d389402a0dd62f786c91da4f34260285e4a0fcc36786e702976321192ec63f10e183f2ce8e870d17b4b88c2a0cf26f5647430f183a54eb1bc84ccb7c2d748583d728afcb36461614b478bb450fdf4fdc4716b62e6ee9f7bc4e77b67f0a2197929cb83458a005e44234f4231a7e3e80dc97fc1d9b03489e6f2851f7cc15c985819e0b711812ac8331d64cd63379e3f357b259d98b5e48b13c1ff3c7d5462b157777ecbca104766c77530b09e315dd7cc2259aede42e540c33b5c7c2b4896db0fb70ffb21d746bf67431b78a13b59994a5636fb3ac011985a896d2436208929e3e2f6bf7c2d8fee22e43d22a2e9b47c3bf939ec47a4aa32d727c802ba9be7ee7861092606c480c77f66ac6e5b41f35ed8811209166e2351dbf7385f53a552cbf2ecdeab76eba764509bd1c3500f50e09fa25b439fbddcfea985ee1fa8dd0ac4990ff01ec9ad1504bf110197dc8d39d425911acdc03e38b0648da4f1d6b594dd9a93e8eaef89ede7db05126be00944ec908fd171488d5d7f7d6f2f728dd1bdd0f855833fac854e5d41e172267d978a7806639b35d8d8ab7296354b506b4c670957ca38bd321059ee06abc352c1f5278ddb962916724ee5d4963382ff7ab4a9b8f444444cede62b84df7e4af5f2965218205b245976aecbdbe939fe3b047f3520d0d1eef434e4bfbd937330c4df8446c8fa58986ab1ad31e7722722e1f6a723543ec292df30e5df66fb3b23b0f29c680e218b6a5e95f0413fabfb7e10606f3b6ef6857d3c305f1c1e78446631247a4440cf01484ecc3cf1ac7f03aa3d405e5666a3a56576a1bacde92af0bbec7a00bb9c1f60039d17096469a2110e328d516139625e251d6e9da12f372eaa49e41815bc3be4a2b42168f85e10513724fdcd6c35fba8cffe5a30fe2efac8f7f2125cf8b2346c8574c251d4ff1ac6ae29e854dfe2b679ed97e83c390cbeddc1ffa1694165cdc9359ba421afd5b2ee272a42640ea0b6a7196fa172ac2af7e575b4a75e9db78173061efd21701277649ec6b64f2fab32011236dba176fef94d076273a3bf6a9cf66e86aa1870d37e93b0ad1842369e3f7823627af913f95da2d8c013537eef77977170221526a2a257b74ff9887778c531868b36dcb0a882c7741f4cb90985c52c81b8fc42f777a7e5699d51ada32723c6c0c57c5b2a1390bd254c27f4db915fdd91ad1b4ceca511f2f3758761ef34fe28870a6197d0e4cf4e806a7381af39ba74673c8c92ef7d27708dfeef37e408a9199018a0c8cc48f9e21588344dae0bd856eb6ebb372fa8b4e9e89fd01d2191c1258b4e22d85693111b5e8ab722290573d047add621ed9e9962ce97b43546dbf8b6b4252491088bdac559073387509e30881862fdfef2299927570385642e950c05b3b2a44b7fb2f4e98a1b5d41c7350ecd36ea0e86130c33449d72afdbac1635d4b3a1970406777f41e571a33fcf1134698f95b060ceaa2cdfa25274bc0b7334bce45f574e9a0521ec4daae54ca197d3ea8afd3901b899e28102789f81dada56b321b59dbcff8aebd8aa492198759d80bb307272ae439c3bb29e1cf34a491954f1bcc192fab2e8e034a3e511ef6f10bf68871dfaa3d67ce04e5fe0daaef0a6bf38b1989ba8b068c28da1b2783377b409f2685d5592744c4ba32055e78ab352b03ecc8d28892059996fd5629f8bb940f2c5c2a2588741f8a51f4decdc185b8c6399eeb64b785025cc44abb3b0caf282c09a6ad58d1df019dd12ea57d49fbd4b46ff867393fc2dedf2901a6a607e17630292797504784a9979a21372703d247daffc651f264893d1eaf5433edcf0407ae06a6f58c247d9b965a66c28d5b1e086b84ed930085d8ac68fa29349b112738de73adae180c860116abfb203f914f8d399e620659eb000b1e6e9e3761b5eec76d0c53accce0d8f7d1e9b86c38b5736b516a31eaa6c86a7a03f1372b16f723ac0b1c662dfd7b89d554098839d6e8968354146f3bdf9aa4b5944546dab99e334b5d341f0adda9320584d2b2bf35f1c5b9b7ac9b7e5b880a5050971f0474ac21c132f42ebe7d9152e314c8ce55dc38fc0b76879d0243a296c1047258ac06d8c521600cad57a483bf578955a429bea95d29b9c51b30a9e5965e9fbf29a1ea482ab95a1326e42aac2a4e1d7da2fea87810fd9888de09c4e5a0c5bb5d72dca959943984ef6aa3c4014e62c34b98cf87423cb3830948f94eacbd2b47fbead9faf2550100ed1b1d62ffa8723eee7a519ade0a780929aed7f2cff7b55fbf4db1045c14a07a1cfd02eecb2bc34f5835c9251c875214b8467d2d0d5840ebe030c2a035b696b1ea639cf0b3a30d480e166e76e7be66e7c9525ba2d71bebf418d4269e90f213b1fcc432dbfb1432dda47cd0d2d74bd8a69f4f78d6ad91e0b31f8744c8bd5b9db57ab3c2993fc1de1b7a88ee49293dc7004ec047ee28cfe0e66f071f64d339f7f1fef96cac710a54c5fa605646f5d33114eb1637123f8a3b705360cbbce6249db8d04ae099c13a6b18d1c4781a858d55bd36ec097cbcb1c3e50ac3ccf7640c1019e4b3039248f53b17b02c30ae3f025a6313dadf6b49139b370e06c3dc366a58cd39b6a1db2dae4b0c66915823f6d719710954444d35ce879b308520597c443a9120c10f1f87799f4f70e674b4d693ff90307eff7767f84a72939c238829142558cbbdc2919aa8feab42b2ce1dbe3e221baf7d7412c9500c076132a17f9e208cda95776a6828e83287ff4903c7de1e3ba214032e2ddbf622917bebde96b19ea8e50a4c1c59bf9563ca6b7bb00a4c28bd07f7556a9b03b9c5df52a5afd57cc538d3667cbdb3680e13ea6e98de080b568e1c513ad9075126ae9a1cc529f47a31306523e5f3d044350f1e3312a6cd72afdc4a544e967894219b0237e639144c56b049ebe5699adf9fd69ca350a005e36f82a7b6e6f6a6290a09ad705c330963606267107b7f531aa09ce0eb37b57d2950242dd87a6097718c4e0a26088ba05ea0213ca7ed7ef06783dbf54e3f2d986a79dcc37f3a85e4c04d34ecc25d9fce591028ef0ae43300b5dacb860b632375c4eca72ea1c50c6f5ec5e0ea862cadc072cf4f1f36bce063cb4b8eea71c2dd8f7a1629b6896d6a2a5fee37e1c5a04d6fec8e8848af26e1e959af458ad73500eb1e03b3613b776929b20081540b2e2be5b0e2daa76b84461e3e1101d3e5c12c9793d3bcf225c21f94df53f22cbe95377f0a1f088ad09416c41b84045306eda7f14052e7dfb49cbc916234e81e9577eb54291065470e26e7d63a724d059b162f524213570f0a23d3825ab0863593c2c5733feb6171a1239367b07ddff41dd69328ec94754d8d479daeed5620f051b6f4ab91c718f468b90431c1dca51fceae23113da46d5828a16a2ba23b68e6c91b2691a48a93c18672ccceda0b64e508f2fbded0b3833cb9da4f8c144111d99cdf3f59e01da9d0e543902a1d99c2478bee50a4979c3048637afa163242e6cf7f922c59c3b4a75a77888ce1a3ff2db8d84a6523f3ec1ec8c79e9e59e19421d9170acd3a0f436c8f1efe1903c2a0abd406c94bda23d2fe7a14dfa71f6e4a1863169730cab810be4279802a387d11dbe175c26d058d35b12c8e0ec1e2ca4e25803ee574599ff947f21bc0f67c36d5ff439a4582278ce6285cac68b1fb900041afbb3afb9c278ae6cd7bb7d73b807eaaf4de71cac0c9cdf7b2bc7a2ae49e6f17fcc947cb1d6a1d09a9338127d1d3fc645402f874774b7e017d430f31a8636cdedd0607c27f67fdfe494d823c39cb78c80c47691119f137324ab87d28e5d8e3a8e5414c0c5f3f331a93b8393d6a2cb1320d11524c58ba044b724b45db01a65ba3f850179eaf54b8d8e835e26b619a1e38250ead3a96c3a08826850d7d4d3ed8dbe0067818ce342ccb29acfa9f5434ad2a3d3c4a708216a6720e441b6d67c9b39b31f0b489cea972e235270543626afd249a35e416bad0e1c737bfd3ba8a16b503a191b3224994158e60437ff81b920fc90cb54fd0926d535a736984eaa87cb839fa71b", 0xffe, 0x3}, {&(0x7f0000001300)="6e00c91d43760e7d28f7fd48d1c8f8b4cb68f82a", 0x14, 0xd0b64ef00000000}, {&(0x7f0000001340)}], 0x1820a0, &(0x7f00000014c0)={[{@auto_da_alloc}, {@mblk_io_submit}], [{@uid_lt={'uid<', 0xffffffffffffffff}}, {@smackfsroot={'smackfsroot', 0x3d, '\')\\)-]\x00'}}, {@obj_type={'obj_type', 0x3d, '\\:\'}*)'}}, {@dont_appraise}]}) symlink(0x0, &(0x7f0000001600)='./file0\x00') r0 = syz_mount_image$ext4(&(0x7f0000001c00)='ext4\x00', &(0x7f0000001c40)='./file0\x00', 0x80000001, 0x6, &(0x7f0000002040)=[{&(0x7f0000001c80)="7d82684eefa6270e44a8cf54d9c49d2083df8a7a6ea7ce25eaf3adee56c737c6765d6ca5733ea8edc0d05c44e30af8388f14246df2458185daae840e4f1283c5f3bbd9d79e4d9119a00816b8a9120210133ee53ff4633074093b105877e41761c861c040", 0x64, 0x603}, {&(0x7f0000001d00)="d7857c56c38abdfa9260aaa801257927220e2cba3a44b9d3e78122e7d92c8d604fa2130d48698d9228b7c372ba6e48d755fc74a786f885cd42b44c0de5936924482cf27106670bb9b6e12c834f395d8554aad444657965c26f1066b079e0746e4215d9f7e2214d9d43742183ade577b547feb254ba146392fb888eea6f070561a590d1648031884c297f53a2776bade46d2ac75d077b751eb550d90fd70ced8b4410d9f2a1aca69fbfe7c0b6ade5e6ef7239d5dee19c32c9fbeaef2db9d1cdfec0ba8a626038fb5bd3efcb7e91cab74565251cf003410b8d41be13da26abac4c6f21ec8ad3036374de1adc", 0xeb, 0x5}, {&(0x7f0000001e00)="2a3a76675e470580c3b6262b8021e7f9d1322d5d7c6c3479bc20ab7ae2c695e772ebc84fea45447590bceeedd30973a64fb4ad000a4fd3487c77ddbb89269b4f782a93acd1e459edba9ec1a78762ceeec4ffabccc2d526961d1ae6826dc9131983484a996f4041713c3d6bbf574de62a8616d598f42634b92cad7301b40a30561b952eb39ffe3a16fc392b3c0e835a", 0x8f, 0x4}, {&(0x7f0000001ec0)="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", 0xfc, 0xaf9f}, {&(0x7f0000001fc0)="647fce0f3b9215e5f4b1455861e7f8a84133b951", 0x14, 0x5}, {&(0x7f0000002000)="c55e800df3d9ba8277415ca6df55bcd3db023a19d293e8b3ef2025110e4fd82b9dda58185239c346", 0x28, 0x8}], 0x0, &(0x7f0000002100)={[{@bh}, {@nolazytime}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x1d7}}, {@prjquota}, {@data_writeback}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7}}, {@grpid}, {@nombcache}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xffff}}], [{@uid_gt}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@permit_directio}, {@fsname={'fsname', 0x3d, 'smackfsroot'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/#^:'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise_type}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@fsname}]}) mknodat$null(r0, &(0x7f0000002280)='./file1\x00', 0x20, 0x103) 23:18:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13", 0x78}], 0x1}, 0x0) 23:18:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000016b00)) [ 762.457934][ T24] audit: type=1326 audit(1641338323.506:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=20195 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf6f16549 code=0x0 [ 762.547229][ T24] audit: type=1326 audit(1641338323.556:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=20195 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=40000003 syscall=6 compat=1 ip=0xf6f16549 code=0x0 23:18:43 executing program 5: getrlimit(0x4, &(0x7f0000000000)) r0 = socket$netlink(0x10, 0x3, 0x3) getsockopt$SO_COOKIE(r0, 0x1, 0x10, &(0x7f0000000080), &(0x7f0000000200)=0x8) ioctl$FIONCLEX(r0, 0x5450) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000240)={0x1, 'ip6erspan0\x00', {}, 0x7}) r1 = socket$netlink(0x10, 0x3, 0x1) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x5450, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000180)={0x1, 'hsr0\x00'}) fcntl$getflags(r1, 0x401) getsockopt$SO_COOKIE(r1, 0x1, 0x10, &(0x7f0000000040), &(0x7f0000000140)=0x8) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0x5451, 0x0) semget$private(0x0, 0x2, 0x398) r2 = semget$private(0x0, 0x2, 0x2a8) shmctl$SHM_UNLOCK(r2, 0xc) [ 762.690057][T20202] loop2: detected capacity change from 0 to 8 23:18:44 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e", 0x81}], 0x1}, 0x0) 23:18:44 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x3d3640, 0x0) 23:18:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000016b00)) 23:18:44 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYBLOB="00012abd7000fedbdf2545000000080001007063690011000200303030303a30303a31302e300000000008008e00030000000e0001006e655464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e000100000073ff01006e657464657673696d0001000000000000007464657673696d30000008008e00030000000e0001006e657464657673696d0000000f0002006e657464657673696d30510008008e00000000005a8ae51da72bf276c93e0baf635876b5c4aa6ddffa99bbaaafcdfb48dffa8472a1e79d997f468a873f85136ce9c42a8f1af71af25a0786d4dafeaf89063b1e69b2f56051a8711f3be6be0310dc"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e", 0x81}], 0x1}, 0x0) 23:18:44 executing program 5: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) readv(r0, 0x0, 0x0) 23:18:44 executing program 2: shmget$private(0x0, 0x1000, 0x8, &(0x7f0000ffc000/0x1000)=nil) 23:18:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000016b00)) 23:18:45 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000000a80), 0x0, 0x0) 23:18:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e", 0x81}], 0x1}, 0x0) 23:18:45 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x5450, 0x0) 23:18:45 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:45 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:45 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@empty, @local, @val, {@ipv4}}, 0x0) 23:18:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000016b00)) 23:18:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000000), &(0x7f0000000040)=0xc) 23:18:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa", 0x85}], 0x1}, 0x0) 23:18:45 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000100), 0x90) 23:18:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 23:18:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa", 0x85}], 0x1}, 0x0) 23:18:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:46 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa", 0x85}], 0x1}, 0x0) [ 765.350169][T20264] loop0: detected capacity change from 0 to 256 23:18:46 executing program 4: socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:46 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendto(r1, &(0x7f0000000040)="6500fc08d5fb8ac2a63e68b03fc6ac6d7dc2afdd4ce1514b46b3e33086db59765bec5e1f2be06fb82d76077643c0460558328dc52ded75a5e90b6c5a12dd9007ab6f65e7f7c264c79fae125ab69765c21fba6c1e0bfebcdafa21e9ccf9f8208482fe0ccac198fb1eb9c4b03d1edf91acdb30894f31fdb252c0c17b2bf3ebf62dd807b6ee78526e70a440643df71215a2887f2ace0524ecff62", 0x99, 0x0, &(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) 23:18:46 executing program 5: linkat(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0xffffffffffffff9c, 0x0, 0x0) 23:18:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d", 0x87}], 0x1}, 0x0) 23:18:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000000), 0x8) [ 766.062612][T20328] loop0: detected capacity change from 0 to 256 23:18:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:47 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) 23:18:47 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d", 0x87}], 0x1}, 0x0) 23:18:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000001c0)=ANY=[], &(0x7f00000002c0)=0x1c) [ 766.604289][T20389] loop0: detected capacity change from 0 to 256 23:18:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:48 executing program 4: socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d", 0x87}], 0x1}, 0x0) 23:18:48 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000140)=ANY=[@ANYBLOB="01200000", @ANYRES32=0x0], &(0x7f0000001700)=0x8) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f0000000340)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x19, &(0x7f0000000000), 0x8) 23:18:48 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x10280, 0x0) [ 767.184621][T20500] loop0: detected capacity change from 0 to 256 23:18:48 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d23", 0x88}], 0x1}, 0x0) 23:18:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001b40)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), 0xb) 23:18:48 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000140)=ANY=[@ANYRES32=0x0], &(0x7f0000001700)=0x8) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x19, &(0x7f0000000000), 0x8) [ 767.807285][T20517] loop0: detected capacity change from 0 to 256 23:18:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d23", 0x88}], 0x1}, 0x0) 23:18:49 executing program 2: r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 23:18:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:49 executing program 4: socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:49 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:49 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x1f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 23:18:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="89000000120081ae08060c28559b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a2093b837dc6cc01e32ef5680277bec00120c00010005080c00bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d23", 0x88}], 0x1}, 0x0) [ 768.433206][T20532] loop0: detected capacity change from 0 to 256 23:18:49 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 23:18:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed352", 0x24, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000100)={0x0, 0x15b, 0x8001, 0x5}, 0x8) 23:18:50 executing program 5: clock_gettime(0x0, &(0x7f0000007a00)) shmget$private(0x0, 0x800000, 0x0, &(0x7f00007ff000/0x800000)=nil) shmat(0x0, &(0x7f000085a000/0x1000)=nil, 0x4000) 23:18:50 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') [ 769.200059][T20618] loop0: detected capacity change from 0 to 256 23:18:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000100), 0x90) 23:18:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed352", 0x24, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x1f, &(0x7f0000000000), 0x4) 23:18:50 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:50 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:18:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x10, 0x2}, 0x10) [ 769.909492][T20668] loop0: detected capacity change from 0 to 256 23:18:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000000), &(0x7f00000000c0)=0xb0) 23:18:51 executing program 5: r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 23:18:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed352", 0x24, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:51 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f00000000c0), 0x8) [ 770.435583][T20678] loop0: detected capacity change from 0 to 256 23:18:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000380)=ANY=[], 0xb4}, 0x0) 23:18:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000100), 0x10) 23:18:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:51 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f00000001c0), &(0x7f0000000000)=0x88) 23:18:52 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 771.227461][T20695] loop0: detected capacity change from 0 to 256 23:18:52 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:52 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x1d, &(0x7f0000000040), 0x8) 23:18:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000100), 0x90) 23:18:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:52 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000240)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@authinfo={0x10}], 0x10}, 0x0) 23:18:53 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000001a80)="c2", 0x1, 0x0, &(0x7f0000001b40)={0x10, 0x2}, 0x10) [ 772.226215][T20812] loop0: detected capacity change from 0 to 256 23:18:53 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) dup2(r0, r1) 23:18:53 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:53 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:53 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@sndrcv={0x2c}], 0x2c}, 0x0) 23:18:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x7}, 0x10) [ 773.083112][T20929] loop0: detected capacity change from 0 to 256 23:18:54 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x0, 0x1, 'n'}, 0x9) 23:18:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) 23:18:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4", 0x3f, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, 0x0, 0x0) 23:18:54 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 773.907339][T20947] loop0: detected capacity change from 0 to 256 23:18:55 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x2, 0x6, 0x1}, 0x10) 23:18:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000240), 0x8) 23:18:55 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4", 0x3f, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:55 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000040)="db", 0x1}], 0x1}, 0x100) 23:18:55 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000001c0), &(0x7f0000000000)=0x98) 23:18:55 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) recvmsg(r1, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=""/171, 0xab}, 0x400c3) [ 774.511597][T20964] loop0: detected capacity change from 0 to 256 23:18:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4", 0x3f, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001b40)={0x10, 0x2}, 0x10) 23:18:56 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:56 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:56 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 23:18:56 executing program 3: socket$inet6_sctp(0x1c, 0x5, 0x84) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x100) [ 775.249116][T21075] loop0: detected capacity change from 0 to 256 23:18:56 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/190, 0xbe}, 0x3) 23:18:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:57 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 23:18:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x10, 0x2}, 0x10) [ 776.011197][T21098] loop0: detected capacity change from 0 to 256 23:18:57 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:57 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:57 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt(r0, 0x0, 0x0, 0x0, 0x0) 23:18:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:57 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 23:18:57 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x2, 0x1c, 0x1}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) [ 776.995034][T21275] loop0: detected capacity change from 0 to 256 23:18:58 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:18:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x8, &(0x7f0000000000), 0x4) 23:18:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f0000000040)=0x8) 23:18:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000000080), 0x4) [ 777.560565][T21329] loop0: detected capacity change from 0 to 256 23:18:58 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000140)=ANY=[@ANYRES32=0x0], &(0x7f0000001700)=0x8) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f0000000340)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x19, &(0x7f0000000000), 0x8) 23:18:58 executing program 4: r0 = socket$kcm(0x11, 0x0, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:18:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x2, 0x6, 0x1}, 0x10) 23:18:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) 23:18:59 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') [ 778.079424][T21347] loop0: detected capacity change from 0 to 256 23:18:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000016b00)) 23:18:59 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x1d, &(0x7f0000000040)={0x0, 0xffff}, 0x8) 23:18:59 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000000), 0x8) 23:18:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081094e81f782db4cb904021d080006007c09e8fe55a10a0015000600142603600e1208000f0000000401a800160008000200e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 778.610803][T21355] loop0: detected capacity change from 0 to 256 [ 778.799102][T21365] netlink: 'syz-executor.3': attribute type 21 has an invalid length. [ 778.808191][T21365] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.3'. [ 778.820004][T21365] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 23:18:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000016b00)) 23:19:00 executing program 4: r0 = socket$kcm(0x11, 0x0, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:00 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000740)="bc", 0x1}], 0x1, &(0x7f00000005c0)}, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000440)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000700)=[{&(0x7f00000000c0)="8e", 0x1}], 0x1, &(0x7f0000000100)=[{0x20, 0x84, 0x8, "03e330e03c443a3b23"}], 0x20, 0xfe80}, 0x0) 23:19:00 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(0x0, &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:19:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001940)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x20000102) 23:19:00 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"/1417], &(0x7f0000000100)='GPL\x00'}, 0x48) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 779.332716][T21467] loop0: detected capacity change from 0 to 256 23:19:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000016b00)) [ 779.923943][T21583] loop0: detected capacity change from 0 to 256 23:19:01 executing program 2: socketpair(0xa, 0x3, 0x0, &(0x7f0000001cc0)) 23:19:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000016b00)) 23:19:01 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="00012abd7000fedbdf2545000000080001007063690011000200303030303a30303a31302e300000000008008e00030000000e0001006e655464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e000100000073ff01006e657464657673696d0001000000000000007464657673696d30000008008e00030000000e0001006e657464657673696d0000000f0002006e657464657673696d30510008008e00000000005a8ae51da72bf276c93e0baf635876b5c4aa6ddffa99bbaaafcdfb48dffa8472a1e79d997f468a873f85136ce9c42a8f1af71af25a0786d4dafeaf89063b1e69b2f56051a8711f3be6be0310dc"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(0x0, &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:19:01 executing program 5: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @dev}}}], 0x20}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000002700)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:19:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f000001bd40)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f000001bc40)=""/241, 0x35, 0xf1, 0x1}, 0x20) 23:19:01 executing program 4: r0 = socket$kcm(0x11, 0x0, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 780.456883][T21590] loop0: detected capacity change from 0 to 256 23:19:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000016b00)) 23:19:02 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x0, 0x20, 0x1}, 0x48) 23:19:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002540)={0x18, 0x3, &(0x7f0000002340)=@framed, &(0x7f00000023c0)='syzkaller\x00', 0x5, 0xaa, &(0x7f0000002400)=""/170, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:19:02 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(0x0, &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') [ 781.190991][T21603] loop0: detected capacity change from 0 to 256 23:19:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48}], 0x0, &(0x7f0000016b00)) 23:19:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="d800000018008105e00f80ecdb4cb904021d010000007c05e8fe55a10a0012000200082603000e120800060000000001a8000b0004001000e53ef030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb7dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad8ece0b42a9ecbee5de660a1d339e903c8af730eeee6a8ccd40dd6e4edef3d93452ac5ba54ff2089bb054c9766e9f28f93", 0xd8}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 23:19:02 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="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", 0x1b9}, {&(0x7f0000000440)="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", 0xd09}], 0x2}, 0x0) close(r1) 23:19:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}}, &(0x7f0000000400)=""/132, 0x26, 0x84, 0x1}, 0x20) 23:19:02 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 781.823357][T21615] netlink: 'syz-executor.3': attribute type 11 has an invalid length. 23:19:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48}], 0x0, &(0x7f0000016b00)) 23:19:03 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:19:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f00000061c0)=[{{&(0x7f00000006c0)=@l2tp6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}}, 0x80, 0x0}}], 0x1, 0x0) 23:19:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xcb, &(0x7f0000000000), 0x4) 23:19:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x6, 0x4) 23:19:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48}], 0x0, &(0x7f0000016b00)) 23:19:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x101}, 0x14}}, 0x0) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x8, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 23:19:03 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f00000087c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 23:19:03 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYBLOB='\x00', @ANYRES32], 0x58}, 0x0) 23:19:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:19:04 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f0000000040)) 23:19:04 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:04 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="00012abd7000fedbdf2545000000080001007063690011000200303030303a30303a31302e300000000008008e00030000000e0001006e655464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e000100000073ff01006e657464657673696d0001000000000000007464657673696d30000008008e00030000000e0001006e657464657673696d0000000f0002006e657464657673696d30510008008e00000000005a8ae51da72bf276c93e0baf635876b5c4aa6ddffa99bbaaafcdfb48dffa8472a1e79d997f468a873f85136ce9c42a8f1af71af25a0786d4dafeaf89063b1e69b2f56051a8711f3be6be0310dc"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:19:04 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 23:19:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x4, 0x280}, 0x48) [ 783.473172][T21649] loop0: detected capacity change from 0 to 256 23:19:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000002c0), 0x4) 23:19:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:19:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f00000030c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10002, 0x0) [ 784.003312][T21662] loop0: detected capacity change from 0 to 256 23:19:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0xfffffffc, 0x4) 23:19:05 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="00012abd7000fedbdf2545000000080001007063690011000200303030303a30303a31302e300000000008008e00030000000e0001006e655464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e000100000073ff01006e657464657673696d0001000000000000007464657673696d30000008008e00030000000e0001006e657464657673696d0000000f0002006e657464657673696d30510008008e00000000005a8ae51da72bf276c93e0baf635876b5c4aa6ddffa99bbaaafcdfb48dffa8472a1e79d997f468a873f85136ce9c42a8f1af71af25a0786d4dafeaf89063b1e69b2f56051a8711f3be6be0310dc"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000000640)='./file1\x00') 23:19:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x4c8, 0x0, 0x61, 0x148, 0x40a, 0x148, 0x430, 0x223, 0x230, 0x430, 0x205, 0x3, 0x0, {[{{@ip={@local={0xac, 0x9}, @empty=0x204, 0x0, 0x0, 'ip6gretap0\x00', 'sit0\x00'}, 0x0, 0x2c8, 0x310, 0x0, {0x34000000f0030000, 0x2b0}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @bytecode={0x2}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x5, 'syz0\x00'}}}, {{@ip={@broadcast, @rand_addr, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x528) 23:19:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000740), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670e3acfe92b0000010000000000010000fffffff4005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 784.506911][T21673] loop0: detected capacity change from 0 to 256 23:19:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x1c, 0x2, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 23:19:05 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:05 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000340)={0x8, 'vlan1\x00', {'team0\x00'}}) 23:19:06 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x48, &(0x7f0000000000), 0x4) 23:19:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40286608, &(0x7f0000000200)) 23:19:06 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(0x0, &(0x7f0000000640)='./file1\x00') 23:19:06 executing program 5: socketpair(0x6, 0x0, 0x0, &(0x7f00000003c0)) 23:19:06 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) connect$can_j1939(r0, &(0x7f0000003500), 0x18) 23:19:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r1, 0x1}, 0x14}}, 0x0) 23:19:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_STATUS={0x5}]}, 0x1c}}, 0x0) 23:19:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000003d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 23:19:06 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000180)=[{}, {}], 0x40) 23:19:07 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0), r0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0xe3bc0a0e3400eccf}, 0x14}}, 0x0) 23:19:07 executing program 4: socket$kcm(0x11, 0x2, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:07 executing program 2: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(0xffffffffffffffff, 0x0, 0x40040) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001700)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r0) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x30, r2, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x17, {0xd, 0x3, @l2={'eth', 0x3a, 'wg1\x00'}}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x800) 23:19:07 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(0x0, &(0x7f0000000640)='./file1\x00') 23:19:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x4c8, 0x0, 0x61, 0x148, 0x40a, 0x148, 0x430, 0x223, 0x230, 0x430, 0x205, 0x3, 0x0, {[{{@ip={@local={0xac, 0x9}, @empty=0x204, 0x0, 0x0, 'ip6gretap0\x00', 'sit0\x00'}, 0x0, 0x2c8, 0x310, 0x0, {0x34000000f0030000, 0x2b0}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @bytecode={0x2, 0x0, 0x0, [{0x0, 0x0, 0x0, 0x6}]}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x5, 'syz0\x00'}}}, {{@ip={@broadcast, @rand_addr, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x528) [ 786.344805][T21709] tipc: Enabling of bearer rejected, failed to enable media 23:19:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000080)=""/246, 0x26, 0xf6, 0x1}, 0x20) 23:19:07 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000002c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_KEY={0x18, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0x14, 0x4, "a54a0b0a79c5b27cc35a7bd8cea48b44"}]}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x38}}, 0x0) 23:19:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'bond_slave_1\x00', {}, 0x400}) 23:19:07 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid_for_children\x00') 23:19:08 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0xc, 0x0, 0x0) 23:19:08 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000180)='ns/pid_for_children\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') 23:19:08 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="00012abd7000fedbdf2545000000080001007063690011000200303030303a30303a31302e300000000008008e00030000000e0001006e655464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e000100000073ff01006e657464657673696d0001000000000000007464657673696d30000008008e00030000000e0001006e657464657673696d0000000f0002006e657464657673696d30510008008e00000000005a8ae51da72bf276c93e0baf635876b5c4aa6ddffa99bbaaafcdfb48dffa8472a1e79d997f468a873f85136ce9c42a8f1af71af25a0786d4dafeaf89063b1e69b2f56051a8711f3be6be0310dc"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(0x0, &(0x7f0000000640)='./file1\x00') 23:19:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'veth0_macvtap\x00', {}, 0x3}) 23:19:08 executing program 4: socket$kcm(0x11, 0x2, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', {0x12}, 0x3}) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_ifreq(0xffffffffffffffff, 0x8921, &(0x7f0000000040)={'veth0_to_bridge\x00', @ifru_mtu}) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, 0x0) 23:19:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000040)=0x5, 0x4) 23:19:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x44, 0x2, 0x9, 0x801, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev}}}]}]}, 0x44}}, 0x0) 23:19:08 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg$nfc_llcp(r0, &(0x7f00000034c0)=[{&(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ae93662a4bdeefd07161b68a81e7a3171ca83cccb285ec495b329723d41d53e9cedb71741d346d0659538fa9896c0df4241a3637ac2230838c99c6360fc739"}, 0x60, 0x0, 0x0, &(0x7f0000001580)=ANY=[], 0xd0}], 0x1, 0x0) 23:19:08 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000040)) [ 787.781449][T21743] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 23:19:08 executing program 3: r0 = socket$caif_stream(0x25, 0x1, 0x0) sendto$packet(r0, 0x0, 0x0, 0x851, 0x0, 0x0) 23:19:09 executing program 5: epoll_create1(0x7f2ae562d074c76b) 23:19:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x14, 0x6, 0x1, 0x5}, 0x14}}, 0x0) 23:19:09 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000), 0x4) 23:19:09 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', 0x0) 23:19:09 executing program 3: sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, 0x0, 0x4000010) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), r0) sendmsg$NL802154_CMD_NEW_SEC_DEV(0xffffffffffffffff, 0x0, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, 0x0) 23:19:09 executing program 4: socket$kcm(0x11, 0x2, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:09 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000b00), 0xffffffffffffffff) 23:19:09 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) 23:19:09 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), 0xffffffffffffffff) 23:19:09 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040), 0x10) 23:19:09 executing program 2: socketpair(0x2b, 0x0, 0x0, &(0x7f00000000c0)) 23:19:10 executing program 0: socketpair(0x22, 0x800, 0xfffffffd, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$unlink(0x9, r3, 0xfffffffffffffffd) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, r5, 0x6) keyctl$set_timeout(0xf, r5, 0x100000001) keyctl$set_timeout(0xf, r3, 0xfb) keyctl$read(0xb, r4, &(0x7f00000000c0)=""/20, 0x14) r6 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "ecd439ebc8c7b30267335da214427c1535ad7b272c75c242a1716e5657de7de0c258760993d8c3c4ee97b39de3f5eeeec76a39f00cda4e74536702e7c038a21a", 0x21}, 0x48, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r6, &(0x7f00000002c0)='rxrpc_s\x00', &(0x7f0000000300)=@keyring) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000340)={'batadv_slave_1\x00'}) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc3}, &(0x7f0000000400)={0x0, "7e3ec790f9be8b316085503b37883d947426160643dc381385e56a9ee7b99eda1be29a5e3a94454bcfc198f37d42b7836f33846f462a7ade0e7456c436c4de03", 0x18}, 0x48, 0xfffffffffffffffc) keyctl$update(0x2, r2, &(0x7f0000000080)="e870d269f37cca3dc5460c8f46935a319ab6bba21c9d80c5250d8515ddad4246efc3cc8b362d0deeab8fa02162f42ce14c0bc88c410d60b110b0efd1", 0x3c) 23:19:10 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="00012abd7000fedbdf2545000000080001007063690011000200303030303a30303a31302e300000000008008e00030000000e0001006e655464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e000100000073ff01006e657464657673696d0001000000000000007464657673696d30000008008e00030000000e0001006e657464657673696d0000000f0002006e657464657673696d30510008008e00000000005a8ae51da72bf276c93e0baf635876b5c4aa6ddffa99bbaaafcdfb48dffa8472a1e79d997f468a873f85136ce9c42a8f1af71af25a0786d4dafeaf89063b1e69b2f56051a8711f3be6be0310dc"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', 0x0) 23:19:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x75f, 0x103302) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 23:19:10 executing program 3: setitimer(0x0, 0x0, &(0x7f0000000140)) 23:19:10 executing program 2: io_setup(0xfff, &(0x7f0000006640)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 23:19:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)="1f", 0x1, r0) keyctl$read(0xb, r1, &(0x7f0000000580)=""/182, 0xb6) [ 789.503284][T21783] syz-executor.3 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 23:19:10 executing program 3: timer_create(0x2, 0x0, &(0x7f0000000380)) timer_gettime(0x0, &(0x7f0000000000)) 23:19:10 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc(&(0x7f0000000540), 0xffffffffffffffff) syz_genetlink_get_family_id$tipc(&(0x7f00000005c0), 0xffffffffffffffff) keyctl$update(0x2, r0, 0x0, 0x0) 23:19:10 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:10 executing program 2: syz_open_procfs$userns(0x0, &(0x7f0000000000)) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000500)) 23:19:10 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x6, @thr={0x0, 0x0}}, 0x0) 23:19:11 executing program 1: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1fd8068b6725e2de}, 0x240040c0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x1, @perf_config_ext={0x8}, 0x8200}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) truncate(&(0x7f0000000480)='./file0\x00', 0x0) r3 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x3, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c1069ef8173fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000880)="57595a4b414c4c45522020085ac19f69ca3f67c1f667900ac9135eed1df1d1001cc2de870f1fffb2aed768634ef7e75effac2ac4c15e11fb3c18fafff8d198e312475ffa1d00000000100dad25822a17b17f463e1001776fc3077550093eadaaa294ff597d7780e6ec4f62826086704d", 0x70, 0x600}, {0x0, 0x0, 0x10e00}], 0x28104c0, &(0x7f00000003c0)={[{@utf8no}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8c}}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100}}, {@rodir}, {@fat=@quiet}]}) mknodat$loop(r3, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bind$packet(r1, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x63, 0x6, @remote}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000011000150507d1fc74e85d1e1cb45b2bc", @ANYRES32=r2, @ANYBLOB="01840010000000001400350073022470919d9811e500000000000000"], 0x34}}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c80)=ANY=[@ANYRESOCT=r4, @ANYRESOCT, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40001}, 0x44845) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file1\x00', 0x0) 23:19:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$describe(0x6, r0, 0x0, 0x0) 23:19:11 executing program 5: set_mempolicy(0xce5ddf0717bf2f09, 0x0, 0x0) 23:19:11 executing program 0: sched_rr_get_interval(0x0, &(0x7f00000000c0)) 23:19:11 executing program 2: r0 = gettid() ptrace$setregset(0x4205, r0, 0x0, 0x0) 23:19:11 executing program 5: r0 = semget(0x2, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000013c0)={{0x2, 0x0, 0x0, 0x0, 0xee00}}) 23:19:11 executing program 3: pselect6(0x40, &(0x7f00000018c0), &(0x7f0000001900), 0x0, &(0x7f00000019c0), &(0x7f0000001a40)={&(0x7f0000001a00), 0xfffffffffffffd03}) 23:19:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000040)="14000000340005877f5f33dea3686a0d0835fc60", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 23:19:11 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) 23:19:12 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:12 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000040), 0x0, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000080)={0x0, "decb62cefdc0a6e608fb12190ac16fc5508a20f84ab456d508208bcff36ce726"}) 23:19:12 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000003580), 0x2, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000400)) 23:19:12 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000001440), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000001240)={0x0, 0x8, &(0x7f0000000240)="293b67e6b680813c"}) 23:19:12 executing program 0: syz_open_dev$hiddev(&(0x7f00000009c0), 0x101, 0x0) ioctl$HIDIOCGUSAGES(0xffffffffffffffff, 0xd01c4813, 0x0) 23:19:12 executing program 2: syz_usb_connect$uac1(0x0, 0x86, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x74, 0x3, 0x1, 0x0, 0x40, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7, 0x24, 0x1, 0x0, 0x0, 0x3}, @format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x0, 0x0, 0xc9}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x2, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x7, {0x7}}}}}}}]}}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) syz_usb_connect$cdc_ecm(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect$uac1(0x0, 0x0, 0x0, 0x0) 23:19:12 executing program 1: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x5, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0xe0}}}}}}]}}, &(0x7f0000000500)={0x0, 0x0, 0x5, &(0x7f00000001c0)={0x5, 0xf, 0x5}}) 23:19:12 executing program 3: syz_usb_connect(0x6, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x65, 0x3d, 0x51, 0x0, 0x1199, 0x68a3, 0x2e77, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4c, 0xb6, 0x5a}}]}}]}}, 0x0) syz_usb_connect(0x0, 0x36, &(0x7f0000000cc0)={{0x12, 0x1, 0x0, 0xbb, 0xd7, 0xa2, 0x8, 0xbb4, 0xa11, 0x7633, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0xae, 0xbf, 0xf9, 0x0, [], [{}, {{0x9, 0x5, 0x0, 0x0, 0x10}}]}}]}}]}}, 0x0) 23:19:12 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0xc8, 0x0, 0x0) 23:19:12 executing program 0: r0 = socket(0x25, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000180)={'tunl0\x00', 0x0, 0x0, 0x7800, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast1}}}}) 23:19:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000000080)) [ 791.862636][ T25] usb 3-1: new high-speed USB device number 22 using dummy_hcd 23:19:13 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x0, 0x0, "6e5cb2"}) [ 791.994417][ T3569] usb 4-1: new high-speed USB device number 52 using dummy_hcd [ 792.102900][ T25] usb 3-1: Using ep0 maxpacket: 8 [ 792.223211][ T25] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 792.233731][ T25] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 792.242990][ T25] usb 3-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 792.253670][ T25] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 23:19:13 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:13 executing program 5: syz_io_uring_setup(0x5c9f, &(0x7f0000000700), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) 23:19:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, 0x0, 0xb, 0x101, 0x0, 0x0, {0x3}, [@NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0x9, 0x1, 'gre0\x00'}, @NFTA_COMPAT_REV={0x8}]}, 0x30}}, 0x0) 23:19:13 executing program 1: read$FUSE(0xffffffffffffffff, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000006280), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000006340), &(0x7f0000006380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 792.272508][ T3569] usb 4-1: Using ep0 maxpacket: 8 [ 792.393177][ T3569] usb 4-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 792.405660][ T3569] usb 4-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping 23:19:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x8105}}], 0x30}, 0x0) [ 792.585100][ T3569] usb 4-1: New USB device found, idVendor=0bb4, idProduct=0a11, bcdDevice=76.33 [ 792.594652][ T3569] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 792.603002][ T3569] usb 4-1: Product: syz [ 792.608815][ T3569] usb 4-1: Manufacturer: syz [ 792.613925][ T3569] usb 4-1: SerialNumber: syz [ 792.672901][ T25] usb 3-1: string descriptor 0 read error: -22 [ 792.679455][ T25] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 792.688811][ T25] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 792.765416][ T3569] usb 4-1: config 0 descriptor?? [ 792.831304][ T25] usb 3-1: 0:2 : does not exist [ 793.007611][ T25] usb 4-1: USB disconnect, device number 52 [ 793.030654][ T3552] usb 3-1: USB disconnect, device number 22 [ 793.136268][T20130] udevd[20130]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory 23:19:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0xf, 0x0, &(0x7f0000000540)) 23:19:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x12, 0x0, &(0x7f0000000140)) 23:19:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000040)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) 23:19:14 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000063c0), 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000006340), &(0x7f0000006380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000008440)={{'fd', 0x3d, r0}}) 23:19:14 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) [ 793.726313][T21864] fuse: Bad value for 'fd' 23:19:14 executing program 0: syz_mount_image$hfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)={[{@session}], [{@euid_lt={'euid<', 0xee00}}]}) 23:19:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x20, 0x0, 0xffff, 0x6}, 0x8) 23:19:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, 0x0, &(0x7f0000000040)) 23:19:15 executing program 3: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x32, 0x22, 0x84, 0x40, 0x424, 0x9d00, 0xfc2a, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x5b, 0x77, 0x69}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f00000004c0)={0x2c, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000000b40)={0x84, &(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000c40)={0x84, &(0x7f0000000780)=ANY=[@ANYBLOB="10f4ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 23:19:15 executing program 2: io_uring_setup(0x58a2, &(0x7f0000000180)={0x0, 0x9d5b, 0x0, 0x0, 0x282}) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNAPSHOT_UNFREEZE(0xffffffffffffffff, 0x3302) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) unshare(0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$snapshot(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) [ 794.137987][T21870] hfs: unable to parse mount options 23:19:15 executing program 1: shmget(0x3, 0x2000, 0x4, &(0x7f0000ffa000/0x2000)=nil) [ 794.252317][ T3569] Bluetooth: hci0: command 0x0401 tx timeout 23:19:15 executing program 0: add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3091", 0x2, 0xfffffffffffffffc) 23:19:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x12, 0x0, 0x0) 23:19:15 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 794.563004][ T25] usb 4-1: new high-speed USB device number 53 using dummy_hcd 23:19:15 executing program 1: keyctl$update(0x18, 0x0, &(0x7f0000000040), 0x0) 23:19:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x7be2e8fc}, 0x8) 23:19:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000005c0)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @tclass={{0x14}}], 0x30}, 0x0) [ 794.923636][ T25] usb 4-1: New USB device found, idVendor=0424, idProduct=9d00, bcdDevice=fc.2a [ 794.933313][ T25] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 23:19:16 executing program 5: r0 = socket(0x2a, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:19:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000140)) [ 795.033935][ T25] usb 4-1: config 0 descriptor?? 23:19:16 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000280), &(0x7f0000000140)={0x0, "7ae3e9b00012008bcbba8ded88d49c2e6c205509b4aa8aef3a05f1f83eb009866d64ed19a3989860f52f85c308e469de7f00a400"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) [ 796.832306][ T25] smscufx: Failed to read register index 0x0000700c [ 796.838985][ T25] smscufx: ufx_reg_clear_and_set_bits error reading 0x700c [ 796.839028][ T25] smscufx: error clearing PLL1 bypass in 0x700C [ 796.846577][ T25] smscufx: error -71 configuring system clock [ 796.854378][ T25] smscufx: probe of 4-1:0.0 failed with error -71 [ 796.885029][ T25] usb 4-1: USB disconnect, device number 53 23:19:18 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000100)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 23:19:18 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "7ae3e9b0001284fcc3e564125a826ced973b94008bcbba8ded88d49c2e6c205509b4aa8aef3a05b1f83eb009866d64ed19a3989860f52f85c308e469de7f00a4"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x10, r0, 0x0, 0x0) 23:19:18 executing program 1: msgsnd(0x0, &(0x7f0000000280)={0x3}, 0x8, 0x0) r0 = socket(0x11, 0x80000, 0x4) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000180)=0x9, 0x4) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe96) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @rand_addr, @dev}, &(0x7f0000000240)=0xc) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) recvmsg$kcm(r3, 0x0, 0x0) getsockopt$inet_mreq(r3, 0x0, 0x20, &(0x7f0000000300)={@remote, @multicast2}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x4}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000000c0)={r4, 0x75, "2a4c640c32a21f53635df75cef8cf5710a3b0bca531f2ef63441340878737678e280e96ba247d889a3308103da2993e57bf9b28fd47096963caeec6b4ed49c564e8c6f9fe1673a0e36efda0894ffd3ed819afd462c5fb54121f21c3e4a25db393e80dd74c9f069e702f12cee3c04afbd3c13518766"}, &(0x7f0000000140)=0x7d) 23:19:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000440)) 23:19:18 executing program 2: syz_mount_image$hfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001380)=ANY=[@ANYBLOB='type=W~Tz,umask=']) 23:19:18 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 797.445931][T21905] hfs: unable to parse mount options 23:19:18 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "7ae3e9b0001284fcc3e564125a826ced973b94008bcbba8ded88d49c2e6c205509b4aa8aef3a05b1f83eb009866d64ed19a3989860f52f85c308e469de7f00a4"}, 0x48, 0xfffffffffffffffe) keyctl$update(0x10, r0, 0x0, 0x0) 23:19:18 executing program 5: unshare(0x20040480) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:18 executing program 1: r0 = socket(0x25, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000001540)={'syztnl0\x00', &(0x7f00000014c0)={'sit0\x00', 0x0, 0x29, 0x7a, 0xff, 0x0, 0x0, @remote, @mcast1}}) 23:19:18 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0x1f, 0x6, 0x81, 0x4]) [ 797.753323][T21910] ax25_connect(): syz-executor.3 uses autobind, please contact jreuter@yaina.de 23:19:19 executing program 0: socket(0x28, 0x0, 0xfffffffa) 23:19:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x14, &(0x7f0000000040)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) 23:19:19 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x18, 0x0, 0x0) 23:19:19 executing program 5: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc22e, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x3, [{0x4, &(0x7f0000000300)=@lang_id={0x4}}, {0x4, &(0x7f00000003c0)=@string={0x4, 0x3, "691d"}}, {0x0, 0x0}]}) 23:19:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0xa, &(0x7f0000000040)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) 23:19:19 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:19 executing program 3: r0 = io_uring_setup(0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x200000c, 0x52030, r0, 0x0) unshare(0x0) 23:19:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x21, 0x0, 0x0) 23:19:19 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0xff, 0x4, 0x5, 0x8}, 0x8) 23:19:19 executing program 0: add_key(&(0x7f00000001c0)='ceph\x00', 0x0, &(0x7f0000000240)="dd2cd521a3fd7aac5b0c49bf", 0xc, 0xfffffffffffffffb) 23:19:20 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "7ae3e9b0001284fcc3e564125a826ced973b94008bcbba8ded88d49c2e6c205509b4aa8aef3a05b1f83eb009866d64ed19a3989860f52f85c308e469de7f00a4"}, 0x48, 0xfffffffffffffffe) keyctl$describe(0x6, r0, 0x0, 0x0) 23:19:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1, 0x5, 0x800, 0x4, 0x51, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 23:19:20 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGETNODEID(r0, 0x89e1, 0x0) 23:19:20 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x5452, &(0x7f0000000000)={{0x2, 0x0, @multicast2}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'veth0_virt_wifi\x00'}) 23:19:20 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x87) 23:19:20 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:20 executing program 0: r0 = add_key$keyring(&(0x7f00000006c0), &(0x7f0000000700)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000740)='encrypted\x00', &(0x7f0000000780)={'syz', 0x0}, &(0x7f00000007c0)="83b2f132b46d7a0bae20", 0xa, r0) 23:19:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @multicast}, 0x0, {0x2, 0x0, @loopback}}) 23:19:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x84, 0x81, 0x0, 0x0) 23:19:21 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), 0x4) [ 800.030929][T21957] trusted_key: encrypted_key: master key parameter '' is invalid 23:19:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x22, &(0x7f0000000040)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) 23:19:21 executing program 0: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:19:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000001e00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="18", 0x1}], 0x1}], 0x1, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000003240)=[{&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f0000000240)=[{&(0x7f00000000c0)='l', 0x1}], 0x1}], 0x1, 0x0) 23:19:21 executing program 3: sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x2c, 0x1407, 0x0, 0x70bd28, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="a2e6d7af", 0x4) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="8ddeb5ae6d7e"}, 0x14) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="03040200d1fd"], 0xfdef) [ 800.371180][T21963] sctp: [Deprecated]: syz-executor.2 (pid 21963) Use of int in max_burst socket option deprecated. [ 800.371180][T21963] Use struct sctp_assoc_value instead 23:19:21 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x22, &(0x7f0000001ac0)={0x0, 0x8, "6ca5ccaeb744b830"}, &(0x7f0000001c00)=0x10) 23:19:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x401}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000240)={0x0, 0x1, {0x0, @usage, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x500, @struct={0xfff, 0x7fffffff}, 0x5, 0x3, [0x0, 0x0, 0x8, 0x2, 0x9]}, {0x1f, @struct={0x435}, 0x0, 0x9, 0xc48, 0x2, 0x0, 0x10001, 0x49d, @usage, 0x0, 0x0, [0x0, 0x4, 0x0, 0x0, 0x0, 0x3fe000000]}, {0x0, @usage=0x100, 0x0, 0x0, 0x6, 0x7f, 0x6, 0x0, 0x40, @usage=0x8, 0x0, 0x2, [0x0, 0x3, 0x1ff, 0x3ff, 0x0, 0xd781]}, {0x1ff, 0x7, 0x1000}}) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}, 0x6008, 0x0, 0xfffffffc, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x3, 0x0, &(0x7f0000000a00)=[{&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/123, 0x7b}, {&(0x7f0000000940)=""/157, 0x9d}]}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) syz_io_uring_setup(0x41f3, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x2, 0x0, @fd_index}, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0xe000, 0x0) io_uring_enter(r3, 0x6e11, 0x3e34, 0x2, &(0x7f00000000c0)={[0x101]}, 0x8) 23:19:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000e40)={0xffffffffffffffff}) r1 = socket$xdp(0x2c, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000bc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}}], 0x2, 0x0) 23:19:22 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:22 executing program 3: sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x2c, 0x1407, 0x0, 0x70bd28, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="a2e6d7af", 0x4) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="8ddeb5ae6d7e"}, 0x14) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="03040200d1fd"], 0xfdef) 23:19:22 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000240)=@buf={0x28, &(0x7f0000000000)="3f6653137cd1e7ceaa053f7806f13a18ea48c30557d2d3389aa13163ca7712d785d9bdc1d8b9a3c7"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x0, @empty}}) 23:19:22 executing program 0: r0 = socket(0x2a, 0x2, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000024c0)=[{&(0x7f0000000100)=@in={0x2, 0x0, @empty}, 0x10, 0x0}], 0x1, 0x0) 23:19:22 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x401}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x2, 0x20, 0x0, 0x0}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, 0x0) clone(0xf70a869556b4c51d, 0x0, 0x0, 0x0, 0x0) 23:19:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) set_mempolicy(0x2, &(0x7f0000000100)=0x34b26bc3, 0x9) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000240)=@buf={0x28, &(0x7f0000000000)="3f6653137cd1e7ceaa053f7806f13a18ea48c30557d2d3389aa13163ca7712d785d9bdc1d8b9a3c7"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x0, @empty}}) 23:19:22 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000240)=@buf={0x28, &(0x7f0000000000)="3f6653137cd1e7ceaa053f7806f13a18ea48c30557d2d3389aa13163ca7712d785d9bdc1d8b9a3c7"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) set_mempolicy(0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x0, @empty}}) 23:19:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000001e00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="18", 0x34000}], 0x1}], 0x1, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000003240)=[{&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f0000000240)=[{&(0x7f00000000c0)='l', 0x1}], 0x1}], 0x1, 0x0) 23:19:22 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x18, &(0x7f0000001ac0), &(0x7f0000001c00)=0x8) 23:19:22 executing program 5: r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x200) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000004, 0x30, r1, 0x5005e000) sendfile(r0, r0, &(0x7f0000000200), 0x87) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) 23:19:23 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000001e00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="18", 0x1}], 0x1}], 0x1, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000003240)=[{&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f0000000240)=[{&(0x7f00000000c0)='l', 0x1}], 0x1}], 0x1, 0x0) 23:19:23 executing program 3: bind$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x0, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) r0 = socket(0x11, 0x800000003, 0x0) bind$packet(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x40000020) 23:19:23 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000004940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x9, [@typedef, @typedef, @restrict, @var={0x0, 0x0, 0x0, 0xe, 0x3}, @func_proto, @struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {0xa}, {0x0, 0x0, 0x3}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0]}}, 0x0, 0x9d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 23:19:23 executing program 5: r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x200) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000004, 0x30, r1, 0x5005e000) sendfile(r0, r0, &(0x7f0000000200), 0x87) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) 23:19:23 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3, &(0x7f0000000000)=0x3, 0x8, 0x0) mremap(&(0x7f0000196000/0x3000)=nil, 0x3000, 0x3000, 0x7, &(0x7f000090f000/0x3000)=nil) mlock(&(0x7f0000283000/0x3000)=nil, 0x3000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 23:19:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x401}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000240)={0x0, 0x1, {0x80, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, @usage=0x2, 0x5, 0x3, [0x0, 0x0, 0x8, 0x2, 0x9]}, {0x1f, @struct={0x435}, 0x0, 0x9, 0xc48, 0x0, 0x0, 0x10001, 0x0, @usage, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe000000]}, {0x3, @struct={0x4, 0xa}, 0x0, 0x6fe3, 0x0, 0x0, 0x6, 0x0, 0x40, @usage, 0x0, 0x3, [0x0, 0x3, 0x1ff, 0x3fd, 0x0, 0xd781]}, {0x1ff, 0x7}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x1, 0x10000010, 0x0, 0x7, 0x0, 0x0, 0x0, 0x47a, 0xffffffff}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x3, 0x0, &(0x7f0000000a00)=[{0x0}, {&(0x7f0000004440)=""/4096, 0x1000}, {0x0}]}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x2, 0x20, 0x0, 0x0}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000001c0)) readv(0xffffffffffffffff, &(0x7f00000012c0), 0x0) clone(0xf70a869556b4c51d, 0x0, 0x0, 0x0, 0x0) 23:19:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) [ 802.964312][ C1] sd 0:0:1:0: tag#4596 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 802.974554][ C1] sd 0:0:1:0: tag#4596 CDB: opcode=0xe5 (vendor) [ 802.981190][ C1] sd 0:0:1:0: tag#4596 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 802.990597][ C1] sd 0:0:1:0: tag#4596 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 802.999936][ C1] sd 0:0:1:0: tag#4596 CDB[20]: ba 23:19:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff}) gettid() sendmsg$unix(r0, &(0x7f0000000480)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) 23:19:24 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000800000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) accept4$unix(r0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES64=r0], 0x18}, 0x0) close(r0) r3 = socket$unix(0x1, 0x5, 0x0) close(r3) 23:19:24 executing program 3: socketpair(0x2, 0x0, 0x0, &(0x7f00000001c0)) 23:19:24 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 23:19:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={&(0x7f0000000100)={0x34, r1, 0xc947961739e8cc87, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}]}, 0x34}}, 0x0) 23:19:25 executing program 0: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fork() syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x80, 0x1, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x2}}}]}}]}}, &(0x7f00000003c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x8, 0x2, 0x62, 0x0, 0x87}, 0x0, 0x0}) 23:19:25 executing program 5: r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x200) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000004, 0x30, r1, 0x5005e000) sendfile(r0, r0, &(0x7f0000000200), 0x87) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) 23:19:25 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000f41f00000b2000000a000000000000000020000000010000f1303525e10000001e000000000000000020ec07020001005265497345723346730000000200000002000100000001200100000003000000000000000000000000000000000000000000000000000000000000000000000001001e003cc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0f00"/1056, 0x420, 0x12000}, {&(0x7f0000010600)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1800, 0x12800}, {&(0x7f0000011e00)="0000000000000000000000000a000000000000000020000000010000f1303525e10000001e00"/64, 0x40, 0x4014000}, {&(0x7f0000011f00)="01000200751f0000000000000000000000000000000000000100000002000000000000000000000000002000e01f0000010000000200000001000000f401000002002300bd1f00"/96, 0x60, 0x4016000}, {&(0x7f0000012000)="000000000000000000000000000000000000000000000000000000000001000000010000000200000022000400020000000000000001000000200004002e2e2eed4103005cf9535f230000003cc1655f3cc1655f3cc1655f01000000ffffffff", 0x60, 0x4017fa0}], 0x0, &(0x7f0000012100)) 23:19:25 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0x4020940d, &(0x7f0000000040)) 23:19:25 executing program 3: syz_mount_image$ocfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x23, &(0x7f0000000200)=[{&(0x7f0000010000)="02020202020202027468697320697320616e206f6366733220766f6c756d650002020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202027468697320697320616e206f6366733220766f6c756d6500020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202027468697320697320616e206f6366733220766f6c756d65000202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202027468697320697320616e206f6366733220766f6c756d65000202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202024f434653563200009d159b94ffffffff0000000000200000000000000000000000000000000000000000000031000000000000000000000065c3655f0000000065c3655f000000000000000000000000020000000000000000000000000000009d159b9400"/8320, 0x2080}, {&(0x7f0000012100)="00005a0000001400000000000000000065c3655f00000000000000000300000058b700000100000009000000000000000a000000000000000c0000000e0000000100000067b1b4ec0400"/96, 0x60, 0x20c0}, {&(0x7f0000012200)="00000000000000000000000000000000b17146acd3c048929373c145d4af790400000000000000000000000000000000000000000000000000010000dd52b8eeeea938247e4a2aa800"/96, 0x60, 0x2140}, {&(0x7f0000012300)="47524f5550303100c00f0020790d00009d159b940000000000000000000000000f00000000000000040000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f00"/672, 0x2a0, 0x4000}, {&(0x7f0000012600)="47524f5550303100c00f1001020100009d159b940000000000000000000000000c00000000000000080000000000000000000000000000000000000000000000ff3f00"/96, 0x60, 0x8000}, {&(0x7f0000012700)="494e4f44453031009d159b94ffff010000000000000000000000000000000000380f000000000000ed4103001100000065c3655f0000000065c3655f0000000065c3655f000000000000000000000000090000000000000000000000000000009d159b9400000000000000000000000000000000000001000000000000000000", 0x80, 0x9000}, {&(0x7f0000012800)="380f0000000000000900000000000000100001022e0000000900000000000000100002022e2e00001d46000000000000180f0a026c6f73742b666f756e640000", 0x40, 0x90c0}, {&(0x7f0000012900)="494e4f44453031009d159b94ffff020000000000000000000000000000000000380f000000000000ed4103001100000065c3655f0000000065c3655f0000000065c3655f0000000000000000000000000a0000000000000000000000000000009d159b9400000000000000000000000000000000000001000000000000000000", 0x80, 0xa000}, {&(0x7f0000012a00)="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"/352, 0x160, 0xa0c0}, {&(0x7f0000012c00)="494e4f44453031009d159b94ffff0300000000000000000000000000000000000000000000000000a48101001100000065c3655f0000000065c3655f0000000065c3655f0000000000000000000000000b0000000000000000000000000000009d159b9400"/128, 0x80, 0xb000}, {&(0x7f0000012d00)="0000f300"/32, 0x20, 0xb0c0}, {&(0x7f0000012e00)="494e4f44453031009d159b94ffff0400000000004400000000000000000000000000110000000000a48101009104000065c3655f0000000065c3655f0000000065c3655f0000000000000000000000000c0000000000000000000000000000009d159b9400"/128, 0x80, 0xc000}, {&(0x7f0000012f00)="0000000000000000000000000000000000000000000000000e0000001001000044000400f3000100000000000000000002010000100100000800000000000000", 0x40, 0xc0a0}, {&(0x7f0000013000)="494e4f44453031009d159b94ffff0500000000000100000000000000000000000040000000000000a48101001100000065c3655f0000000065c3655f000000007bc3655f0000000000000000000000000d0000000000000000000000000000009d159b9400"/128, 0x80, 0xd000}, {&(0x7f0000013100)="0000f30001000000000000000000000000000000010000001846000000000000", 0x20, 0xd0c0}, {&(0x7f0000013200)="494e4f44453031009d159b94ffff0600000000004000000000000000000000000000100000000000a48101001102000065c3655f0000000065c3655f0000000065c3655f0000000000000000000000000e0000000000000000000000000000009d159b9400"/128, 0x80, 0xe000}, {&(0x7f0000013300)="0000f30001000000000000000000000000000000400000001801000000000000", 0x20, 0xe0c0}, {&(0x7f0000013400)="494e4f44453031009d159b94ffff0700000000000020000000000000000000000000000800000000a48101009104000065c3655f0000000065c3655f0000000065c3655f0000000000000000000000000f0000000000000000000000000000009d159b9400"/128, 0x80, 0xf000}, {&(0x7f0000013500)="0000000000000000000000000000000000000000000000008712000000200000007e0100f30001000000000000000000790d0000002000000400000000000000", 0x40, 0xf0a0}, {&(0x7f0000013600)="494e4f44453031009d159b94ffff080000000000000000000000000000000000380f000000000000ed4102001100000065c3655f0000000065c3655f0000000065c3655f000000000000000000000000100000000000000000000000000000009d159b9400000000000000000000000000000000000001000000000000000000", 0x80, 0x10000}, {&(0x7f0000013700)="380f0000000000001000000000000000100001022e0000000a00000000000000280f02022e2e00"/64, 0x40, 0x100c0}, {&(0x7f0000013800)="494e4f44453031009d159b94ffff0900000000000001000000000000000000000000400000000000a48101009104000065c3655f0000000065c3655f0000000065c3655f000000000000000000000000110000000000000000000000000000009d159b9400"/128, 0x80, 0x11000}, {&(0x7f0000013900)="000000000000000000000000000000000000000000000000010000000004000000010400f30001000000000000000000ff030000000400001842000000000000", 0x40, 0x110a0}, {&(0x7f0000013a00)="494e4f44453031009d159b94ffff0a00000000000001000000000000000000000000400000000000a48101009104000065c3655f0000000065c3655f0000000065c3655f000000000000000000000000120000000000000000000000000000009d159b9400"/128, 0x80, 0x12000}, {&(0x7f0000013b00)="000000000000000000000000000000000000000000000000020000000004000000010400f30001000000000000000000fe030000000400001c46000000000000", 0x40, 0x120a0}, {&(0x7f0000013c00)="494e4f44453031009d159b94ffff0b00000000000010000000000000000000000000000400000000a48101001101000065c3655f0000000065c3655f000000006ac3655f000000000000000000000000130000000000000000000000000000009d159b9400"/128, 0x80, 0x13000}, {&(0x7f0000013d00)="0000f30001000000000000000000000000000000001000001802000000000000", 0x20, 0x130c0}, {&(0x7f0000013e00)="494e4f44453031009d159b94ffff0c00000000000000000000000000000000000000000000000000a4810100d100000065c3655f0000000065c3655f0000000065c3655f000000000000000000000000140000000000000000000000000000009d159b9400"/128, 0x80, 0x14000}, {&(0x7f0000013f00)="00000000300f00"/32, 0x20, 0x140c0}, {&(0x7f0000014000)="494e4f44453031009d159b94ffff0d00000000000000000000000000000000000000000000000000a48101001108000065c3655f0000000065c3655f0000000065c3655f000000000000000000000000150000000000000000000000000000009d159b9400"/128, 0x80, 0x15000}, {&(0x7f0000014100)="e70100"/32, 0x20, 0x150c0}, {&(0x7f0000014200)="c03b39980000000400000000000010000000400000000001000000010000000100000000000000000000000000000000b17146acd3c048929373c145d4af79040000000100"/96, 0x60, 0x218000}, {&(0x7f0000014300)="47524f555030310000010004ff0300009d159b9400000000000000000000000011000000000000001842000000000000000000000000000000000000000000000100"/96, 0x60, 0x4218000}, {&(0x7f0000014400)="47524f555030310000010004fe0300009d159b9400000000000000000000000012000000000000001c46000000000000000000000000000000000000000000000300"/96, 0x60, 0x461c000}, {&(0x7f0000014500)="494e4f44453031009d159b940000010000000000000000000000000000000000380f000000000000ed410200010000007dc3655f000000007dc3655f000000007dc3655f0000000000000000000000001d4600000000000000000000000000009d159b94000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000001c460000000000000000000000000000000000000000000000000000000000000000000000000000380f0000000000001d46000000000000100001022e0000000900000000000000280f02022e2e00"/256, 0x100, 0x461d000}], 0x0, &(0x7f0000014600)) 23:19:25 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x800000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="00040000f40100000b0200000a0000000000000000020000000100005c70be13e10000001e000000000000000020ec07020001005265497345723346730000000100000002000100000001020100000003000000000000000000000000000000000000000000000000000000000000000000000001001e003dc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x2000, 0x12000}, {&(0x7f0000012100)="0000000000000000000000000a0000000000000000020000000100005c70be13e10000001e00"/64, 0x40, 0x414000}, {&(0x7f0000012200)="01000200751f0000000000000000000000000000000000000100000002000000000000000000000000002000e01f0000010000000200000001000000f401000002002300bd1f00"/96, 0x60, 0x416000}, {&(0x7f0000012300)="000000000000000000000000000000000000000000000000000000000001000000010000000200000022000400020000000000000001000000200004002e2e2eed4103005cf9535f230000003dc1655f3dc1655f3dc1655f01000000ffffffff", 0x60, 0x417fa0}], 0x0, &(0x7f0000012400)) 23:19:25 executing program 5: r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x200) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000004, 0x30, r1, 0x5005e000) sendfile(r0, r0, &(0x7f0000000200), 0x87) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) [ 804.632324][ T3559] usb 1-1: new high-speed USB device number 16 using dummy_hcd 23:19:25 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0205647, &(0x7f0000000040)) 23:19:25 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:25 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x200884, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x0) [ 804.824456][ T3559] usb 1-1: device descriptor read/64, error 18 23:19:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x4206, r0) ptrace$setsig(0x4203, r0, 0x0, &(0x7f0000000080)) [ 805.092905][ T3559] usb 1-1: new high-speed USB device number 17 using dummy_hcd [ 805.128024][T22057] loop3: detected capacity change from 0 to 264192 [ 805.182136][T22057] (syz-executor.3,22057,0):ocfs2_parse_options:1477 ERROR: Invalid heartbeat mount options [ 805.192513][T22057] (syz-executor.3,22057,0):ocfs2_fill_super:1186 ERROR: status = -22 23:19:26 executing program 2: request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) [ 805.302065][ T3559] usb 1-1: device descriptor read/64, error 18 [ 805.422959][ T3559] usb usb1-port1: attempt power cycle [ 805.832254][ T3559] usb 1-1: new high-speed USB device number 18 using dummy_hcd [ 805.922508][ T3559] usb 1-1: Invalid ep0 maxpacket: 0 [ 806.073153][ T3559] usb 1-1: new high-speed USB device number 19 using dummy_hcd [ 806.174345][ T3559] usb 1-1: Invalid ep0 maxpacket: 0 [ 806.181150][ T3559] usb usb1-port1: unable to enumerate USB device 23:19:28 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)}, 0x0) 23:19:28 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:28 executing program 3: r0 = openat$urandom(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 23:19:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000440)={0x0, 0x0, 0x1a, 0xd, 0x5f, &(0x7f0000000040)="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"}) 23:19:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) getpeername(r0, 0x0, &(0x7f0000000440)) 23:19:28 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000080)='0', 0x1, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) 23:19:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000/0x18000)=nil, &(0x7f00000002c0)=[@text16={0x10, &(0x7f0000000140)="0f009d050066b80500000066b9000800000f01c19a0600b6009f66660f3809f60ffb572765f30f096536650f0fe20df20fc2322df2e50b", 0x37}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:19:28 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:28 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') write(0xffffffffffffffff, &(0x7f0000001400), 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0x92c) pwritev(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x10000, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000007000008000000000900000008001000"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) 23:19:28 executing program 2: write(0xffffffffffffffff, &(0x7f0000001400), 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000007000008000000000900000008001000"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000100)={0x0, 0x0, "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", "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"}) 23:19:28 executing program 1: r0 = openat$urandom(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000280)) 23:19:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xa, &(0x7f0000000580)=@security={'security\x00', 0xe, 0x4, 0x2a8, 0xffffffff, 0x0, 0x0, 0x1a8, 0xffffffff, 0xffffffff, 0x280, 0x280, 0x280, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'sit0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@ip={@dev, @remote, 0x0, 0x0, 'caif0\x00', 'caif0\x00'}, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x308) 23:19:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd78, &(0x7f0000000580)=@security={'security\x00', 0xe, 0x4, 0x2a8, 0xffffffff, 0x0, 0x0, 0x1a8, 0xffffffff, 0xffffffff, 0x280, 0x280, 0x280, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'sit0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@ip={@dev, @remote, 0x0, 0x0, 'caif0\x00', 'caif0\x00'}, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x308) 23:19:29 executing program 1: syz_emit_ethernet(0x22, &(0x7f00000000c0)={@broadcast, @random="eb1006ef56dc", @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @random="b4df8619c48d", "", @link_local}}}}, 0x0) 23:19:29 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:29 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000000)='0', 0x1}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000000)='0', 0x1}], 0x1, 0x0, 0x0) 23:19:29 executing program 0: r0 = openat$autofs(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18}, './file0\x00'}) 23:19:29 executing program 5: faccessat(0xffffffffffffffff, 0x0, 0x11a) 23:19:29 executing program 1: socketpair(0x10, 0x2, 0x0, &(0x7f0000000f00)) 23:19:29 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:30 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000000)='0', 0x1}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000000)='0', 0x1}], 0x1, 0x0, 0x0) 23:19:31 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x3c, 0x12, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x4}]}, 0x54}}, 0x0) 23:19:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x4, &(0x7f0000000580)=@security={'security\x00', 0xe, 0x4, 0x2a8, 0xffffffff, 0x0, 0x0, 0x1a8, 0xffffffff, 0xffffffff, 0x280, 0x280, 0x280, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'sit0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@ip={@dev, @remote, 0x0, 0x0, 'caif0\x00', 'caif0\x00'}, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x308) 23:19:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x15, 0x8, 0x8000}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f00000002c0), &(0x7f0000000340)}, 0x20) 23:19:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x36, 0x0, 0x0, 0x83bc1700}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) 23:19:31 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:31 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000000)='0', 0x1}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000000)='0', 0x1}], 0x1, 0x0, 0x0) 23:19:31 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000001c0)={{0x77359400}}, 0x0) 23:19:31 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000000)='0', 0x1}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000000)='0', 0x1}], 0x1, 0x0, 0x0) 23:19:31 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8953, &(0x7f0000000000)) 23:19:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x15, 0x8, 0x8000}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f00000002c0), &(0x7f0000000340)}, 0x20) 23:19:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000400)={'nat\x00'}, &(0x7f0000000480)=0x54) 23:19:31 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:31 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x2fffffd, 0x8d071, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000700000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_page_free_batched\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x0) 23:19:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=@base={0x15, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:19:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x15, 0x8, 0x8000}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f00000002c0), &(0x7f0000000340)}, 0x20) 23:19:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x90) 23:19:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x30, &(0x7f0000000580)=@security={'security\x00', 0xe, 0x4, 0x2a8, 0xffffffff, 0x0, 0x0, 0x1a8, 0xffffffff, 0xffffffff, 0x280, 0x280, 0x280, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'sit0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@ip={@dev, @remote, 0x0, 0x0, 'caif0\x00', 'caif0\x00'}, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x308) 23:19:31 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x8, 0x4) 23:19:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x15, 0x8, 0x8000}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f00000002c0), &(0x7f0000000340)}, 0x20) 23:19:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 23:19:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x7ff00, 0x400000000000118, 0x0, '\x00', [{}, {0x801}]}) 23:19:32 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:32 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) getcwd(&(0x7f00000002c0)=""/163, 0xa3) 23:19:33 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x2fffffd, 0x8d071, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000700000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_page_free_batched\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x0) 23:19:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000dc0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000f40)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="f9ffff7f00000000000017"], 0x54}}, 0x0) 23:19:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@bloom_filter={0x1e, 0x0, 0x40, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xe}, 0x48) 23:19:33 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000080)) 23:19:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000140)={@local, r1}, 0x14) 23:19:33 executing program 1: bpf$BPF_PROG_ATTACH(0x3, &(0x7f00000002c0), 0x14) 23:19:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8937, &(0x7f0000000000)) 23:19:33 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:33 executing program 5: futex(&(0x7f0000000080)=0x1, 0x6, 0x0, &(0x7f0000000100), 0x0, 0x0) 23:19:33 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 23:19:33 executing program 1: futex(0x0, 0xc, 0x0, 0x0, &(0x7f0000000180), 0x0) 23:19:34 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x2fffffd, 0x8d071, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000700000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_page_free_batched\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x0) 23:19:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000180)={'vxcan1\x00', {0x2, 0x0, @empty}}) 23:19:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f00000002c0)=""/79) 23:19:34 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:34 executing program 3: r0 = fork() setpriority(0x2, r0, 0x0) 23:19:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x3, &(0x7f00000009c0)=@framed, &(0x7f0000000a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:19:34 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000003000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x10, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth0_macvtap\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@multicast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:19:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x11, 0x0, 0x0, 0x1}, 0x48) 23:19:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2}, 0x20) 23:19:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x5, 0x1, 0x5}, 0x14}}, 0x0) 23:19:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x29, 0x0, 0x11) 23:19:35 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x2fffffd, 0x8d071, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000700000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_page_free_batched\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x0) 23:19:35 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x21, 0x0, 0x0) 23:19:35 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8982, &(0x7f0000000000)) 23:19:35 executing program 1: syz_emit_ethernet(0xe, &(0x7f0000000140)={@link_local, @dev, @void}, 0x0) 23:19:35 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000000), 0xc) 23:19:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @empty}}) 23:19:35 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x101081, 0x0) write$khugepaged_scan(r0, 0x0, 0x0) 23:19:35 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:35 executing program 2: socket(0x2c, 0x3, 0xd6) 23:19:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000003000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x10, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000040)="0fabc60f060f7915f7900a00b8570d8ec0baf80c66b8211a048c66efbafc0cb000eedeba0735b808008ed066b9950000400f32baf80c66b8fee3f78766efbafc0ced", 0x42}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:19:35 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'security\x00', 0x2, [{}, {}]}, 0x48) 23:19:36 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') 23:19:36 executing program 3: sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x40000) pipe(0x0) syz_genetlink_get_family_id$smc(&(0x7f0000001200), 0xffffffffffffffff) 23:19:36 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x14, 0x14, 0x1, 0x0, 0x0, {0x26}}, 0x14}}, 0x0) 23:19:36 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@security={'security\x00', 0xe, 0x4, 0x2a8, 0xffffffff, 0x0, 0x0, 0x1a8, 0xffffffff, 0xffffffff, 0x280, 0x280, 0x280, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x280}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'sit0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@ip={@dev, @remote, 0x0, 0x0, 'caif0\x00', 'caif0\x00'}, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x308) 23:19:36 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x14, 0x1}) 23:19:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000300)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) 23:19:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000180)=ANY=[@ANYBLOB="070000000017"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000003000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x10, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:19:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x15, &(0x7f0000000580)=@security={'security\x00', 0xe, 0x4, 0x2a8, 0xffffffff, 0x0, 0x0, 0x1a8, 0xffffffff, 0xffffffff, 0x280, 0x280, 0x280, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@dev, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'sit0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@ip={@dev, @remote, 0x0, 0x0, 'caif0\x00', 'caif0\x00'}, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x308) 23:19:37 executing program 0: fork() fork() capset(0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x7, 0x0) 23:19:37 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:37 executing program 5: modify_ldt$write2(0x11, &(0x7f0000002080), 0x10) fork() 23:19:37 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8971, &(0x7f0000000000)) 23:19:37 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8400, 0x10000, 0x4, 0x0, 0x0, 0xff, 0x9, 0x0, 0xd8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)="24000000260007031dfffd866fa283002020020000000000000000010c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000005b00)=[{{&(0x7f0000002980)=@generic, 0x80, &(0x7f0000000840)=[{&(0x7f0000000bc0)=""/193, 0xc1}, {0x0}, {&(0x7f00000004c0)=""/54, 0x36}], 0x3, &(0x7f00000005c0)=""/189, 0xbd}}, {{&(0x7f00000041c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0}, 0x65ce}, {{&(0x7f0000004700)=@nl=@proc, 0x80, &(0x7f0000005a80)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f00000049c0)=""/4096, 0x1000}, {0x0}], 0x6}}], 0x3, 0x40010142, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) socket$inet6(0xa, 0x4, 0x0) 23:19:37 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r1) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) 23:19:37 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x29, &(0x7f0000000080), 0x4) 23:19:37 executing program 5: modify_ldt$write2(0x11, &(0x7f0000002080), 0x10) fork() 23:19:37 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) dup2(r0, r1) 23:19:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@ipv6_delrule={0x1c, 0x21, 0x209}, 0x1c}}, 0x0) 23:19:38 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:38 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000740)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 23:19:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001500add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac71006000000ffffffffffffffffffe7ee00000000000000000100000000", 0x1a1}], 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 23:19:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000800000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x40, 0x0, 0x8e, 0x5, 0x0, 0x3, 0x804, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x40084, 0x100, 0x0, 0x0, 0x8, 0x44761951, 0xf000, 0x0, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8080, 0x1000}, 0x0, 0xff77ffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002280)=[{{&(0x7f00000001c0)={0x2, 0x4e24}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_tos_int={{0x14}}], 0x18}}, {{&(0x7f0000000380)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000002040)=[{&(0x7f0000001780)="03551b6d51654164cede97b30ee413288004264c2cdc34ed74a651172577f65ac04f49844e449fe76efd26", 0x2b}, {0x0}, {0x0}], 0x3, &(0x7f0000002100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @multicast2}}}], 0x20}}], 0x2, 0x1) creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) pipe(&(0x7f0000000080)) r0 = syz_open_dev$usbfs(&(0x7f00000001c0), 0xc, 0x40001) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000380)={0x0, 0x0, "78708fb3fbe8cb75ad8a1fb76ac90970f7492f6e9c61b047d9e95fb2056e30b80c19559aaf00f08dd6455863cae9c963243e3cb09e1d9a095dfe5c63fa0fd037f9bcaa2d974c579cf3f374508cc5da7539e7377113973f2c998a073a7475d6c19cfb8fd93a93197013fa05c04c0d37b69be249d03810da5fca2eb34880ae62d162592535fa9923647d273207af2b38ab34b0cd2836ea9b592a80e2bba2839130e749277a10ebd4ec817dbba3bcd97426336337f20808ec8ea2b85430495af4f65f02fa71056a3b7f66886d8d7930880d712b22cdccc7100055571c37f8faef148d6cb63a08a2402df1ad00"}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f00000000c0)) 23:19:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000800000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x40, 0x0, 0x8e, 0x5, 0x0, 0x3, 0x804, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x40084, 0x100, 0x0, 0x0, 0x8, 0x44761951, 0xf000, 0x0, 0x7}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8080, 0x1000}, 0x0, 0xff77ffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002280)=[{{&(0x7f00000001c0)={0x2, 0x4e24}, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f0000002040)=[{0x0}, {0x0}], 0x2, &(0x7f0000002100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @multicast2}}}], 0x20}}], 0x2, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) pipe(&(0x7f0000000080)) r1 = syz_open_dev$usbfs(&(0x7f00000001c0), 0xc, 0x40001) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000380)={0x0, 0x0, "78708fb3fbe8cb75ad8a1fb76ac90970f7492f6e9c61b047d9e95fb2056e30b80c19559aaf00f08dd6455863cae9c963243e3cb09e1d9a095dfe5c63fa0fd037f9bcaa2d974c579cf3f374508cc5da7539e7377113973f2c998a073a7475d6c19cfb8fd93a93197013fa05c04c0d37b69be249d03810da5fca2eb34880ae62d162592535fa9923647d273207af2b38ab34b0cd2836ea9b592a80e2bba2839130e749277a10ebd4ec817dbba3bcd97426336337f20808ec8ea2b85430495af4f65f02fa71056a3b7f66886d8d7930880d712b22cdccc7100055571c37f8faef148d6cb63a08a2402df1ad00"}) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f00000000c0)) 23:19:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x6000000000000003, 0x4) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000001040)={0x18, {"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", 0x1000}}, 0x1006) perf_event_open(0x0, 0x0, 0x8, r1, 0x9) openat$procfs(0xffffffffffffff9c, &(0x7f0000000740)='/proc/key-users\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)}, 0x0) recvmmsg(r2, &(0x7f0000005b00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/189, 0xbd}}, {{0x0, 0x0, &(0x7f0000003180)=[{0x0}, {&(0x7f0000003140)}], 0x2}, 0x200}, {{&(0x7f0000004700)=@nl=@proc, 0x80, &(0x7f0000005a80)=[{&(0x7f00000047c0)=""/12, 0xc}, {0x0}, {&(0x7f0000000b00)=""/158, 0x9e}], 0x3}, 0x1}], 0x3, 0x40010142, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18548ad55800000000000000000000009500000000000000e54a359e2088f8493e09daa7259042cbd3743ef3571b8fd7da4701795db0f463afd6226bb4cdd62cd2581ac37a330ec93fdac65b6998ebe1c6ddaabae6d7f16f441435e45147e35b46155799b420d9d09e90a6c319bced047371047b2ff0bf67e72fce36089b313d34528e4fef7e0c2e3fb7413f2b87c60326351fce6509bb3a92b6383a38edb56f681ef54bad4c909bf673"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:19:38 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() r2 = getpid() sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {r2}}}, @cred={{0x1c, 0x1, 0x2, {r1}}}], 0x40}, 0x0) 23:19:38 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f742e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffffc654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=ANY=[@ANYBLOB='d\x00\x00\x00$\x00;\r\x00'/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000e0074626600380002"], 0x64}}, 0x0) 23:19:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) dup2(r0, r1) 23:19:39 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000800000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x40, 0x0, 0x8e, 0x5, 0x0, 0x3, 0x804, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x100, 0x0, 0x0, 0x8, 0x0, 0xf000, 0x0, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8080, 0x1000}, 0x0, 0xff77ffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002280)=[{{&(0x7f00000001c0)={0x2, 0x4e24}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_tos_int={{0x14}}], 0x18}}, {{&(0x7f0000000380)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000002040)=[{&(0x7f0000001780)="03551b6d51654164cede97b30ee413288004264c2cdc34ed74a651172577f65ac04f49844e449fe76efd26", 0x2b}, {0x0}, {0x0}], 0x3, &(0x7f0000002100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @multicast2}}}], 0x20}}], 0x2, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) pipe(&(0x7f0000000080)) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f0000000380)={0x0, 0x0, "78708fb3fbe8cb75ad8a1fb76ac90970f7492f6e9c61b047d9e95fb2056e30b80c19559aaf00f08dd6455863cae9c963243e3cb09e1d9a095dfe5c63fa0fd037f9bcaa2d974c579cf3f374508cc5da7539e7377113973f2c998a073a7475d6c19cfb8fd93a93197013fa05c04c0d37b69be249d03810da5fca2eb34880ae62d162592535fa9923647d273207af2b38ab34b0cd2836ea9b592a80e2bba2839130e749277a10ebd4ec817dbba3bcd97426336337f20808ec8ea2b85430495af4f65f02fa71056a3b7f66886d8d7930880d712b22cdccc7100055571c37f8faef148d6cb63a08a2402df1ad00"}) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f00000000c0)) 23:19:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000800000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x40, 0x0, 0x8e, 0x5, 0x0, 0x3, 0x804, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x40084, 0x100, 0x0, 0x0, 0x8, 0x44761951, 0xf000, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8080, 0x1000}, 0x0, 0xff77ffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002280)=[{{&(0x7f00000001c0)={0x2, 0x4e24}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_tos_int={{0x14}}], 0x18}}, {{&(0x7f0000000380)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000002040)=[{&(0x7f0000001780)="03551b6d51654164cede97b30ee413288004264c2cdc34ed74a651172577f65ac04f49844e449fe76efd26", 0x2b}, {0x0}, {0x0}], 0x3, &(0x7f0000002100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @multicast2}}}], 0x20}}], 0x2, 0x1) creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) pipe(&(0x7f0000000080)) r0 = syz_open_dev$usbfs(&(0x7f00000001c0), 0xc, 0x40001) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000380)={0x0, 0x0, "78708fb3fbe8cb75ad8a1fb76ac90970f7492f6e9c61b047d9e95fb2056e30b80c19559aaf00f08dd6455863cae9c963243e3cb09e1d9a095dfe5c63fa0fd037f9bcaa2d974c579cf3f374508cc5da7539e7377113973f2c998a073a7475d6c19cfb8fd93a93197013fa05c04c0d37b69be249d03810da5fca2eb34880ae62d162592535fa9923647d273207af2b38ab34b0cd2836ea9b592a80e2bba2839130e749277a10ebd4ec817dbba3bcd97426336337f20808ec8ea2b85430495af4f65f02fa71056a3b7f66886d8d7930880d712b22cdccc7100055571c37f8faef148d6cb63a08a2402df1ad00"}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f00000000c0)) 23:19:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000800000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x40, 0x0, 0x8e, 0x5, 0x0, 0x3, 0x804, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x40084, 0x100, 0x0, 0x0, 0x8, 0x44761951, 0xf000, 0x0, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8080, 0x1000}, 0x0, 0xff77ffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002280)=[{{&(0x7f00000001c0)={0x2, 0x4e24}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_tos_int={{0x14}}], 0x18}}, {{&(0x7f0000000380)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000002040)=[{&(0x7f0000001780)="03551b6d51654164cede97b30ee413288004264c2cdc34ed74a651172577f65ac04f49844e449fe76efd26", 0x2b}, {0x0}, {0x0}], 0x3, &(0x7f0000002100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @multicast2}}}], 0x20}}], 0x2, 0x1) creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) pipe(&(0x7f0000000080)) r0 = syz_open_dev$usbfs(&(0x7f00000001c0), 0xc, 0x40001) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000380)={0x0, 0x0, "78708fb3fbe8cb75ad8a1fb76ac90970f7492f6e9c61b047d9e95fb2056e30b80c19559aaf00f08dd6455863cae9c963243e3cb09e1d9a095dfe5c63fa0fd037f9bcaa2d974c579cf3f374508cc5da7539e7377113973f2c998a073a7475d6c19cfb8fd93a93197013fa05c04c0d37b69be249d03810da5fca2eb34880ae62d162592535fa9923647d273207af2b38ab34b0cd2836ea9b592a80e2bba2839130e749277a10ebd4ec817dbba3bcd97426336337f20808ec8ea2b85430495af4f65f02fa71056a3b7f66886d8d7930880d712b22cdccc7100055571c37f8faef148d6cb63a08a2402df1ad00"}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f00000000c0)) [ 818.855078][T22624] loop0: detected capacity change from 0 to 4096 23:19:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x2c, &(0x7f0000000080), 0x4) 23:19:40 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 819.049050][T22624] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 819.198427][T22624] usb usb2: check_ctrlrecip: process 22624 (syz-executor.0) requesting ep 01 but needs 81 [ 819.213545][T22638] loop3: detected capacity change from 0 to 4096 [ 819.329541][T22638] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 23:19:40 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$cont(0x1f, r1, 0x3ff, 0x5) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x40, 0x0, 0x9, 0x6, 0x0, 0x7, 0x8880, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7f, 0x2, @perf_config_ext={0x1, 0x6}, 0x88, 0xfffffffffffffbff, 0x7, 0x5, 0x7ff, 0x38, 0x0, 0x0, 0xfc2, 0x0, 0x1}, r1, 0x6, r2, 0x8) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x8f, 0x0, 0x160, 0x160, 0x62020000, 0x260, 0x260, 0x160, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback=0x7f008e04, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0xb003, 0x130, 0x160, 0x8, {0xf400000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "4bc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x5a}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 23:19:41 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 23:19:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup3(r0, r1, 0x0) 23:19:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) setreuid(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001500add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac71006000000ffffffffffffffffffe7ee00000000000000000100000000", 0x1a1}], 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 23:19:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000800000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x40, 0x0, 0x8e, 0x5, 0x0, 0x3, 0x804, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x100, 0x0, 0x0, 0x8, 0x0, 0xf000, 0x0, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8080, 0x1000}, 0x0, 0xff77ffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002280)=[{{&(0x7f00000001c0)={0x2, 0x4e24}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_tos_int={{0x14}}], 0x18}}, {{&(0x7f0000000380)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000002040)=[{&(0x7f0000001780)="03551b6d51654164cede97b30ee413288004264c2cdc34ed74a651172577f65ac04f49844e449fe76efd26", 0x2b}, {0x0}, {0x0}], 0x3, &(0x7f0000002100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @multicast2}}}], 0x20}}], 0x2, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) pipe(&(0x7f0000000080)) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f0000000380)={0x0, 0x0, "78708fb3fbe8cb75ad8a1fb76ac90970f7492f6e9c61b047d9e95fb2056e30b80c19559aaf00f08dd6455863cae9c963243e3cb09e1d9a095dfe5c63fa0fd037f9bcaa2d974c579cf3f374508cc5da7539e7377113973f2c998a073a7475d6c19cfb8fd93a93197013fa05c04c0d37b69be249d03810da5fca2eb34880ae62d162592535fa9923647d273207af2b38ab34b0cd2836ea9b592a80e2bba2839130e749277a10ebd4ec817dbba3bcd97426336337f20808ec8ea2b85430495af4f65f02fa71056a3b7f66886d8d7930880d712b22cdccc7100055571c37f8faef148d6cb63a08a2402df1ad00"}) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f00000000c0)) 23:19:41 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 820.690108][T22661] loop3: detected capacity change from 0 to 4096 23:19:41 executing program 5: waitid(0x1, 0x0, &(0x7f00000002c0), 0x80000000, &(0x7f0000000380)) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000280)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000140)={0xfffffffffffffced, 0x5, 0x0, 0xc3, 0x80009, 0x9, 0x0, 0x0, 0x0, 0x7}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'syztnl2\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x700, 0x700, 0x5, 0x0, {{0x11, 0x4, 0x0, 0x4, 0x44, 0x66, 0x0, 0xe1, 0x2f, 0x0, @loopback, @remote, {[@ssrr={0x89, 0x7, 0x73, [@remote]}, @noop, @lsrr={0x83, 0x7, 0x1d, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0xf, 0x0, [@multicast1, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0xf, 0x42, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @local]}]}}}}}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3179, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)={0x14, 0x16, 0x1, 0x0, 0x4, "", [@typed={0x4}]}, 0x14}], 0x1, 0x0, 0x0, 0x20000010}, 0x0) 23:19:41 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000003f80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=@delchain={0x24, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}}}, 0x24}}, 0x0) 23:19:42 executing program 0: ftruncate(0xffffffffffffffff, 0x1) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) fsetxattr$security_ima(0xffffffffffffffff, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="e613a9920a636029dd0d9239a86f5571f72e839b2e016594e3c75ed989d1a7c3aa16e8fffcc9acf3373b93c84067638c6c74062f97e2510dd8a9c2cf3e1a44d0f7627e3b18a37a5d4545f9eb5e9e5d670a", @ANYBLOB="db86827ce1fa9c3e2f55999e5e62b2a094dfd3181afc59a3babf04c92c839e1e834b34fa3e8d1333bc846d295a8e84b876efc8ca25e90f411d3c962dc8cb15f69b0c869d11e8", @ANYRESOCT, @ANYRES16=r0], 0xf, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x400, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x802, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f0000000040)={0x20000003}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) stat(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r3, r4, 0x0) syz_mount_image$udf(&(0x7f0000000000), 0x0, 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000000880)="0042454130310100008058d0ca3bd8a1c7e380f2125efd7ddcf79a8a18ab1be3dfe74204541762e55db7f6211e89c62269d82f9aa24930516c2bbc7b8e1bef977d0b43187e252bd32819395cc0585c4bd7ca8251d4813f4f756afb05e5f880431e96bab9b693196ece1e44f93d4b7d230f551f2c696949abbe3783", 0x7b}, {&(0x7f0000000780)="004e5352303301000000000000000000000000000000000000000000740000003e61a80fe5be1b8a13ce004005", 0x2d, 0x8804}, {0x0, 0x0, 0xc000}, {0x0}, {&(0x7f0000011200)="080103002e000100c059080000000000a0020000540000", 0x17}, {&(0x7f0000011300)}, {0x0}, {0x0, 0x0, 0x4}], 0x9b56c74fc0e9fb5c, &(0x7f0000000640)=ANY=[@ANYBLOB='longad,rootdir=00000000000000000084,se00000000000000000004,undelete,func=CREDS_CHECK,defcontext=system_u,fowner<\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB, @ANYBLOB=',fowner', @ANYRES64=0x0, @ANYBLOB=',\x00']) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 23:19:42 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, "c4463f9a79e4a4d1e4f80649c6ada0bce928d999f364388c97fa3185c8f65c957498ab2ef64d9d0e8939b0945578574c3776c7089f1e3c4d2001deea40273c63"}, 0x48, 0xfffffffffffffffd) 23:19:42 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 821.610345][T22717] loop0: detected capacity change from 0 to 4096 [ 821.890765][T22717] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 821.960894][T22717] UDF-fs: Scanning with blocksize 512 failed [ 822.049213][T22717] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 822.062000][T22717] UDF-fs: Scanning with blocksize 1024 failed [ 822.137060][T22717] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 822.147454][T22717] UDF-fs: Scanning with blocksize 2048 failed 23:19:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000003f80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=@delchain={0x60, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8}, {0x34, 0x2, [@TCA_BPF_ACT={0x30, 0x1, [@m_xt={0x2c, 0x0, 0x0, 0x0, {{0x7}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x60}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r4, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4800000024000705000000000000100000001f00", @ANYRES32=r5, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) 23:19:43 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 23:19:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000800000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x40, 0x0, 0x8e, 0x5, 0x0, 0x3, 0x804, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x100, 0x0, 0x0, 0x8, 0x0, 0xf000, 0x0, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8080, 0x1000}, 0x0, 0xff77ffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002280)=[{{&(0x7f00000001c0)={0x2, 0x4e24}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_tos_int={{0x14}}], 0x18}}, {{&(0x7f0000000380)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000002040)=[{&(0x7f0000001780)="03551b6d51654164cede97b30ee413288004264c2cdc34ed74a651172577f65ac04f49844e449fe76efd26", 0x2b}, {0x0}, {0x0}], 0x3, &(0x7f0000002100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @multicast2}}}], 0x20}}], 0x2, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) pipe(&(0x7f0000000080)) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f0000000380)={0x0, 0x0, "78708fb3fbe8cb75ad8a1fb76ac90970f7492f6e9c61b047d9e95fb2056e30b80c19559aaf00f08dd6455863cae9c963243e3cb09e1d9a095dfe5c63fa0fd037f9bcaa2d974c579cf3f374508cc5da7539e7377113973f2c998a073a7475d6c19cfb8fd93a93197013fa05c04c0d37b69be249d03810da5fca2eb34880ae62d162592535fa9923647d273207af2b38ab34b0cd2836ea9b592a80e2bba2839130e749277a10ebd4ec817dbba3bcd97426336337f20808ec8ea2b85430495af4f65f02fa71056a3b7f66886d8d7930880d712b22cdccc7100055571c37f8faef148d6cb63a08a2402df1ad00"}) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f00000000c0)) 23:19:43 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x2540, 0x0) [ 822.180444][ T1201] ieee802154 phy0 wpan0: encryption failed: -22 [ 822.187448][ T1201] ieee802154 phy1 wpan1: encryption failed: -22 [ 822.214427][T22717] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 822.226832][T22717] UDF-fs: Scanning with blocksize 4096 failed 23:19:43 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 822.309102][T22787] loop3: detected capacity change from 0 to 4096 23:19:43 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000740)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) read(r0, &(0x7f0000000080)=""/145, 0x91) [ 822.349194][T22787] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 23:19:43 executing program 5: r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file2\x00', 0x20000000000001f4, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x1f2}], 0x0, &(0x7f00000001c0)=ANY=[]) r1 = openat(r0, &(0x7f0000000480)='./file1\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000001800)={0x2020}, 0x2020) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_80211_join_ibss(0x0, 0x0, 0x0, 0x0) 23:19:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 23:19:43 executing program 0: ftruncate(0xffffffffffffffff, 0x1) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) fsetxattr$security_ima(0xffffffffffffffff, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="e613a9920a636029dd0d9239a86f5571f72e839b2e016594e3c75ed989d1a7c3aa16e8fffcc9acf3373b93c84067638c6c74062f97e2510dd8a9c2cf3e1a44d0f7627e3b18a37a5d4545f9eb5e9e5d670a", @ANYBLOB="db86827ce1fa9c3e2f55999e5e62b2a094dfd3181afc59a3babf04c92c839e1e834b34fa3e8d1333bc846d295a8e84b876efc8ca25e90f411d3c962dc8cb15f69b0c869d11e8", @ANYRESOCT, @ANYRES16=r0], 0xf, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x400, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x802, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f0000000040)={0x20000003}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) stat(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r3, r4, 0x0) syz_mount_image$udf(&(0x7f0000000000), 0x0, 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000000880)="0042454130310100008058d0ca3bd8a1c7e380f2125efd7ddcf79a8a18ab1be3dfe74204541762e55db7f6211e89c62269d82f9aa24930516c2bbc7b8e1bef977d0b43187e252bd32819395cc0585c4bd7ca8251d4813f4f756afb05e5f880431e96bab9b693196ece1e44f93d4b7d230f551f2c696949abbe3783", 0x7b}, {&(0x7f0000000780)="004e5352303301000000000000000000000000000000000000000000740000003e61a80fe5be1b8a13ce004005", 0x2d, 0x8804}, {0x0, 0x0, 0xc000}, {0x0}, {&(0x7f0000011200)="080103002e000100c059080000000000a0020000540000", 0x17}, {&(0x7f0000011300)}, {0x0}, {0x0, 0x0, 0x4}], 0x9b56c74fc0e9fb5c, &(0x7f0000000640)=ANY=[@ANYBLOB='longad,rootdir=00000000000000000084,se00000000000000000004,undelete,func=CREDS_CHECK,defcontext=system_u,fowner<\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB, @ANYBLOB=',fowner', @ANYRES64=0x0, @ANYBLOB=',\x00']) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 23:19:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 23:19:44 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:44 executing program 5: socketpair(0x18, 0x0, 0x8, 0x0) 23:19:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000800000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x40, 0x0, 0x8e, 0x5, 0x0, 0x3, 0x804, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x100, 0x0, 0x0, 0x8, 0x0, 0xf000, 0x0, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8080, 0x1000}, 0x0, 0xff77ffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002280)=[{{&(0x7f00000001c0)={0x2, 0x4e24}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_tos_int={{0x14}}], 0x18}}, {{&(0x7f0000000380)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000002040)=[{&(0x7f0000001780)="03551b6d51654164cede97b30ee413288004264c2cdc34ed74a651172577f65ac04f49844e449fe76efd26", 0x2b}, {0x0}, {0x0}], 0x3, &(0x7f0000002100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @multicast2}}}], 0x20}}], 0x2, 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) pipe(&(0x7f0000000080)) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f0000000380)={0x0, 0x0, "78708fb3fbe8cb75ad8a1fb76ac90970f7492f6e9c61b047d9e95fb2056e30b80c19559aaf00f08dd6455863cae9c963243e3cb09e1d9a095dfe5c63fa0fd037f9bcaa2d974c579cf3f374508cc5da7539e7377113973f2c998a073a7475d6c19cfb8fd93a93197013fa05c04c0d37b69be249d03810da5fca2eb34880ae62d162592535fa9923647d273207af2b38ab34b0cd2836ea9b592a80e2bba2839130e749277a10ebd4ec817dbba3bcd97426336337f20808ec8ea2b85430495af4f65f02fa71056a3b7f66886d8d7930880d712b22cdccc7100055571c37f8faef148d6cb63a08a2402df1ad00"}) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000300)={0x2, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f00000000c0)) 23:19:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 23:19:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f000000d300)=[{{&(0x7f0000008f40)={0xa, 0x4e22, 0x0, @remote}, 0x1c, &(0x7f0000009200)=[{0x0}, {0x0}], 0x2, &(0x7f0000009240)=[@dontfrag={{0x14, 0x29, 0x3e, 0x8}}, @rthdr_2292={{0x18}}], 0x30}}], 0x1, 0x0) [ 823.221009][T22808] loop0: detected capacity change from 0 to 4096 23:19:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 23:19:44 executing program 1: timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) [ 823.676972][T22820] loop3: detected capacity change from 0 to 4096 23:19:44 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @empty}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x108) [ 823.810785][T22820] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 23:19:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 23:19:45 executing program 0: ftruncate(0xffffffffffffffff, 0x1) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) fsetxattr$security_ima(0xffffffffffffffff, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="e613a9920a636029dd0d9239a86f5571f72e839b2e016594e3c75ed989d1a7c3aa16e8fffcc9acf3373b93c84067638c6c74062f97e2510dd8a9c2cf3e1a44d0f7627e3b18a37a5d4545f9eb5e9e5d670a", @ANYBLOB="db86827ce1fa9c3e2f55999e5e62b2a094dfd3181afc59a3babf04c92c839e1e834b34fa3e8d1333bc846d295a8e84b876efc8ca25e90f411d3c962dc8cb15f69b0c869d11e8", @ANYRESOCT, @ANYRES16=r0], 0xf, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x400, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x802, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f0000000040)={0x20000003}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) stat(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r3, r4, 0x0) syz_mount_image$udf(&(0x7f0000000000), 0x0, 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000000880)="0042454130310100008058d0ca3bd8a1c7e380f2125efd7ddcf79a8a18ab1be3dfe74204541762e55db7f6211e89c62269d82f9aa24930516c2bbc7b8e1bef977d0b43187e252bd32819395cc0585c4bd7ca8251d4813f4f756afb05e5f880431e96bab9b693196ece1e44f93d4b7d230f551f2c696949abbe3783", 0x7b}, {&(0x7f0000000780)="004e5352303301000000000000000000000000000000000000000000740000003e61a80fe5be1b8a13ce004005", 0x2d, 0x8804}, {0x0, 0x0, 0xc000}, {0x0}, {&(0x7f0000011200)="080103002e000100c059080000000000a0020000540000", 0x17}, {&(0x7f0000011300)}, {0x0}, {0x0, 0x0, 0x4}], 0x9b56c74fc0e9fb5c, &(0x7f0000000640)=ANY=[@ANYBLOB='longad,rootdir=00000000000000000084,se00000000000000000004,undelete,func=CREDS_CHECK,defcontext=system_u,fowner<\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB, @ANYBLOB=',fowner', @ANYRES64=0x0, @ANYBLOB=',\x00']) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 23:19:45 executing program 1: openat$sndseq(0xffffffffffffff9c, &(0x7f00000003c0), 0x4180) 23:19:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}, {{@in6=@loopback}, 0x0, @in6=@private2}}, 0xe8) 23:19:45 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e5111190"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:45 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/cgroups\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) [ 824.636551][T22838] loop0: detected capacity change from 0 to 4096 23:19:45 executing program 3: socket(0x0, 0xc02, 0x0) 23:19:45 executing program 1: r0 = getpgrp(0x0) syz_open_procfs(r0, 0x0) 23:19:46 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000005140)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@tclass={{0x14}}], 0x18}}], 0x1, 0x0) 23:19:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@dev, 0x0, r2}) 23:19:46 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f000000d300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 23:19:46 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "c4463f9a79e4a4d1e4f80649c6ada0bce928d999f364388c97fa3185c8f65c957498ab2ef64d9d0e8939b0945578574c3776c7089f1e3c4d2001deea40273c63"}, 0x48, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f00000001c0)='id_resolver\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0) [ 825.388518][T22838] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 23:19:46 executing program 0: ftruncate(0xffffffffffffffff, 0x1) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) fsetxattr$security_ima(0xffffffffffffffff, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="e613a9920a636029dd0d9239a86f5571f72e839b2e016594e3c75ed989d1a7c3aa16e8fffcc9acf3373b93c84067638c6c74062f97e2510dd8a9c2cf3e1a44d0f7627e3b18a37a5d4545f9eb5e9e5d670a", @ANYBLOB="db86827ce1fa9c3e2f55999e5e62b2a094dfd3181afc59a3babf04c92c839e1e834b34fa3e8d1333bc846d295a8e84b876efc8ca25e90f411d3c962dc8cb15f69b0c869d11e8", @ANYRESOCT, @ANYRES16=r0], 0xf, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x400, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x802, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f0000000040)={0x20000003}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) stat(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r3, r4, 0x0) syz_mount_image$udf(&(0x7f0000000000), 0x0, 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000000880)="0042454130310100008058d0ca3bd8a1c7e380f2125efd7ddcf79a8a18ab1be3dfe74204541762e55db7f6211e89c62269d82f9aa24930516c2bbc7b8e1bef977d0b43187e252bd32819395cc0585c4bd7ca8251d4813f4f756afb05e5f880431e96bab9b693196ece1e44f93d4b7d230f551f2c696949abbe3783", 0x7b}, {&(0x7f0000000780)="004e5352303301000000000000000000000000000000000000000000740000003e61a80fe5be1b8a13ce004005", 0x2d, 0x8804}, {0x0, 0x0, 0xc000}, {0x0}, {&(0x7f0000011200)="080103002e000100c059080000000000a0020000540000", 0x17}, {&(0x7f0000011300)}, {0x0}, {0x0, 0x0, 0x4}], 0x9b56c74fc0e9fb5c, &(0x7f0000000640)=ANY=[@ANYBLOB='longad,rootdir=00000000000000000084,se00000000000000000004,undelete,func=CREDS_CHECK,defcontext=system_u,fowner<\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB, @ANYBLOB=',fowner', @ANYRES64=0x0, @ANYBLOB=',\x00']) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 23:19:46 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/softnet_stat\x00') 23:19:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@broadcast, 0x0, 0x2b}, 0xa, @in6=@local, 0x0, 0x1}}, 0xe8) 23:19:46 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e5111190"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:46 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt_cache\x00') 23:19:46 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@nr_inodes={'nr_inodes', 0x3d, [0x6b]}}]}) 23:19:47 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x2, &(0x7f0000001940)=[{&(0x7f0000000680), 0x0, 0xdea}, {0x0}], 0x200080, &(0x7f0000001a00)={[{@mpol={'mpol', 0x3d, {'default', '=static', @void}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x35]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x0, 0x65, 0x36, 0x0, 0x33]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x67, 0x33, 0x65]}}], [{@subj_user={'subj_user', 0x3d, '+,)\\!'}}]}) 23:19:47 executing program 5: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040), 0x84080, 0x0) 23:19:47 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:47 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) [ 826.146607][T22869] loop0: detected capacity change from 0 to 4096 23:19:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/udplite\x00') [ 826.370442][T22875] loop2: detected capacity change from 0 to 13 [ 826.483225][T22875] tmpfs: Bad value for 'nr_inodes' 23:19:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f000000d300)=[{{&(0x7f0000008f40)={0xa, 0x4e22, 0x0, @remote}, 0x1c, &(0x7f0000009200)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x4800) [ 826.804194][T22869] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 23:19:48 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:48 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000140)={0x0, 0x800}) 23:19:48 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, 0x0, &(0x7f0000001080)) 23:19:48 executing program 3: r0 = fork() ioprio_get$pid(0x3, r0) 23:19:48 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:19:48 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 23:19:48 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) 23:19:48 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:48 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@nr_blocks}]}) 23:19:48 executing program 0: r0 = fork() waitid(0x1, r0, 0x0, 0x81000008, 0x0) 23:19:48 executing program 1: pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 23:19:48 executing program 3: syz_mount_image$tmpfs(&(0x7f0000002d80), &(0x7f0000002dc0)='./file0\x00', 0x0, 0x0, &(0x7f0000004180), 0x0, &(0x7f0000004240)) 23:19:48 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) bind$bt_hci(r0, &(0x7f0000000040), 0x6) [ 827.789355][T22912] tmpfs: Bad value for 'nr_blocks' 23:19:48 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:49 executing program 0: r0 = socket(0x23, 0x2, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20004801) 23:19:49 executing program 2: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0xf) 23:19:49 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@nr_inodes={'nr_inodes', 0x3d, [0x65]}}]}) 23:19:49 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x1, &(0x7f0000001940)=[{0x0, 0x0, 0xdea}], 0x0, &(0x7f0000001a00)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0]}}]}) 23:19:49 executing program 3: syz_mount_image$tmpfs(&(0x7f0000002d80), &(0x7f0000002dc0)='./file0\x00', 0x0, 0x0, &(0x7f0000004180), 0x0, &(0x7f0000004240)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 23:19:49 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, 0x0) 23:19:49 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 23:19:49 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 828.596531][T22932] tmpfs: Unknown parameter 'context' 23:19:49 executing program 1: pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000480)) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 23:19:49 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x3, &(0x7f0000001940)=[{0x0, 0x0, 0xdea}, {0x0, 0x0, 0xffff}, {&(0x7f0000001780)}], 0x200080, &(0x7f0000001a00)={[{@nr_inodes={'nr_inodes', 0x3d, [0x65, 0x0]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x0]}}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @void}}}, {@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x33, 0x0, 0x39]}}}}, {@mode={'mode', 0x3d, 0x766}}], [{@subj_user={'subj_user', 0x3d, '+,)\\!'}}]}) 23:19:49 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 23:19:49 executing program 0: syz_mount_image$tmpfs(&(0x7f0000002d80), &(0x7f0000002dc0)='./file0\x00', 0x0, 0x1, &(0x7f0000004180)=[{&(0x7f0000002e00)='f', 0x1, 0xfffffffffffeffff}], 0x1001, 0x0) 23:19:50 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x6) 23:19:50 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:50 executing program 5: r0 = socket(0x23, 0x2, 0x0) accept4$llc(r0, 0x0, 0x0, 0x0) 23:19:50 executing program 1: setitimer(0x0, &(0x7f0000000040)={{0x4000000000001}}, 0x0) [ 829.189350][T22947] loop0: detected capacity change from 0 to 264192 23:19:50 executing program 3: r0 = semget(0x1, 0x2, 0x0) semctl$GETNCNT(r0, 0x2, 0x3, 0x0) 23:19:50 executing program 2: r0 = socket(0x2, 0x1000000008002, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1005, &(0x7f0000000080), 0x4) 23:19:50 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001940)=[{&(0x7f0000001900)="ab", 0x1, 0x62cec942}], 0x0, 0x0) 23:19:50 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:50 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001940)=[{&(0x7f0000000680)="eb", 0x1}], 0x0, 0x0) 23:19:50 executing program 1: accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000004400), 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x6000, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 23:19:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x98, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_FRAME={0x79, 0x33, @beacon={@wo_ht={{}, {}, @broadcast, @device_b}, 0x0, @random, 0x0, @void, @val, @val={0x3, 0x1}, @val={0x4, 0x6}, @val={0x6, 0x2}, @void, @val={0x25, 0x3}, @void, @val={0x3c, 0x4}, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7}, @val={0x76, 0x6}}}]}, 0x98}}, 0x0) [ 829.799696][T22961] loop0: detected capacity change from 0 to 134857 23:19:51 executing program 2: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, 0x0) 23:19:51 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:51 executing program 1: semctl$GETPID(0xffffffffffffffff, 0x0, 0x4, 0x0) 23:19:51 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) fcntl$setstatus(r0, 0xb, 0x0) 23:19:51 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000140)={0x0, 0xfffffffffffffff9}, 0x10) 23:19:51 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) lseek(r0, 0x0, 0x0) 23:19:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x13, 0x0, 0x0) 23:19:51 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 830.572843][ T25] usb 3-1: new high-speed USB device number 23 using dummy_hcd [ 830.814167][ T25] usb 3-1: Using ep0 maxpacket: 16 23:19:51 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffc) [ 830.933149][ T25] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 23:19:52 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 23:19:52 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89a3, &(0x7f0000000100)) 23:19:52 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89b0, &(0x7f0000000100)) [ 831.103569][ T25] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 831.112962][ T25] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 831.121088][ T25] usb 3-1: Product: syz [ 831.125505][ T25] usb 3-1: Manufacturer: syz [ 831.130212][ T25] usb 3-1: SerialNumber: syz [ 831.477634][ T25] usb 3-1: USB disconnect, device number 23 23:19:53 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) fork() 23:19:53 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:53 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(r0, 0x541b, 0x0) 23:19:53 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000000)={@host}) 23:19:53 executing program 1: prctl$PR_SET_MM_MAP_SIZE(0x3, 0xf, 0x0) syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0xd, 0x10, 0x2, [{{0x9, 0x4, 0x0, 0x2, 0x2, 0x7, 0x1, 0x1, 0x6, "", {{{0x9, 0x5, 0x1, 0x2, 0x8, 0x9, 0x7f, 0x5}}}}}]}}]}}, &(0x7f0000000380)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x250, 0x58, 0x1f, 0x4, 0xff, 0x8c}, 0x41, &(0x7f00000000c0)={0x5, 0xf, 0x41, 0x6, [@wireless={0xb, 0x10, 0x1, 0x4, 0x2, 0x1f, 0x9, 0x200, 0xae}, @ptm_cap={0x3}, @wireless={0xb, 0x10, 0x1, 0xc, 0x20, 0x2, 0x81, 0x0, 0x81}, @ssp_cap={0xc, 0x10, 0xa, 0x4, 0x0, 0x0, 0xf1e, 0xaa65}, @ss_container_id={0x14, 0x10, 0x4, 0x9, "dbeb6afa4f38dd0c86843e5b2c02fa43"}, @ptm_cap={0x3}]}, 0x4, [{0x5c, &(0x7f0000000140)=@string={0x5c, 0x3, "fb24de5662e235178851f9dd198044a781ea077ca1d4d8b3f1be51c4d734939c2eccfcfea80289744716656237ea4d2936efe2ef4a0a6f6124487c4b61f0cb4de47b4388a57580c4ebb1b948749dfd0dcac5ef614eb9567d035c"}}, {0xb6, &(0x7f00000001c0)=@string={0xb6, 0x3, "9d1c03da65f5537f2a340d35c2697fdfdc263c5f98b2f69fd4f2f499a975c0fbd86ba39db62c4ee780addb74a5b76c940ec875b3d28a8c439c48d4b1718f8f0ef8b862efbe8fe861fdf0fc21057f829d5a632e962bfb69e7936128dd63ff6541a64c481c849792622c1bcf40db93a1b277eb0be97d1ae6569758bc43a2b25e339393b67afb3b388b30ef7a1edd6bb082d572b6191f58802483b451bfc8aba845b1873a39fb0e167f431aafaa1b15c6441f3c5032"}}, {0xa2, &(0x7f0000000280)=@string={0xa2, 0x3, "0f2ad2de6cf484f2b1cdb50a17d156f27b8673543ff9fc286218dc87fc870eca250d9b0f3e785d34ae17593866a8cc91ef3a3832b59b2d7c4a0465f2c46d295542b8ebc94f5e76760ef3873a6bc12b9278200bb41cde79f6a981e47a9e49748711ffc5afb5e1da9193c7272a703782e766c01f4c9db0698df73505ce00328eddd962e66d8a67c1f65ae605a5c5659e9d0c864e3b9df418dba3a4889aaa53b7a4"}}, {0x3, &(0x7f0000000340)=@string={0x3, 0x3, 'K'}}]}) shmget$private(0x0, 0x3000, 0x40, &(0x7f0000ff1000/0x3000)=nil) socket$nl_rdma(0x10, 0x3, 0x14) 23:19:53 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8995, &(0x7f0000000100)) [ 832.119623][T23010] QAT: Invalid ioctl 21531 23:19:53 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:53 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, r0) 23:19:53 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x8, 0x0, 0x0) 23:19:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000600)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x76, &(0x7f0000000280), 0x8) 23:19:53 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x16, 0x0, 0x0) 23:19:53 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:53 executing program 2: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x2, &(0x7f0000000140)=@string={0x2}}, {0x0, 0x0}]}) 23:19:53 executing program 5: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r0) 23:19:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8927, &(0x7f0000000100)) 23:19:53 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @empty}}, 0x1e) 23:19:53 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x17, 0x0, 0x4) 23:19:54 executing program 3: pidfd_send_signal(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f0000000380)) 23:19:54 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:54 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(r0, 0x80086301, 0x0) 23:19:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8937, &(0x7f0000000100)) 23:19:54 executing program 0: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x1, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x8}}}}}]}}]}}, 0x0) [ 833.253022][ T3552] usb 3-1: new high-speed USB device number 24 using dummy_hcd 23:19:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x20000044, 0x340, 0xffffffff, 0x160, 0x160, 0x2c0, 0xffffffff, 0xffffffff, 0x3e0, 0x3e0, 0x3e0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@ipv6={@loopback, @loopback, [], [], 'ipvlan0\x00', 'vlan0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) 23:19:54 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 833.502293][ T3552] usb 3-1: Using ep0 maxpacket: 16 [ 833.662444][ T3552] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 833.721645][ T3552] usb 3-1: language id specifier not provided by device, defaulting to English [ 833.783159][ T25] usb 1-1: new high-speed USB device number 20 using dummy_hcd [ 834.028561][ T25] usb 1-1: Using ep0 maxpacket: 16 [ 834.082638][ T3552] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 834.091857][ T3552] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 834.100144][ T3552] usb 3-1: Product: syz [ 834.104504][ T3552] usb 3-1: SerialNumber: syz [ 834.152521][ T25] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 834.325409][ T25] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 834.334735][ T25] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 834.343008][ T25] usb 1-1: Product: syz [ 834.347281][ T25] usb 1-1: Manufacturer: syz [ 834.352162][ T25] usb 1-1: SerialNumber: syz [ 834.372211][ T3569] usb 3-1: USB disconnect, device number 24 [ 834.387389][T23046] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 834.606424][ T3552] usb 1-1: USB disconnect, device number 20 23:19:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x4b0, 0xffffffff, 0x160, 0x160, 0x2c0, 0xffffffff, 0xffffffff, 0x3e0, 0x3e0, 0x3e0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x138, 0xc8, 0x0, {}, [@common=@hbh={{0x48}}, @common=@hbh={{0x48}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@dst={{0x48}}, @common=@dst={{0x48}}]}, @common=@inet=@TCPMSS={0x28}}, {{@ipv6={@loopback, @loopback, [], [], 'ipvlan0\x00', 'vlan0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"abd9"}}]}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) 23:19:55 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)) 23:19:55 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8902, &(0x7f0000000100)) 23:19:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000003680)="222699b92e29088053e5bb850e5c966f1634170a0ef1e87d699e65ab8da25bf1bfb2ab492869ab4a0df25c59ea9f", 0x2e) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 23:19:55 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:56 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000200)) 23:19:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x4b0, 0xffffffff, 0x160, 0x160, 0x2c0, 0xffffffff, 0xffffffff, 0x3e0, 0x3e0, 0x3e0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@hbh={{0x48}}, @common=@hbh={{0x48}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@dst={{0x48}}, @common=@dst={{0x48}}]}, @common=@inet=@TCPMSS={0x28}}, {{@ipv6={@loopback, @loopback, [], [], 'ipvlan0\x00', 'vlan0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"abd9"}}]}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) 23:19:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x0, 0x0, 0x4000000000f}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000003c0)) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r3, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) 23:19:56 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:56 executing program 2: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) [ 835.900147][T23073] bridge0: port 3(bond0) entered blocking state [ 835.984853][T23073] bridge0: port 3(bond0) entered disabled state [ 836.149886][T23073] device bond0 entered promiscuous mode [ 836.158069][T23073] device bond_slave_0 entered promiscuous mode [ 836.184920][T23073] device bond_slave_1 entered promiscuous mode 23:19:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x1404, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x48) 23:19:57 executing program 5: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0xd, 0x0, 0x2, [{{0x9, 0x4, 0x0, 0x2, 0x2, 0x7, 0x1, 0x1, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x8, 0x0, 0x7f}}}}}]}}]}}, &(0x7f0000000380)={0xa, &(0x7f0000000080)={0xa}, 0x0, 0x0}) [ 836.252054][T23073] bridge0: port 3(bond0) entered blocking state [ 836.262015][T23073] bridge0: port 3(bond0) entered forwarding state [ 836.320855][T23079] device bond0 left promiscuous mode [ 836.327098][T23079] device bond_slave_0 left promiscuous mode [ 836.333863][T23079] device bond_slave_1 left promiscuous mode [ 836.341001][T23079] bridge0: port 3(bond0) entered disabled state 23:19:57 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:57 executing program 2: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0xd, 0x0, 0x2, [{{0x9, 0x4, 0x0, 0x2, 0x2, 0x7, 0x1, 0x1, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x8, 0x0, 0x7f}}}}}]}}]}}, &(0x7f0000000380)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x0, 0x58, 0x1f, 0x0, 0xff}, 0x41, &(0x7f00000000c0)={0x5, 0xf, 0x41, 0x6, [@wireless={0xb, 0x10, 0x1, 0x4, 0x2, 0x1f, 0x9, 0x200}, @ptm_cap={0x3}, @wireless={0xb, 0x10, 0x1, 0xc, 0x20, 0x2, 0x81, 0x0, 0x81}, @ssp_cap={0xc, 0x10, 0xa, 0x4, 0x0, 0x0, 0xf1e}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "dbeb6afa4f38dd0c86843e5b2c02fa43"}, @ptm_cap={0x3}]}, 0x4, [{0x5c, &(0x7f0000000140)=@string={0x5c, 0x3, "fb24de5662e235178851f9dd198044a781ea077ca1d4d8b3f1be51c4d734939c2eccfcfea80289744716656237ea4d2936efe2ef4a0a6f6124487c4b61f0cb4de47b4388a57580c4ebb1b948749dfd0dcac5ef614eb9567d035c"}}, {0x6e, &(0x7f00000001c0)=@string={0x6e, 0x3, "9d1c03da65f5537f2a340d35c2697fdfdc263c5f98b2f69fd4f2f499a975c0fbd86ba39db62c4ee780addb74a5b76c940ec875b3d28a8c439c48d4b1718f8f0ef8b862efbe8fe861fdf0fc21057f829d5a632e962bfb69e7936128dd63ff6541a64c481c849792622c1bcf40"}}, {0x52, &(0x7f0000000280)=@string={0x52, 0x3, "0f2ad2de6cf484f2b1cdb50a17d156f27b8673543ff9fc286218dc87fc870eca250d9b0f3e785d34ae17593866a8cc91ef3a3832b59b2d7c4a0465f2c46d295542b8ebc94f5e76760ef3873a6bc12b92"}}, {0x2, &(0x7f0000000340)=@string={0x2}}]}) 23:19:57 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89a2, &(0x7f0000000100)) 23:19:58 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, r0) 23:19:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x0, 0x0, 0x4000000000f}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000003c0)) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r3, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) [ 837.082654][ T3559] usb 3-1: new high-speed USB device number 25 using dummy_hcd 23:19:58 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:19:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8943, &(0x7f0000000100)) 23:19:58 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5421, &(0x7f0000000100)) [ 837.342476][ T3559] usb 3-1: Using ep0 maxpacket: 16 23:19:58 executing program 3: prctl$PR_SET_MM_MAP_SIZE(0x3, 0xf, 0x0) syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0xd, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x2, 0x2, 0x7, 0x1, 0x1, 0x6, "", {{{0x9, 0x5, 0x1, 0x2, 0x8, 0x0, 0x0, 0x5}}}}}]}}]}}, &(0x7f0000000380)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x250, 0x58, 0x0, 0x4, 0x0, 0x8c}, 0x17, &(0x7f00000000c0)={0x5, 0xf, 0x17, 0x3, [@ptm_cap={0x3}, @ssp_cap={0xc, 0x10, 0xa, 0x0, 0x0, 0x0, 0xf1e, 0xaa65}, @ptm_cap={0x3}]}, 0x4, [{0x2e, &(0x7f0000000140)=@string={0x2e, 0x3, "fb24de5662e235178851f9dd198044a781ea077ca1d4d8b3f1be51c4d734939c2eccfcfea802897447166562"}}, {0x1d, &(0x7f00000001c0)=@string={0x1d, 0x3, "9d1c03da65f5537f2a340d35c2697fdfdc263c5f98b2f69fd4f2f4"}}, {0x3d, &(0x7f0000000280)=@string={0x3d, 0x3, "0f2ad2de6cf484f2b1cdb50a17d156f27b8673543ff9fc286218dc87fc870eca250d9b0f3e785d34ae17593866a8cc91ef3a3832b59b2d7c4a0465"}}, {0x2, &(0x7f0000000340)=@string={0x2}}]}) shmget$private(0x0, 0x3000, 0x40, &(0x7f0000ff1000/0x3000)=nil) socket$nl_rdma(0x10, 0x3, 0x14) [ 837.483420][ T3559] usb 3-1: config 1 interface 0 altsetting 2 bulk endpoint 0x1 has invalid maxpacket 8 [ 837.493385][ T3559] usb 3-1: config 1 interface 0 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 837.506471][ T3559] usb 3-1: config 1 interface 0 has no altsetting 0 [ 837.558460][T23096] bridge0: port 3(bond0) entered blocking state [ 837.607358][T23096] bridge0: port 3(bond0) entered disabled state [ 837.776738][T23096] device bond0 entered promiscuous mode [ 837.787222][T23096] device bond_slave_0 entered promiscuous mode [ 837.823582][T23096] device bond_slave_1 entered promiscuous mode [ 837.926656][T23096] bridge0: port 3(bond0) entered blocking state [ 837.944398][T23096] bridge0: port 3(bond0) entered forwarding state 23:19:59 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8921, &(0x7f0000000100)) 23:19:59 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 837.978043][T23097] device bond0 left promiscuous mode [ 837.984198][T23097] device bond_slave_0 left promiscuous mode [ 837.990730][T23097] device bond_slave_1 left promiscuous mode [ 837.998069][T23097] bridge0: port 3(bond0) entered disabled state [ 838.062559][ T3559] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 838.073081][ T3559] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 838.081205][ T3559] usb 3-1: Product: ⨏춱વ턗虻味錄⣼ᡢ蟜蟼쨎ഥྛ砾㑝ឮ㡙ꡦ里㫯㈸鮵簭ъ淄唩롂짫幏癶㪇셫鈫 [ 838.096106][ T3559] usb 3-1: Manufacturer: Ო罓㐪㔍槂⛜弼늘鿶駴疩﯀毘鶣Ⲷ궀瓛랥鑬젎덵諒䎌䢜뇔轱ຏ룸达懨⇼缅鶂捚阮שׂ憓」䅥䲦᱈鞄抒ᬬ䃏 23:19:59 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8943, &(0x7f0000000100)) [ 838.162949][ T25] usb 4-1: new high-speed USB device number 54 using dummy_hcd [ 838.253567][T23088] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 838.402291][ T25] usb 4-1: Using ep0 maxpacket: 16 [ 838.522779][ T25] usb 4-1: config 1 interface 0 altsetting 2 bulk endpoint 0x1 has invalid maxpacket 8 [ 838.533296][ T25] usb 4-1: config 1 interface 0 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 838.546460][ T25] usb 4-1: config 1 interface 0 has no altsetting 0 [ 838.555862][ T3559] usblp 3-1:1.0: usblp0: USB Unidirectional printer dev 25 if 0 alt 2 proto 1 vid 0x0525 pid 0xA4A8 [ 838.598668][ T3559] usb 3-1: USB disconnect, device number 25 [ 838.641165][ T3559] usblp0: removed [ 838.762784][ T25] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 838.772089][ T25] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 838.780210][ T25] usb 4-1: Product: ⨏춱વ턗虻味錄⣼ᡢ蟜蟼쨎ഥྛ砾㑝ឮ㡙ꡦ里㫯㈸鮵簭ъ [ 838.791646][ T25] usb 4-1: Manufacturer: Ო罓㐪㔍槂⛜弼늘鿶 [ 838.823385][T23105] raw-gadget gadget: fail, usb_ep_enable returned -22 23:20:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x0, 0x0, 0x4000000000f}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000003c0)) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r3, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) 23:20:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x4b0, 0xffffffff, 0x160, 0x160, 0x2c0, 0xffffffff, 0xffffffff, 0x3e0, 0x3e0, 0x3e0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@hbh={{0x48}}, @common=@hbh={{0x48}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@dst={{0x48}}, @common=@dst={{0x48}}]}, @common=@inet=@TCPMSS={0x28}}, {{@ipv6={@loopback, @loopback, [], [], 'ipvlan0\x00', 'vlan0\x00', {}, {}, 0x0, 0x4}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@eui64={{0x28}}, @common=@mh={{0x28}, {"abd9"}}]}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x510) 23:20:00 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(r0, 0x40096108, 0x0) 23:20:00 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:20:00 executing program 1: r0 = syz_io_uring_setup(0x2606, &(0x7f0000000140), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000001440), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000001c0)=""/24, 0x18}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x2) [ 839.155678][ T25] usblp 4-1:1.0: usblp0: USB Unidirectional printer dev 54 if 0 alt 2 proto 1 vid 0x0525 pid 0xA4A8 [ 839.218376][ T25] usb 4-1: USB disconnect, device number 54 [ 839.228960][T23118] bridge0: port 3(bond0) entered blocking state [ 839.251159][T23118] bridge0: port 3(bond0) entered disabled state 23:20:00 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 839.284287][ T25] usblp0: removed 23:20:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000100)) write$eventfd(0xffffffffffffffff, &(0x7f0000000100)=0x8, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x8000000, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="34000000100001080000000081ffffff00000002", @ANYRES32=0x0, @ANYBLOB="00000000000000000c002b8008000100", @ANYRES32, @ANYBLOB="08001b00000000"], 0x34}}, 0x0) 23:20:00 executing program 5: request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) [ 839.488867][T23118] device bond0 entered promiscuous mode [ 839.497379][T23118] device bond_slave_0 entered promiscuous mode [ 839.521970][T23118] device bond_slave_1 entered promiscuous mode [ 839.578232][T23118] bridge0: port 3(bond0) entered blocking state [ 839.590243][T23118] bridge0: port 3(bond0) entered forwarding state 23:20:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8914, &(0x7f0000000100)) 23:20:00 executing program 2: socket$packet(0x11, 0x2, 0x300) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) [ 839.751993][T23118] device bond0 left promiscuous mode [ 839.760903][T23118] device bond_slave_0 left promiscuous mode [ 839.797040][T23118] device bond_slave_1 left promiscuous mode [ 839.851768][T23118] bridge0: port 3(bond0) entered disabled state 23:20:00 executing program 5: syz_emit_ethernet(0x46, &(0x7f00000001c0)={@empty, @random="b9bbec17e647", @val, {@ipv6}}, 0x0) 23:20:01 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 23:20:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x0, 0x0, 0x4000000000f}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000003c0)) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r3, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) 23:20:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2}}) [ 840.458291][T23128] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:20:01 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x9c140, 0x0) [ 840.567422][T23128] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 840.575587][T23128] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:20:01 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 23:20:02 executing program 3: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x11) 23:20:02 executing program 1: openat$thread_pidfd(0xffffff9c, 0x0, 0x488083, 0x0) [ 841.126058][T23139] bridge0: port 3(bond0) entered blocking state [ 841.171857][T23139] bridge0: port 3(bond0) entered disabled state 23:20:02 executing program 2: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000280)=""/47) [ 841.277456][T23139] device bond0 entered promiscuous mode [ 841.286417][T23139] device bond_slave_0 entered promiscuous mode [ 841.312516][T23139] device bond_slave_1 entered promiscuous mode [ 841.371246][T23139] bridge0: port 3(bond0) entered blocking state [ 841.383685][T23139] bridge0: port 3(bond0) entered forwarding state [ 841.508157][T23139] device bond0 left promiscuous mode [ 841.518142][T23139] device bond_slave_0 left promiscuous mode 23:20:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r2, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000600)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}]}, 0x1c}}, 0x0) 23:20:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8914, &(0x7f0000000440)={'wg0\x00'}) [ 841.566987][T23139] device bond_slave_1 left promiscuous mode [ 841.603700][T23139] bridge0: port 3(bond0) entered disabled state 23:20:02 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:20:02 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1c, 0x0, &(0x7f0000000040)) 23:20:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) 23:20:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x2, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x15, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x5}]}, 0x30}}, 0x0) 23:20:03 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:20:03 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:20:03 executing program 1: socketpair(0x25, 0x1, 0x0, &(0x7f0000001c80)) 23:20:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x2, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:20:03 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[{0x10}], 0x10}, 0x0) 23:20:03 executing program 0: pselect6(0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0, 0x0) 23:20:03 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2d1, 0xffffff88, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:20:03 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@bcast, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) listen(r0, 0x0) unshare(0x40000000) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001bc0), 0x0, 0x0, 0x0) unshare(0x66000200) recvmmsg(0xffffffffffffffff, &(0x7f0000001440)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001400)=""/18, 0x12}, 0xaf37}], 0x2, 0x0, &(0x7f0000001500)={0x77359400}) write(r0, &(0x7f0000000100)="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", 0x2c5) 23:20:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000040)) 23:20:03 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x22, 0x0, &(0x7f0000000040)) 23:20:04 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:04 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2, 0x17, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1}]}, 0x18}}, 0x0) 23:20:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 23:20:04 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x300}, 0x0) 23:20:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000047c0)={0x0, 0x0, &(0x7f0000004780)={&(0x7f0000000000)=@newchain={0x2c, 0x64, 0x1, 0x0, 0x0, {}, [@TCA_CHAIN={0x13}]}, 0x2c}}, 0x0) 23:20:05 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) 23:20:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x34, 0x1, 0xa, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8}]}]}, 0x34}}, 0x0) 23:20:05 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:06 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f00000000c0)=[{}, {}], 0x40) 23:20:06 executing program 1: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0xb, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}, @sadb_ident={0x2, 0xa}, @sadb_x_nat_t_type={0x1}, @sadb_x_sec_ctx={0x7, 0x18, 0x0, 0x0, 0x29, "5828cbd650247048ce23aaf37a63e9f780d20af5a04f839068d0091fbfac71202df92c0ff5269a0cc6"}, @sadb_key={0x3, 0x9, 0x68, 0x0, "f1277853bbb80906e3845bc6d5"}, @sadb_x_sa2={0x200000000000015f}]}, 0x98}}, 0x0) 23:20:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x34, 0x0, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @fccp}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5}]}, 0x34}}, 0x0) [ 845.146666][T23298] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 845.202894][T23296] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 23:20:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8921, &(0x7f0000000440)={'wg0\x00'}) 23:20:06 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000440)={'wg0\x00'}) 23:20:06 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001240)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001200)=[{0x0}, {&(0x7f00000001c0)='z', 0x1}], 0x2}, 0x0) 23:20:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) 23:20:06 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:06 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f00000000c0)="4b087cb5f34481a94d5b", 0xa) 23:20:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="bc0000000301010800000000000000000c0000023c0002"], 0xbc}}, 0x0) 23:20:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8932, &(0x7f0000000440)={'wg0\x00'}) [ 846.214576][T23323] netlink: 108 bytes leftover after parsing attributes in process `syz-executor.2'. [ 846.224839][T23323] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. 23:20:07 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x2, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x5, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:20:07 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f00000007c0), 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) 23:20:07 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000004680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x162) 23:20:07 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:07 executing program 3: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000000)) 23:20:07 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000500), 0x4) 23:20:08 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x2, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:20:08 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x370, 0xd0, 0x1c0, 0xffffffff, 0x1c0, 0x268, 0x370, 0x370, 0xffffffff, 0x370, 0x370, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@ip={@empty, @empty, 0x0, 0x0, 'veth1_vlan\x00', 'bond_slave_0\x00', {}, {}, 0x0, 0x4}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @gre_key, @gre_key}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @empty, @broadcast, @icmp_id, @gre_key}}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@dev, @ipv4=@dev, @gre_key, @gre_key}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 23:20:08 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x0, 0x0, "d59e39", 0x81}) 23:20:08 executing program 1: pselect6(0x40, &(0x7f0000000000)={0x2}, &(0x7f0000000040)={0x4}, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x5]}, 0x8}) 23:20:08 executing program 5: bpf$MAP_CREATE(0x10, &(0x7f00000001c0), 0x48) 23:20:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0xc0045878, 0x0) 23:20:08 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008", 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:08 executing program 3: bpf$MAP_CREATE(0x4, &(0x7f00000001c0), 0x48) 23:20:09 executing program 5: pselect6(0x40, &(0x7f0000000000), &(0x7f00000001c0)={0xa3}, 0x0, 0x0, 0x0) 23:20:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x14, 0x1, 0x6, 0x3}, 0x14}}, 0x0) 23:20:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x28, 0x0, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x28}}, 0x0) 23:20:09 executing program 1: socket(0x23, 0x0, 0x26) 23:20:10 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008", 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x30, 0x0, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x30}}, 0x0) 23:20:10 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000003f00)='ns/mnt\x00') 23:20:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x14, 0x1, 0x10, 0x3}, 0x14}}, 0x0) 23:20:10 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008", 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @tipc=@id, @l2={0x1f, 0x0, @fixed}, @ax25={0x3, @default, 0x1}, 0x2}) 23:20:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000003a80), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000140)=""/53) 23:20:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x48101, 0x0) 23:20:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x28}}, 0x0) 23:20:11 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x13, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00", 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:11 executing program 2: shmget(0x2, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) 23:20:11 executing program 3: syslog(0x2, &(0x7f0000000000)=""/205, 0xcd) 23:20:11 executing program 1: symlinkat(&(0x7f0000000180)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 23:20:11 executing program 0: clock_gettime(0x0, &(0x7f0000000240)={0x0}) select(0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000280)={r0}) 23:20:11 executing program 5: syz_mount_image$ext4(&(0x7f00000014c0)='ext4\x00', &(0x7f0000001500)='./file0\x00', 0x0, 0x0, &(0x7f0000001740), 0x0, &(0x7f00000017c0)) 23:20:11 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x13, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00", 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:11 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000580)={[{@iocharset={'iocharset', 0x3d, 'iso8859-3'}}]}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:20:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) 23:20:12 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@umask={'umask', 0x3d, 0xee930000000}}]}) 23:20:12 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0xc2342) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) [ 851.106315][T23484] loop2: detected capacity change from 0 to 270 23:20:12 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x13, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00", 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x8002) ioctl$BLKDISCARD(r0, 0x1277, 0x0) [ 851.532773][T23568] hfsplus: umask requires a value [ 851.537905][T23568] hfsplus: unable to parse mount options 23:20:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) unlink(0x0) 23:20:12 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/power_supply', 0x0, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) 23:20:12 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0\x00') 23:20:12 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x16, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000", 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:12 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@umask={'umask', 0x3d, 0xee930000000}}]}) 23:20:13 executing program 1: syz_emit_ethernet(0x37, &(0x7f0000000040)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, 'IV{', 0x1, 0x0, 0x0, @dev, @private0, {[], "1b"}}}}}, 0x0) 23:20:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 23:20:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x10, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000180), 0x46080, &(0x7f0000000400)={'trans=rdma,', {}, 0x2c, {[{@timeout}, {@sq}, {@sq}], [{@pcr={'pcr', 0x3d, 0x32}}, {@subj_role={'subj_role', 0x3d, '#'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@hash}]}}) io_submit(r1, 0x1848, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 23:20:13 executing program 5: madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xc) 23:20:13 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x16, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000", 0x0, 0x100, 0x6000000000000000}, 0x48) [ 852.273056][T23604] hfsplus: umask requires a value [ 852.278178][T23604] hfsplus: unable to parse mount options 23:20:13 executing program 1: futex(&(0x7f0000000280), 0x189, 0x0, &(0x7f0000000300), 0x0, 0x1) 23:20:13 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000180), 0x0, 0xc2342) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f00000001c0)={0x0, 0x3}) [ 852.493386][T23610] loop2: detected capacity change from 0 to 16 23:20:13 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@umask={'umask', 0x3d, 0xee930000000}}]}) 23:20:13 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x6, 0x4) 23:20:13 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x16, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000", 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4008000, &(0x7f0000000180)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000100)='J', 0x3808, 0x4004084, 0x0, 0x11000a00) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) 23:20:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') flock(0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 23:20:14 executing program 3: futex(&(0x7f00000004c0), 0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000100), 0x2) [ 852.979224][T23720] hfsplus: umask requires a value [ 852.984559][T23720] hfsplus: unable to parse mount options 23:20:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) setitimer(0x0, 0x0, 0x0) 23:20:14 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000001c00), 0x0, &(0x7f0000001d00)={[{@umask={'umask', 0x3d, 0xee930000000}}]}) 23:20:14 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff000040006329", 0x0, 0x100, 0x6000000000000000}, 0x48) [ 853.337454][T23730] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 853.594938][T23736] hfsplus: umask requires a value [ 853.600067][T23736] hfsplus: unable to parse mount options 23:20:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) recvmmsg(r0, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4008000, &(0x7f0000000180)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:20:14 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x200) 23:20:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x10, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1848, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 23:20:14 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 23:20:14 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff000040006329", 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x7, &(0x7f0000000a40)=[{0x0, 0x0, 0xffffffffffffffff}, {0x0}, {&(0x7f0000000100)}, {&(0x7f00000001c0), 0x0, 0x7}, {&(0x7f0000000800)="ed08b65f816119d0f7f73889a65110efdd3948b4ae0a6d7df8d06d55330c0ba381432f3994dcc8390c6948333d5c823525f320c2f3117508f6ff896382432344c6f288dc5025f0c24166d2d8832aeb4841d6c2cc59f5142cc586daff48041e85e0d4a807769ccb52cb0cfdca", 0x6c, 0x1}, {0x0, 0x0, 0x6}, {0x0, 0x0, 0x4000000003}], 0x80805, &(0x7f0000000b40)) mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) creat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 23:20:15 executing program 1: socket$inet(0x2, 0xc, 0x0) 23:20:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'wlan1\x00'}) 23:20:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0), 0x24, 0x0) [ 854.291152][T23751] loop0: detected capacity change from 0 to 264192 23:20:15 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff000040006329", 0x0, 0x100, 0x6000000000000000}, 0x48) 23:20:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 23:20:15 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 23:20:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1=0x40070400}, 0x10) 23:20:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x7, &(0x7f0000000a40)=[{0x0, 0x0, 0xffffffffffffffff}, {0x0}, {&(0x7f0000000100)}, {&(0x7f00000001c0), 0x0, 0x7}, {&(0x7f0000000800)="ed08b65f816119d0f7f73889a65110efdd3948b4ae0a6d7df8d06d55330c0ba381432f3994dcc8390c6948333d5c823525f320c2f3117508f6ff896382432344c6f288dc5025f0c24166d2d8832aeb4841d6c2cc59f5142cc586daff48041e85e0d4a807769ccb52cb0cfdca", 0x6c, 0x1}, {0x0, 0x0, 0x6}, {0x0, 0x0, 0x4000000003}], 0x80805, &(0x7f0000000b40)) mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) creat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 23:20:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0), 0x24, 0x0) 23:20:16 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$char_usb(r0, &(0x7f0000000040)="ac38ebf50054efbe80385b03772c545a3a", 0x11) 23:20:16 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x0, 0x6000000000000000}, 0x48) 23:20:16 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) lstat(0x0, 0x0) [ 855.208730][T23765] loop0: detected capacity change from 0 to 264192 23:20:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0), 0x24, 0x0) 23:20:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x7, &(0x7f0000000a40)=[{0x0, 0x0, 0xffffffffffffffff}, {0x0}, {&(0x7f0000000100)}, {&(0x7f00000001c0), 0x0, 0x7}, {&(0x7f0000000800)="ed08b65f816119d0f7f73889a65110efdd3948b4ae0a6d7df8d06d55330c0ba381432f3994dcc8390c6948333d5c823525f320c2f3117508f6ff896382432344c6f288dc5025f0c24166d2d8832aeb4841d6c2cc59f5142cc586daff48041e85e0d4a807769ccb52cb0cfdca", 0x6c, 0x1}, {0x0, 0x0, 0x6}, {0x0, 0x0, 0x4000000003}], 0x80805, &(0x7f0000000b40)) mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) creat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 23:20:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') creat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 23:20:16 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x0, 0x6000000000000000}, 0x48) 23:20:16 executing program 2: setreuid(0x0, 0xee00) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 23:20:16 executing program 1: syz_open_dev$evdev(&(0x7f0000000840), 0x0, 0xe140) 23:20:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0), 0x24, 0x0) 23:20:17 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x0, 0x6000000000000000}, 0x48) [ 856.039332][T23789] loop0: detected capacity change from 0 to 264192 23:20:17 executing program 2: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x980a36d84ebd5ab1, 0xffffffffffffffff, 0x8000000) 23:20:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 23:20:17 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000400), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14, r1, 0x1}, 0x14}}, 0x0) 23:20:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x7, &(0x7f0000000a40)=[{0x0, 0x0, 0xffffffffffffffff}, {0x0}, {&(0x7f0000000100)}, {&(0x7f00000001c0), 0x0, 0x7}, {&(0x7f0000000800)="ed08b65f816119d0f7f73889a65110efdd3948b4ae0a6d7df8d06d55330c0ba381432f3994dcc8390c6948333d5c823525f320c2f3117508f6ff896382432344c6f288dc5025f0c24166d2d8832aeb4841d6c2cc59f5142cc586daff48041e85e0d4a807769ccb52cb0cfdca", 0x6c, 0x1}, {0x0, 0x0, 0x6}, {0x0, 0x0, 0x4000000003}], 0x80805, &(0x7f0000000b40)) mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) creat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 23:20:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0), 0x24, 0x0) 23:20:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) 23:20:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) creat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 23:20:17 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x48) 23:20:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0), 0x24, 0x0) [ 856.847276][T23805] loop0: detected capacity change from 0 to 264192 23:20:18 executing program 1: getresgid(&(0x7f0000009fc0), &(0x7f000000a000), &(0x7f000000a040)) 23:20:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) socket$packet(0x11, 0x2, 0x300) sendto$inet(r0, 0x0, 0x0, 0x4008000, &(0x7f0000000180)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000100)='J', 0x3808, 0x4004084, 0x0, 0x11000a00) 23:20:18 executing program 0: socketpair(0x10, 0x3, 0x5, &(0x7f00000004c0)) 23:20:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1000800, &(0x7f00000005c0)=ANY=[]) 23:20:18 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b6c5f6688e15308a1f835541010000000000000056b8530e31ec24925095a163b9d4e76be266e31a80382240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45d91fbdce32bebcb3ac17c5146793e6a4785ee8b60092659b941bbd694d1f8898b3e6477afbda84355dba16801c89c08c07ce144961bfbb975b726a0b59b8c79321bc8d0093979391090e0ac8666d2500dd60794bf7cb8ef212f06ee740327968dbb729b75a4244ee0f031e5a093bff037d9f7f76327e4b24c85056e8aaa845d819fa9f8de1ffffffffffffff4d7b35421046847281aae5b1cc0fd183f68ff1bf9af98bacf1b91cf55debb0c8c027901f949834aec6764bce8586a9470f267b12e5ad2274f22103f30e5c1a119dce8693e94b92ae72abe72127d82c3884ea84c82c9d2f5ce635d2b997b21bb82f720095064fcd956de51de721d7f9bd85fec7afc6e6a79f9101e03b356cf1bb813e646dcd43c1a71ef25be3644067cdea1848e7e55a5164a1fb7a9010912fbf136a9721fa4c84f5494a267ea72f87412708bcd54815c4a1d38a999525e3335e5c8f2c2d1f5d7872cd9fa6fd4b86f2706048deb9588df7edae5570d9cd271afa0b677fbba6cd0b2c337bc1c911280ee8418d1b91c95f1fb690a646da89555ea2f69cb8b6fe853d58b3573e3042af03d2609669b4ec74c0f38219aa1758541bdce5de67672f074fd00852ac2c19f563286dc7f00690f113fb35be701cacaf13ea3fcbdc0628e79608bc11346d21f8d0feefa550f3c2d49a0dc75e6a7ad030645b1ff82f2eb6fb0c249feda3d136c99548a4b05e8da5a71e50ed6cf57d1f3685a01467ceb863257802a3b723feeadcf9cef3f187a3977b5686c752967a5ecab78bf30e58507d70bef72cc3d9a3631419800f6b87aff9b4a8500aa5fc3ca4646022dbfcba6abda059f20d70dc1f22660f8320003ed24a2e282fab87be4b0ce4baee2ffb1f3375dc6c50efe3603fcc9e478bd013f1b1bd2f32714128c689743ee743e1f0cd954064bf1fede56537f38264faebcd68fb12bdae6fdea23912b94d9a6ffe91cdcec0122a7be453fbd176c120a8b0d4afbffce99c0b0e745d99e7c103f819f9c62345a898b1ee15d9108c89f896576ce7867730e2658438aab95b8ab1cfe14be2efba6c4048f15a339fd4db3dfdd596b784dc122bf9fa097aef9933957d39d99eebad48b9b7f61201a1c716dc6c3a5af9e5050d8693e06a0801915e062def2e450fecb48db213cbeaf91eac97b91de342f353b8b30000000000262891e511119000b58c011c8ce9fb1225ecc54b3a6caa"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x48) 23:20:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x36a0, &(0x7f0000000080), &(0x7f0000ff0000/0xf000)=nil, &(0x7f00006d4000/0x3000)=nil, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000003c0)='\xff\x00l\x1e\xa00x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x3, 0x4, 0x0, 0x1, {0x4, 0xa}}]}]}, 0x2c}}, 0x0) 23:20:20 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "9645eb55987c310ccc845747fef9e45cc0cd50708a879ef7384e0520c97956c92ac89333ae7a76153b319a6541213309a999b25786e11f15858c1bc72bf9ff1b"}, 0x48, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffe, 0x0) 23:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, r1, 0x6204db8ba5c6fc5b}, 0x14}}, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, 0x0, 0x0) 23:20:20 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'macsec0\x00', {0x400000}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300290d698cb89e40f008001fffffff00004000632977", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x48) 23:20:20 executing program 5: mkdir(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0), 0x24, 0x0) 23:20:20 executing program 0: mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000001140)=0x8001, 0x74, 0x0) 23:20:21 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x36a0, &(0x7f0000000080), &(0x7f0000ff0000/0xf000)=nil, &(0x7f00006d4000/0x3000)=nil, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000003c0)='\xff\x00l\x1e\xa00xffffffffffffffff}) ioctl$BLKRAGET(r0, 0x40049409, 0x0) 23:20:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x4, 0x0, 0x1, {0x4, 0xa}}]}]}, 0x2c}}, 0x0) 23:20:23 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@cgroup, 0xffffffffffffffff, 0x33}, 0x2a) 23:20:23 executing program 4: ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x1, 0x9, 0x2, 0x1, 0x0, 0x0, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_config_ext={0x20, 0x100000001}, 0x2000, 0x2, 0x85e, 0x6, 0x0, 0x6, 0xffff, 0x0, 0x827f, 0x0, 0x5}, 0x0, 0x8, r1, 0x3) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 23:20:23 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2287, &(0x7f00000007c0)) 23:20:23 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000000c0), 0x24, 0x0) 23:20:23 executing program 0: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x109481) 23:20:23 executing program 2: ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open_tree(r0, &(0x7f0000000000)='./file0\x00', 0x8800) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000240)={@id={0x2, 0x0, @c}, 0x21, 0x0, '\x00', @c}) r3 = openat$cgroup_ro(r2, &(0x7f0000000380)='cgroup.controllers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r1, {0x2f}}, './file0\x00'}) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x1, 0x9, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_config_ext={0x20, 0x100000001}, 0x2000, 0x2, 0x85e, 0x6, 0x0, 0x6, 0xffff, 0x0, 0x827f, 0x0, 0x5}, 0x0, 0x8, r4, 0x3) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(r5, 0x40c, &(0x7f0000000000)) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x0, 0x20, 0x1, 0xb1, 0x0, 0x2263b34, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f00000002c0), 0x6}, 0x44804, 0x78, 0x80000000, 0x3, 0x1f, 0x0, 0x3, 0x0, 0x800, 0x0, 0x100000000}, 0x0, 0x6, r5, 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 23:20:23 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETSET(r0, 0x0, 0x41) ftruncate(r0, 0x208200) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = accept4$unix(r1, &(0x7f0000000240), &(0x7f00000002c0)=0x6e, 0x0) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000300)) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r5 = socket$inet6(0xa, 0x401000000001, 0x0) close(r5) sendmsg$IEEE802154_LLSEC_SETPARAMS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x0, 0x70bd2a, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0xd9087c639038375f}, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0xc) sendfile(r5, r5, 0x0, 0xffffdffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xa2000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x7, 0x1, 0x101, 0x0, 0x0, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000c000}, 0x0) 23:20:23 executing program 0: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x109481) 23:20:23 executing program 3: ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) getdents(0xffffffffffffff9c, &(0x7f00000001c0)=""/224, 0xe0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x91, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x3) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 23:20:23 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000007c0)) 23:20:23 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000000c0), 0x24, 0x0) 23:20:24 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2275, &(0x7f00000007c0)) 23:20:24 executing program 4: bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf315bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0xfeb1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) 23:20:24 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 23:20:24 executing program 3: ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) getdents(0xffffffffffffff9c, &(0x7f00000001c0)=""/224, 0xe0) perf_event_open(&(0x7f0000000880)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x91, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, r1, 0x3) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 23:20:24 executing program 2: semctl$SETALL(0x0, 0x0, 0x10, 0x0) [ 863.801686][T24058] loop4: detected capacity change from 0 to 1054 [ 863.896615][T24058] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 23:20:25 executing program 0: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x80, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f00000001c0)='./bus\x00', 0x0) [ 864.066746][T24058] EXT4-fs (loop4): orphan cleanup on readonly fs [ 864.073474][T24058] EXT4-fs error (device loop4): __ext4_iget:4933: inode #3: block 1950941184: comm syz-executor.4: invalid block 23:20:25 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x80000000) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) timer_gettime(0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340), 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000015c0)='\a') clone(0x8a864180, &(0x7f0000000240), &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540)="198d88955e49c8a99d3071c48899a2d158cd4d767dc5fec347b8192f115f4517") [ 864.279265][T24058] EXT4-fs (loop4): Remounting filesystem read-only [ 864.291318][T24058] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 864.417515][T24070] loop0: detected capacity change from 0 to 272 [ 864.476569][T24058] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 864.492975][T24058] EXT4-fs (loop4): Cannot turn on quotas: error -117 [ 864.499767][T24058] EXT4-fs (loop4): mounted filesystem without journal. Opts: errors=remount-ro,. Quota mode: writeback. [ 865.969742][ T24] audit: type=1800 audit(1641338427.016:79): pid=24002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=1241 res=0 errno=0 23:20:27 executing program 1: select(0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x2710}) 23:20:27 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 23:20:27 executing program 2: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000940)=0x5000000) 23:20:27 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340), 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, 0x0) clone(0x0, 0x0, &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540)="198d88955e49c8a99d3071c48899a2d158cd4d767dc5fec347b8") 23:20:27 executing program 0: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x80, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f00000001c0)='./bus\x00', 0x0) 23:20:27 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x10, &(0x7f00001c9fff)="03", 0x3bc) [ 866.002837][ T24] audit: type=1800 audit(1641338427.036:80): pid=24033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=1241 res=0 errno=0 [ 866.123691][T24080] loop2: detected capacity change from 0 to 272 [ 866.206112][T24084] loop0: detected capacity change from 0 to 272 23:20:27 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 23:20:27 executing program 3: socketpair(0x10, 0x3, 0x8, &(0x7f0000000040)) [ 866.471872][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 866.478144][ T3552] libceph: mon0 (1)[d::]:6789 connect error 23:20:27 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 23:20:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000000)="63a02ea1b94423ef42e6f26b58c691bf6dd4da646e211597bd9174a27d9a5ae727cc4ab2609e0c454b46630ca5a2a01dc12bbb1b178d90524e9056a790c094f788bfa9bac20736d75f9a64144840666f1ba229ce7b12eabd737efa22fc265651eb4f7a3faf96f40bbe8eb253392463f04ea5a249f1b2afebd4af76672fcb82a78122fac3f4583d3d32d4d7fc2a186ba4c92f39e1105e3024d561addd7b213279eef0ba7fad1d5cbf765ea17713a5557c5a7899f7255b593ba579d1bc7f98beb565b3a314e14f4654eb89667773732e6b53e8026763a9aa6583faa898e3dc29f451", 0xe1) 23:20:27 executing program 0: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x80, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f00000001c0)='./bus\x00', 0x0) [ 866.836795][T24081] ceph: No mds server is up or the cluster is laggy [ 866.861263][ T3559] libceph: connect (1)[d::]:6789 error -101 [ 866.867770][ T3559] libceph: mon0 (1)[d::]:6789 connect error 23:20:27 executing program 5: semget(0x2, 0x0, 0x688) 23:20:27 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) read(r0, &(0x7f0000000040)=""/149, 0x95) 23:20:28 executing program 1: unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x0) [ 867.061444][T24204] loop0: detected capacity change from 0 to 272 23:20:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:20:28 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340), 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, 0x0) clone(0x0, 0x0, &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540)="198d88955e49c8a99d3071c48899a2d158cd4d767dc5fec347b8") 23:20:28 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340), 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, 0x0) clone(0x0, 0x0, &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540)="198d88955e49c8a99d3071c48899a2d158cd4d767dc5fec347b8") 23:20:28 executing program 1: syz_open_procfs$namespace(0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2a3007b, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:20:28 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x30, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:20:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480ef43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 867.679992][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 867.686863][ T3552] libceph: mon0 (1)[d::]:6789 connect error 23:20:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000007080)=@base={0x1, 0x80, 0x32, 0x9fd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) [ 867.902771][T24324] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 867.911423][T24324] team0: Device veth0_macvtap is up. Set it down before adding it as a team port 23:20:29 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340), 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, 0x0) clone(0x0, 0x0, &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540)="198d88955e49c8a99d3071c48899a2d158cd4d767dc5fec347b8") [ 868.083303][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 868.089436][ T3552] libceph: mon0 (1)[d::]:6789 connect error 23:20:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp, 0x2000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) splice(r0, &(0x7f0000000140)=0xfaf, 0xffffffffffffffff, &(0x7f00000001c0)=0x8, 0x800, 0x1) socket$inet(0x2, 0x3, 0x2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002a40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000002c0)={r1, 0x9, 0x4}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x0, @inherit={0x88, 0x0}, @subvolid=0x7}) time(&(0x7f0000000180)) r2 = socket$inet(0x2, 0x3, 0x2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0x40000, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000001640)={{r3}, 0x0, 0x10, @unused=[0x0, 0x0, 0x8, 0xffffffff], @name="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"}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000025ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 23:20:29 executing program 5: perf_event_open(&(0x7f0000001940)={0x2, 0x80, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:20:29 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="140000001500055bd25a80648ccad58613d561b4", 0x14}], 0x1}, 0x0) [ 868.693419][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 868.699553][ T3552] libceph: mon0 (1)[d::]:6789 connect error 23:20:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)=0x4006) [ 868.947903][T14349] libceph: connect (1)[d::]:6789 error -101 [ 868.954141][T14349] libceph: mon0 (1)[d::]:6789 connect error [ 869.046800][T24345] loop2: detected capacity change from 0 to 131456 23:20:30 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2, 0x14}, 0x80, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x4800}, 0x0) [ 869.215441][T14349] libceph: connect (1)[d::]:6789 error -101 [ 869.221605][T14349] libceph: mon0 (1)[d::]:6789 connect error [ 869.239257][T24345] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 869.267556][T24345] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e002e018, mo2=0006] [ 869.280116][T24345] System zones: 1-2, 19-19, 35-38, 46-46 [ 869.396061][T24345] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 869.429957][T24345] ext4 filesystem being mounted at /root/syzkaller-testdir379419071/syzkaller.3gypF5/815/file0 supports timestamps until 2038 (0x7fffffff) [ 869.683858][T24340] ceph: No mds server is up or the cluster is laggy [ 869.820556][T14349] libceph: connect (1)[d::]:6789 error -101 [ 869.826818][T14349] libceph: mon0 (1)[d::]:6789 connect error [ 870.013533][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 870.019684][ T3552] libceph: mon0 (1)[d::]:6789 connect error [ 870.390477][T24303] ceph: No mds server is up or the cluster is laggy [ 883.663763][ T1201] ieee802154 phy0 wpan0: encryption failed: -22 [ 883.670246][ T1201] ieee802154 phy1 wpan1: encryption failed: -22 23:20:48 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340), 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, 0x0) clone(0x0, 0x0, &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540)="198d88955e49c8a99d3071c48899a2d158cd4d767dc5fec347b8") 23:20:48 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) 23:20:48 executing program 1: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000400), 0x4) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100052b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000006000003000000009d91409707a79498161c761a92f8f2e08d4af9a4", 0x5dc}], 0x1}, 0x0) 23:20:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp, 0x2000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) splice(r0, &(0x7f0000000140)=0xfaf, 0xffffffffffffffff, &(0x7f00000001c0)=0x8, 0x800, 0x1) socket$inet(0x2, 0x3, 0x2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002a40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000002c0)={r1, 0x9, 0x4}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x0, @inherit={0x88, 0x0}, @subvolid=0x7}) time(&(0x7f0000000180)) r2 = socket$inet(0x2, 0x3, 0x2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0x40000, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000001640)={{r3}, 0x0, 0x10, @unused=[0x0, 0x0, 0x8, 0xffffffff], @name="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"}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000025ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 23:20:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000003d80)='./file0\x00', 0x53) 23:20:48 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'vxcan1\x00'}) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000400)="9e", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={&(0x7f0000000200)=@ll={0x11, 0x19, 0x0, 0x1, 0x7f, 0x6, @link_local}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000340)="9b3c9b906a9531960d2149b7c5dcd7ac8629cbbd8fd0fb6f7a157b75f4abb793e6515412f031e295ef43f82fa7a23234a011a9d83620314024042ecd3b108c7f4d61d71aa118689a7c43393994bf4a0572296784bb01ecfa3bd6ead114b6c839067c03ad", 0x64}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2b0}, 0x44041) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000800)=ANY=[@ANYBLOB="61128c000000000061138c0000000000bf2000000000000015000000010000072d0301000000000095000000000000006916000000000000bf67000000000000660605000fff07206706000002000000070300000ee60060bf050000000000003c650000000000006507f9ff01000000070700004cdfffff1e75000000000000bf54000000000000070400000400f9ffad43010000150000d5000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb375d6ec7b65c1f12dc8c27df8ecfc7bdd2d17f2f1754558f2278af6d71d09a5e12814cb9bdb7dd399703d6c4f6f3be4b369289aa6812b8e007e733e56c9d8a814261bdb94a05000000c6c60bf70d2a81762bab8395fa64810b5b40d893"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socket$kcm(0x11, 0x200000000000002, 0x300) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000045c0)={&(0x7f0000003e80)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x80, 0x0, 0x0, &(0x7f0000004480)=[{0x38, 0x113, 0x81, "c402a3583e1c0603bc557a62aa5fc4b602abd9ff13376599c8f2b7c690bef68daa09ae38"}, {0xe0, 0x105, 0x0, "061da16a52616100b1be096ddc4d723698c2aafafff4d6f007d33ffd769a5f4701a68f4f96ed895a39a83fb0470924ff0d2bd2dbcd50e2c4cb3a4e029b1951e9743ae5c341c717d7985d1482fdd4b1f10aad168fdb5aa8fefbc053d1dfa09a9d3f0e7449dd0e8f9c28405e8528955bee9569785085403ff8af4dc597a504f6692a945f418f5b0fea2eb602684dad353a7f3f635170cbef649a47d192842092413ca67a9ec1914b83be369b9481dffb9440e4e7198d2affa4419a2bd24e1c44446a733285b88c13da3a"}], 0x118}, 0x2404c000) socket$kcm(0x10, 0x2, 0x0) [ 887.795876][T24366] bridge0: port 2(bridge_slave_1) entered disabled state [ 887.805164][T24366] bridge0: port 1(bridge_slave_0) entered disabled state [ 887.817179][T24366] device bridge0 entered promiscuous mode 23:20:48 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20044884) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff008}], 0xb3, 0x0, 0x0, 0x40020a11}, 0x6db3) socket$kcm(0x29, 0x0, 0x0) socketpair(0x0, 0x5, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 23:20:49 executing program 5: ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40e41, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000200)={'macvlan1\x00', @broadcast}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0)=@abs, 0x6e, 0x0}, 0x40000040) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000680)={'veth1_to_team\x00', @local}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0x140) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000000c0)={'wlan1\x00', @broadcast}) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xe89824c08c4dd239, 0x0) 23:20:49 executing program 3: unlink(&(0x7f0000000780)='./file0\x00') [ 887.913749][T24367] loop2: detected capacity change from 0 to 131456 [ 888.163227][T24367] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 888.176546][T24367] ext4 filesystem being mounted at /root/syzkaller-testdir379419071/syzkaller.3gypF5/816/file0 supports timestamps until 2038 (0x7fffffff) 23:20:49 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 23:20:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 888.402044][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 888.408176][ T3552] libceph: mon0 (1)[d::]:6789 connect error 23:20:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp, 0x2000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) splice(r0, &(0x7f0000000140)=0xfaf, 0xffffffffffffffff, &(0x7f00000001c0)=0x8, 0x800, 0x1) socket$inet(0x2, 0x3, 0x2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002a40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000002c0)={r1, 0x9, 0x4}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x0, @inherit={0x88, 0x0}, @subvolid=0x7}) time(&(0x7f0000000180)) r2 = socket$inet(0x2, 0x3, 0x2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0x40000, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000001640)={{r3}, 0x0, 0x10, @unused=[0x0, 0x0, 0x8, 0xffffffff], @name="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"}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000025ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 888.793420][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 888.799584][ T3552] libceph: mon0 (1)[d::]:6789 connect error [ 889.093462][T24399] loop2: detected capacity change from 0 to 131456 [ 889.210591][T24373] ceph: No mds server is up or the cluster is laggy [ 889.266156][T24399] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 889.302628][T24399] ext4 filesystem being mounted at /root/syzkaller-testdir379419071/syzkaller.3gypF5/817/file0 supports timestamps until 2038 (0x7fffffff) [ 889.363799][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 889.369927][ T3552] libceph: mon0 (1)[d::]:6789 connect error 23:20:51 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340), 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, 0x0) clone(0x0, 0x0, &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540)="198d88955e49c8a99d3071c48899a2d158cd4d767dc5fec347b8") 23:20:51 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x4, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) 23:20:51 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0xbe, 0xdd, 0x6e, 0x10, 0x9710, 0x7730, 0x3cd8, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x39, 0xb7, 0x1e}}]}}]}}, 0x0) 23:20:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0xf}}) 23:20:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp, 0x2000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) splice(r0, &(0x7f0000000140)=0xfaf, 0xffffffffffffffff, &(0x7f00000001c0)=0x8, 0x800, 0x1) socket$inet(0x2, 0x3, 0x2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002a40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000002c0)={r1, 0x9, 0x4}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x0, @inherit={0x88, 0x0}, @subvolid=0x7}) time(&(0x7f0000000180)) r2 = socket$inet(0x2, 0x3, 0x2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0x40000, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000001640)={{r3}, 0x0, 0x10, @unused=[0x0, 0x0, 0x8, 0xffffffff], @name="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"}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000025ce0000000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 23:20:51 executing program 3: socket$inet(0xc, 0x0, 0x0) [ 890.985179][T24471] loop2: detected capacity change from 0 to 131456 23:20:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x5f) 23:20:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001740)=@base={0x0, 0x0, 0x0, 0x0, 0x24, 0x1}, 0x48) [ 891.273359][T24471] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e802e01c, mo2=0006] [ 891.323738][T24471] System zones: 1-2, 19-19, 35-38, 46-46 [ 891.341394][T24471] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 891.353875][T24471] ext4 filesystem being mounted at /root/syzkaller-testdir379419071/syzkaller.3gypF5/818/file0 supports timestamps until 2038 (0x7fffffff) 23:20:52 executing program 3: syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000580)=[{&(0x7f0000000180)="11", 0x1}, {&(0x7f0000000640)="eef0d902", 0x4}], 0x0, 0x0) [ 891.572720][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 891.580098][ T3552] libceph: mon0 (1)[d::]:6789 connect error 23:20:52 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffb) 23:20:52 executing program 0: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, 0x0) syz_io_uring_complete(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) 23:20:52 executing program 2: socketpair(0x0, 0x83edaf38ca312751, 0x0, 0x0) [ 891.973114][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 891.979268][ T3552] libceph: mon0 (1)[d::]:6789 connect error [ 892.424767][T24476] ceph: No mds server is up or the cluster is laggy [ 892.563093][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 892.569228][ T3552] libceph: mon0 (1)[d::]:6789 connect error 23:20:53 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340), 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, 0x0) 23:20:53 executing program 5: syz_io_uring_setup(0x797c, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x15c}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 23:20:53 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sched_setattr(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d007dc6751dfb265a0e3ccae669e173a649c1cfd5587d452d64e7cc957d77578f4c25235138d5521f9453559c35da860e8efbc6f2b2a3e314422b854421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe3e26e7a23129d6606fd28a69989d552af6d9a9df2c3af36e0360050011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a13ed38ae82f87925bfacba83109753f541cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b70a70000000000000000000000d7900a820b63278f4e9a217b98ef7042ad2a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e0867958e1dd7a0defb6670c3d054002238260000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x7f00}, 0x1c) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) 23:20:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='.\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, '\'@{'}}]}) 23:20:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f0000000340)) 23:20:53 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x3, 0x0, "109f5f68e63ba04e1a0969eba706b0ff983a573704a84aff5f1e21f2629639f865d8ac40fd916a72d271e7624b7f8830b3230f1beee39f3ddfaa811f9f967b"}, 0x60) 23:20:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x0, 0x0, 0x0, 0x40}, 0x48) 23:20:54 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "420c8d7387e5d7a543e11ca7dd47dd8e374789761a6133dfddd20d0611d6532f3136e693c5fda4ccd54d0fdc899d0519094b3c87e86b78944bdaac699224a398"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "420c8d7387e5d7a543e11ca7dd47dd8e374789761a6133dfddd20d0611d6532f3136e693c5fda4ccd54d0fdc899d0519094b3c87e86b78944bdaac699224a398"}, 0x48, 0xfffffffffffffffb) keyctl$link(0x8, r0, r1) 23:20:54 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) 23:20:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x2, 0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6}]}, 0x28}}, 0x0) 23:20:54 executing program 1: syz_io_uring_setup(0x33b3, &(0x7f0000000180)={0x0, 0xafc1, 0xe, 0x2, 0xfffffffc}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) [ 893.273472][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 893.279697][ T3552] libceph: mon0 (1)[d::]:6789 connect error [ 893.560862][T24507] ceph: No mds server is up or the cluster is laggy [ 893.583289][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 893.589461][ T3552] libceph: mon0 (1)[d::]:6789 connect error 23:20:54 executing program 2: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4e7, 0x50, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f0000000200)=@lang_id={0x4}}, {0x4, &(0x7f0000000440)=@lang_id={0x4}}]}) 23:20:54 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340), 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, 0x0) 23:20:54 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000004380), 0x0, &(0x7f0000004440)={[{@prjquota={'prjquota', 0x3d, '%'}}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 23:20:54 executing program 5: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r0, &(0x7f0000007b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/22, 0x16}, {&(0x7f0000001740)=""/187, 0xbb}, {&(0x7f0000001800)=""/239, 0xef}, {&(0x7f0000001900)=""/94, 0x5e}], 0x5}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 23:20:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1d, 0x0, &(0x7f0000000340)) [ 894.375127][T24533] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 894.383563][T24533] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 894.548643][T24533] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 894.556767][T24533] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 894.567437][ T3569] usb 3-1: new high-speed USB device number 26 using dummy_hcd [ 894.842296][ T3569] usb 3-1: Using ep0 maxpacket: 8 [ 894.962684][ T3569] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 23:20:56 executing program 1: r0 = io_uring_setup(0x7596, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f0000000100)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x19) 23:20:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x76) 23:20:56 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340), 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, 0x0) [ 895.383111][ T3569] usb 3-1: New USB device found, idVendor=04e7, idProduct=0050, bcdDevice= 0.40 [ 895.392507][ T3569] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 895.400699][ T3569] usb 3-1: Product: syz [ 895.405139][ T3569] usb 3-1: SerialNumber: syz 23:20:56 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000004380), 0x0, &(0x7f0000004440)={[{@prjquota={'prjquota', 0x3d, '%'}}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 23:20:56 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x10000, 0x3, 0x1, 0x40}, 0x48) [ 895.659948][ T3569] usbhid 3-1:1.0: couldn't find an input interrupt endpoint 23:20:56 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) [ 895.978785][T14349] usb 3-1: USB disconnect, device number 26 [ 896.168487][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 896.174677][ T3552] libceph: mon0 (1)[d::]:6789 connect error [ 896.193489][T24606] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 896.201531][T24606] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 23:20:57 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f000000e080)={{}, {}, [{}, {0x2, 0x0, 0xffffffffffffffff}]}, 0x34, 0x0) [ 896.368647][T24606] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 896.376888][T24606] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 896.454227][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 896.460432][ T3552] libceph: mon0 (1)[d::]:6789 connect error 23:20:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000003700)={0x0, 0x0, &(0x7f00000036c0)={&(0x7f0000000a80)={0xe84, 0xd, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xe2c, 0x3, 0x0, 0x1, [{0x2b8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x6c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_DATA={0x218, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xf1, 0x1, "491b9765e896dd124336647d51d8553a6875ae968178c7659517634e45266b33dea7086d0cbd897a95b317f4246e141bec0f54fc147a60e0b5e12cb8d3d27e4e7a82138943a2ff68af53b43b3916c15afbb690edef7042a29810cad67e36abf965e08c6c246fa41761936099431ff13e436b922100e7c2300b7af6cf1b79b7db63838e2febc9e5a6c202519b41d17584fc53b88e2179eba8714e8ec35a42d5566ecbd716e6d193d775c1ee1c0bbea5d5a8d097eabdaa50d529549438da816764b724550ff678058a219634a3a41fde7583c60c7ec49bd17f57f193be9051c151922fec005adfe3536e0bc4f075"}, @NFTA_DATA_VALUE={0xfd, 0x1, "948ca7c5971e965e2c80ffd9819f2930b28e5af7ec880e2026468b007635bf55d83d35b801265ad71c39a830f993dcb95ee541f096b38fd2f557ceb3b2f2c5e06ffec30d4b37a033f0082d36f74fe3760974b9cfe44a3ada0f78d7648709c6f15cb65f91a1231d065aa4ac36489a9659402b5e44f21a346757a076c05c9225c7a8d9b12aa22f6bdde128624a014ae273db87a0707a4c13655b80d129157f2b01932e631d9c98ce6769f70ace08e46dbc9377693a7db0cf292ece1d81521cd9309599f3bc4b243c00e135b1654bc9bd770903f31937944bb98f8670234c7100a50211b1763678f4aca4c60c5cdbdce7915d7d4f135592827921"}, @NFTA_DATA_VALUE={0x1d, 0x1, "cc5446c4a2cbdb36489201d607cbdd5efa695a4f0a9042de7c"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x3a8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x13c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x9, 0x1, "a06fdfafde"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x69, 0x1, "ff3285315446ddb9238f4cf5434f5a5646f6ed3c685552a705e738dace4bab28086fa39297127051d4087e2b52068598d15c2dd51a014b47864e60d9c88261df88fea039b0554facbe8020d374f5d1ddebbd5fcc33ff932e6367334762d4a6daa1ec6fe8b8"}, @NFTA_DATA_VALUE={0x81, 0x1, "194b08b0946b090b4925c061e355dcbcf622db10f0f3a61a7ef1411535e1ae8a800cf16399c0c4762d3424beef87e512a942336e1472368d0d15b87575e1ba0e182ba589db66344354219ad27d557d6e3054fa6e178bcbe99ce649193da16178c011b4803017af4ae3c393a57af2d65b99402e95e41add3900b46aefef"}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_DATA={0x12c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x49, 0x1, "3ea07d7ded1397792c3b9f3ecc4f6aa70b4c9f8c81145f103e5655711a6525032438358d572eac2b619aa11cf211888b190c1c7faedeeed799241586a630d851645384ba89"}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x11, 0x1, "84abd97775f7ea2088400d3a3d"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_DATA={0x20, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_KEY={0xfc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x55, 0x1, "8f55518dcc99b6501ba05c417fc6b2e575a5e0506ea9808f6eecbe7a7ed49b76cfeaf77f6e5d735cd8547fe8c0c2f16289e924d356965931b735a7dd7096fb69da9b1b70dc5ece57736a465c295d00b3fd"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}]}, {0x7c8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_KEY_END={0x7ac, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x7d, 0x1, "89546989bfecf9ade1e55d2dfb2a4b0bc97059b734ae7c140a3422eee47b0409223aaf7af474602fd692d2b911346530c0759d27fdb521ba7204cc40a72372c152fcdb7911772778a587fde90c0d5f90b96f0f1a93a5bebd64e994406332d8124127608be5ca981748732ecf84e975a1cd15bffbbce24fc228"}, @NFTA_DATA_VALUE={0x725, 0x1, "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"}]}]}]}]}, 0xe84}}, 0x0) 23:20:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:20:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000bc0)=ANY=[@ANYBLOB], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r0}, 0x10) fremovexattr(0xffffffffffffffff, 0x0) 23:20:57 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000004380), 0x0, &(0x7f0000004440)={[{@prjquota={'prjquota', 0x3d, '%'}}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) [ 896.670000][T24597] ceph: No mds server is up or the cluster is laggy 23:20:57 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f000000e080)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 23:20:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000000380)=[{{&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000240)=""/108, 0x6c}], 0x2, &(0x7f0000000300)=""/126, 0x7e}, 0x59c}], 0x1, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600), r0) [ 897.015708][ T3552] libceph: connect (1)[d::]:6789 error -101 [ 897.021838][ T3552] libceph: mon0 (1)[d::]:6789 connect error 23:20:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)="1d", 0x1}, {&(0x7f0000000240)="b890f4af7591f9017c2cd061dd7ce31c6d1ce0203cba8b195e23d896f6a740efaddb33de6dcd2c910d0795abf75a83778386fc8a0cf4cdfc2b5bbffb481eb66a20e38624bb58973c8cd5285bea8137159ecb05f63ca49d5106527710efd417d516992b20c6ab30d8656ddfa4c4d34bc77dc88faeed12990c1d35676722091931d8d0c8273edc555157c5ebd084bf37b8902bd3774c86b658d03e382c9891abc62fe1d521ffa454016183b4d07b683ead1aae117e2ed7316b2f964583fa7563ebdcd9e34c0dd1025fae70cfe038a82fa7", 0xd0}, {&(0x7f0000000340)="d5f7d956fb9075daa0d6f42c180ee232d17486c7aa49a8738777cc82f09cc2b9eda2ea97e44c020f25ea62fd47863d354c0122afbafea2181a8d9238c487badaecff55a1775378f3fac3cf27ed2809e76c99c10f2fa4ef7117be0e15af0b6547b1469b40cc04f5a1e2e8dd9a850ac3d82d3bc839966d1e170fc4e1669bdc4f8be88a0f96f5b854d0775484820a417cc48a49c85a371e911b514c94be66c5a37e", 0xa0}], 0x3) [ 897.213339][T24621] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 897.221301][T24621] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 23:20:58 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, 0x0) clone(0x0, 0x0, &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540)="198d88955e49c8a99d3071c48899a2d158cd4d767dc5fec347b8") 23:20:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) [ 897.363499][T24621] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 897.371389][T24621] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 23:20:58 executing program 5: keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001a40), &(0x7f0000001cc0)=ANY=[@ANYBLOB='enc='], 0x0, 0x0) 23:20:58 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000002380)={&(0x7f0000000080)={0x24, @short}, 0xffffffb1, &(0x7f0000002340)={0x0}}, 0x0) 23:20:58 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, 0x0) 23:20:58 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000004380), 0x0, &(0x7f0000004440)={[{@prjquota={'prjquota', 0x3d, '%'}}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 23:20:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x99) [ 897.911590][T14349] libceph: connect (1)[d::]:6789 error -101 [ 897.917874][T14349] libceph: mon0 (1)[d::]:6789 connect error 23:20:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000003700)={0x0, 0x0, &(0x7f00000036c0)={&(0x7f0000000a80)={0xe84, 0xd, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xe2c, 0x3, 0x0, 0x1, [{0x2b8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x6c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_DATA={0x218, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xf2, 0x1, "491b9765e896dd124336647d51d8553a6875ae968178c7659517634e45266b33dea7086d0cbd897a95b317f4246e141bec0f54fc147a60e0b5e12cb8d3d27e4e7a82138943a2ff68af53b43b3916c15afbb690edef7042a29810cad67e36abf965e08c6c246fa41761936099431ff13e436b922100e7c2300b7af6cf1b79b7db63838e2febc9e5a6c202519b41d17584fc53b88e2179eba8714e8ec35a42d5566ecbd716e6d193d775c1ee1c0bbea5d5a8d097eabdaa50d529549438da816764b724550ff678058a219634a3a41fde7583c60c7ec49bd17f57f193be9051c151922fec005adfe3536e0bc4f07567"}, @NFTA_DATA_VALUE={0x100, 0x1, "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"}, @NFTA_DATA_VALUE={0x1d, 0x1, "cc5446c4a2cbdb36489201d607cbdd5efa695a4f0a9042de7c"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xfffffffffffffffd}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x8}]}, {0x3a0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x13c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x9, 0x1, "a06fdfafde"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x69, 0x1, "ff3285315446ddb9238f4cf5434f5a5646f6ed3c685552a705e738dace4bab28086fa39297127051d4087e2b52068598d15c2dd51a014b47864e60d9c88261df88fea039b0554facbe8020d374f5d1ddebbd5fcc33ff932e6367334762d4a6daa1ec6fe8b8"}, @NFTA_DATA_VALUE={0x81, 0x1, "194b08b0946b090b4925c061e355dcbcf622db10f0f3a61a7ef1411535e1ae8a800cf16399c0c4762d3424beef87e512a942336e1472368d0d15b87575e1ba0e182ba589db66344354219ad27d557d6e3054fa6e178bcbe99ce649193da16178c011b4803017af4ae3c393a57af2d65b99402e95e41add3900b46aefef"}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_DATA={0x12c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x4c, 0x1, "3ea07d7ded1397792c3b9f3ecc4f6aa70b4c9f8c81145f103e5655711a6525032438358d572eac2b619aa11cf211888b190c1c7faedeeed799241586a630d851645384ba899fa982"}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x11, 0x1, "84abd97775f7ea2088400d3a3d"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_DATA={0x20, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY={0xf4, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x4d, 0x1, "8f55518dcc99b6501ba05c417fc6b2e575a5e0506ea9808f6eecbe7a7ed49b76cfeaf77f6e5d735cd8547fe8c0c2f16289e924d356965931b735a7dd7096fb69da9b1b70dc5ece5773"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}]}, {0x7d0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xffffffff}, @NFTA_SET_ELEM_KEY_END={0x7c0, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x80, 0x1, "89546989bfecf9ade1e55d2dfb2a4b0bc97059b734ae7c140a3422eee47b0409223aaf7af474602fd692d2b911346530c0759d27fdb521ba7204cc40a72372c152fcdb7911772778a587fde90c0d5f90b96f0f1a93a5bebd64e994406332d8124127608be5ca981748732ecf84e975a1cd15bffbbce24fc22871b699"}, @NFTA_DATA_VALUE={0x73c, 0x1, "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"}]}]}]}]}, 0xe84}}, 0x0) 23:20:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRDELBR(r0, 0x8906, 0x0) [ 898.193776][T14349] libceph: connect (1)[d::]:6789 error -101 [ 898.199912][T14349] libceph: mon0 (1)[d::]:6789 connect error [ 898.335538][T24645] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 898.343768][T24645] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 23:20:59 executing program 2: clock_getres(0x3, &(0x7f0000000080)) [ 898.523842][T24645] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 898.532207][T24645] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 23:20:59 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240), 0x200082, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000280)='{,\\-\x18^\x00', &(0x7f00000002c0)='\x00', 0x0) 23:20:59 executing program 5: syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x6440) [ 898.939706][T14349] libceph: connect (1)[d::]:6789 error -101 [ 898.945932][T14349] libceph: mon0 (1)[d::]:6789 connect error 23:21:01 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, 0x0) clone(0x0, 0x0, &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540)="198d88955e49c8a99d3071c48899a2d158cd4d767dc5fec347b8") 23:21:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup3(r1, r0, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={0x0, 0x3c}}, 0x0) 23:21:01 executing program 3: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000400)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x7, 0x1, 0x0, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x20}}}}}]}}]}}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x3, [{0x4, &(0x7f0000000640)=@string={0x4, 0x3, '^1'}}, {0x34, &(0x7f0000000680)=@string={0x34, 0x3, "1063370b236f41c7ab8e88d0e0ccb492f81511ba5f4289cc9d949f583ebe4e5ae375851eabe142ce5fd32dbc2e2c52d9326c"}}, {0x9c, &(0x7f00000008c0)=ANY=[@ANYBLOB="9c03f027f0ec4ca53806ac11d83692e70cdf54"]}]}) 23:21:01 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x10000000) [ 900.019132][T14349] libceph: connect (1)[d::]:6789 error -101 [ 900.027033][T14349] libceph: mon0 (1)[d::]:6789 connect error 23:21:01 executing program 1: r0 = fsopen(&(0x7f0000000040)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000140)='devtmpfs\x00', &(0x7f0000000180)='[&\']@}}\x00', 0x0) 23:21:01 executing program 5: socket(0x10, 0x0, 0x4) 23:21:01 executing program 1: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000400)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x7, 0x1, 0x0, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x20}}}}}]}}]}}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f0000000640)=@string={0x4, 0x3, '^1'}}, {0x2, &(0x7f0000000680)=@string={0x2}}]}) 23:21:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5452, &(0x7f0000000000)={'batadv_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@bridge_newvlan={0x18, 0x70, 0x501}, 0x18}}, 0x0) 23:21:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup3(r0, r1, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0xffffffff00000000) 23:21:01 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc3}, &(0x7f0000000380)={0x0, "e4bc0de44f6ff4dee061cae948935d39dcf332825b58d95e4c0a4ef7b44479bc3b3202b8fcc2aa47e142ca90c3428837a03985c5f23d4bd9d58fefdec48d3b1a"}, 0x48, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, r1) [ 900.432570][ T3559] usb 4-1: new high-speed USB device number 55 using dummy_hcd [ 900.675331][ T3559] usb 4-1: Using ep0 maxpacket: 8 23:21:01 executing program 5: bpf$MAP_CREATE(0x13, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:21:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x17, 0x573ad4bc, 0x0, 0x5}, 0x48) [ 900.800012][ T3559] usb 4-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 32 [ 900.973619][T14349] libceph: connect (1)[d::]:6789 error -101 [ 900.979764][T14349] libceph: mon0 (1)[d::]:6789 connect error [ 901.013193][ T3559] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 901.022848][ T3559] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 901.030972][ T3559] usb 4-1: Product: ⟰ꕌظᆬ㛘T [ 901.037044][ T3559] usb 4-1: Manufacturer: 挐ଷ漣읁身킈쳠銴ᗸ먑䉟첉钝墟븾婎痣ẅ칂퍟밭Ⱞ氲 [ 901.049081][ T3559] usb 4-1: SerialNumber: syz [ 901.143160][T24670] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 901.263278][T14349] libceph: connect (1)[d::]:6789 error -101 [ 901.269425][T14349] libceph: mon0 (1)[d::]:6789 connect error [ 901.400635][T14349] usb 4-1: USB disconnect, device number 55 [ 901.813370][T14349] libceph: connect (1)[d::]:6789 error -101 [ 901.819524][T14349] libceph: mon0 (1)[d::]:6789 connect error [ 902.973437][T14349] libceph: connect (1)[d::]:6789 error -101 [ 902.979656][T14349] libceph: mon0 (1)[d::]:6789 connect error [ 904.012855][ T25] libceph: connect (1)[d::]:6789 error -101 [ 904.020524][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 904.283221][ T25] libceph: connect (1)[d::]:6789 error -101 [ 904.289353][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 904.803168][ T25] libceph: connect (1)[d::]:6789 error -101 [ 904.809262][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 906.013166][ T25] libceph: connect (1)[d::]:6789 error -101 [ 906.019310][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 906.985928][ T25] libceph: connect (1)[d::]:6789 error -101 [ 906.993506][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 907.263197][ T25] libceph: connect (1)[d::]:6789 error -101 [ 907.269297][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 907.784997][ T25] libceph: connect (1)[d::]:6789 error -101 [ 907.791033][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 908.973201][ T25] libceph: connect (1)[d::]:6789 error -101 [ 908.979304][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 910.013121][ T25] libceph: connect (1)[d::]:6789 error -101 [ 910.019218][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 910.284714][ T25] libceph: connect (1)[d::]:6789 error -101 [ 910.290762][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 910.802796][ T25] libceph: connect (1)[d::]:6789 error -101 [ 910.808853][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 912.023151][ T25] libceph: connect (1)[d::]:6789 error -101 [ 912.029294][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 912.973126][ T25] libceph: connect (1)[d::]:6789 error -101 [ 912.979257][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 913.242730][ T25] libceph: connect (1)[d::]:6789 error -101 [ 913.248782][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 913.763047][ T25] libceph: connect (1)[d::]:6789 error -101 [ 913.769190][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 914.983297][ T25] libceph: connect (1)[d::]:6789 error -101 [ 914.989399][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 916.023333][ T25] libceph: connect (1)[d::]:6789 error -101 [ 916.029480][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 916.294731][ T25] libceph: connect (1)[d::]:6789 error -101 [ 916.300779][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 916.812855][ T25] libceph: connect (1)[d::]:6789 error -101 [ 916.820524][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 918.013182][ T25] libceph: connect (1)[d::]:6789 error -101 [ 918.019284][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 918.972785][ T25] libceph: connect (1)[d::]:6789 error -101 [ 918.978840][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 919.252855][ T25] libceph: connect (1)[d::]:6789 error -101 [ 919.258914][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 919.772764][ T25] libceph: connect (1)[d::]:6789 error -101 [ 919.778820][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 920.983109][ T25] libceph: connect (1)[d::]:6789 error -101 [ 920.989221][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 922.023159][ T25] libceph: connect (1)[d::]:6789 error -101 [ 922.029261][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 922.302799][ T25] libceph: connect (1)[d::]:6789 error -101 [ 922.308845][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 922.823090][ T25] libceph: connect (1)[d::]:6789 error -101 [ 922.829186][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 924.013041][ T25] libceph: connect (1)[d::]:6789 error -101 [ 924.019142][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 924.973286][ T25] libceph: connect (1)[d::]:6789 error -101 [ 924.979406][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 925.242799][ T25] libceph: connect (1)[d::]:6789 error -101 [ 925.248848][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 925.773201][ T25] libceph: connect (1)[d::]:6789 error -101 [ 925.779279][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 926.975226][ T25] libceph: connect (1)[d::]:6789 error -101 [ 926.981335][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 928.013294][ T25] libceph: connect (1)[d::]:6789 error -101 [ 928.019438][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 928.296652][ T25] libceph: connect (1)[d::]:6789 error -101 [ 928.302832][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 928.813031][ T25] libceph: connect (1)[d::]:6789 error -101 [ 928.819119][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 930.023196][ T25] libceph: connect (1)[d::]:6789 error -101 [ 930.030950][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 930.973370][ T25] libceph: connect (1)[d::]:6789 error -101 [ 930.979482][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 931.242777][ T25] libceph: connect (1)[d::]:6789 error -101 [ 931.248829][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 931.773225][ T25] libceph: connect (1)[d::]:6789 error -101 [ 931.779328][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 932.973211][ T25] libceph: connect (1)[d::]:6789 error -101 [ 932.979317][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 934.013130][ T25] libceph: connect (1)[d::]:6789 error -101 [ 934.019236][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 934.283145][ T25] libceph: connect (1)[d::]:6789 error -101 [ 934.289235][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 934.803060][ T25] libceph: connect (1)[d::]:6789 error -101 [ 934.809161][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 936.013078][ T25] libceph: connect (1)[d::]:6789 error -101 [ 936.019176][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 936.972825][ T25] libceph: connect (1)[d::]:6789 error -101 [ 936.978882][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 937.242753][ T25] libceph: connect (1)[d::]:6789 error -101 [ 937.248796][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 937.763047][ T25] libceph: connect (1)[d::]:6789 error -101 [ 937.769147][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 938.974013][ T25] libceph: connect (1)[d::]:6789 error -101 [ 938.980077][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 940.026951][ T25] libceph: connect (1)[d::]:6789 error -101 [ 940.033149][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 940.293079][ T25] libceph: connect (1)[d::]:6789 error -101 [ 940.299178][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 940.812766][ T25] libceph: connect (1)[d::]:6789 error -101 [ 940.818817][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 942.013169][ T25] libceph: connect (1)[d::]:6789 error -101 [ 942.019315][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 942.983233][ T25] libceph: connect (1)[d::]:6789 error -101 [ 942.989329][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 943.253027][ T25] libceph: connect (1)[d::]:6789 error -101 [ 943.259124][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 943.773052][ T25] libceph: connect (1)[d::]:6789 error -101 [ 943.779185][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 944.972794][ T25] libceph: connect (1)[d::]:6789 error -101 [ 944.980491][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 945.059081][ T1201] ieee802154 phy0 wpan0: encryption failed: -22 [ 945.065643][ T1201] ieee802154 phy1 wpan1: encryption failed: -22 [ 946.013232][ T25] libceph: connect (1)[d::]:6789 error -101 [ 946.019329][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 946.282985][ T25] libceph: connect (1)[d::]:6789 error -101 [ 946.289017][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 946.802782][ T25] libceph: connect (1)[d::]:6789 error -101 [ 946.809012][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 948.013097][ T25] libceph: connect (1)[d::]:6789 error -101 [ 948.019244][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 948.973609][ T25] libceph: connect (1)[d::]:6789 error -101 [ 948.979802][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 949.243141][ T25] libceph: connect (1)[d::]:6789 error -101 [ 949.249245][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 949.763013][ T25] libceph: connect (1)[d::]:6789 error -101 [ 949.769147][ T25] libceph: mon0 (1)[d::]:6789 connect error [ 950.106129][T24635] ceph: No mds server is up or the cluster is laggy [ 950.138803][T24676] ceph: No mds server is up or the cluster is laggy [ 950.146657][ T25] libceph: connect (1)[d::]:6789 error -101 [ 950.153009][ T25] libceph: mon0 (1)[d::]:6789 connect error 23:21:51 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000002e00)={0x0, 0x2f, 0x1}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) clone(0x41040000, &(0x7f0000000000), 0x0, 0x0, 0x0) clone(0x0, 0x0, &(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000540)="198d88955e49c8a99d3071c48899a2d158cd4d767dc5fec347b8") 23:21:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x2c, r1, 0x21, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1b}]}, 0x2c}}, 0x0) 23:21:51 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 23:21:51 executing program 0: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000400)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000840)={0x0, 0x0, 0x8, &(0x7f0000000480)={0x5, 0xf, 0x8, 0x1, [@generic={0x3, 0x10, 0x2}]}}) 23:21:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:21:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x24, r1, 0x21, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}]}, 0x24}}, 0x0) 23:21:52 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000800000/0x800000)=nil, &(0x7f0000d3d000/0x1000)=nil, &(0x7f0000f44000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000adc000/0x3000)=nil, &(0x7f0000e41000/0x4000)=nil, &(0x7f0000c23000/0x3000)=nil, &(0x7f0000f00000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00008e3000/0x4000)=nil, &(0x7f0000bb8000/0x2000)=nil, 0x0}, 0x68) 23:21:52 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0xb, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:21:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_usb_connect$hid(0x2, 0x3f, &(0x7f0000000080)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x56a, 0x27, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x9, 0x10, 0x7f, [{{0x9, 0x4, 0x0, 0x4, 0x1, 0x3, 0x1, 0x0, 0xff, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2a6}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0x0, 0x3f, 0x4}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x80, 0x8}}]}}}]}}]}}, &(0x7f0000000200)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x200, 0x7f, 0x10, 0x5, 0x40}, 0x66, &(0x7f0000000100)={0x5, 0xf, 0x66, 0x4, [@generic={0x23, 0x10, 0xb, "e4b7b095e3777776fa737c8ea42380ad74c8bb9c4c1b33dbc3032f4002c17cf4"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x1, 0x7, 0x8, 0x8001}, @generic={0x24, 0x10, 0xa, "5a3466cd5b52442d14d720575009682e19864a8d4714a44e24a7a79bd88ae3946b"}, @ssp_cap={0x10, 0x10, 0xa, 0x2, 0x1, 0x8000, 0x0, 0x8, [0xff0000]}]}, 0x2, [{0x8, &(0x7f0000000180)=@string={0x8, 0x3, "0edde6351813"}}, {0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x2c01}}]}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket(0x0, 0x0, 0x9) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000300)) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000380)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x9}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) socket$netlink(0x10, 0x3, 0x15) 23:21:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@delnexthop={0x20, 0x69, 0x1, 0x0, 0x0, {}, [{0x8}]}, 0x20}}, 0x0) [ 951.112184][ T25] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 951.352369][ T25] usb 1-1: Using ep0 maxpacket: 8 23:21:52 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000002b00)={{}, {}, [{0x2, 0xfc652cb1a21344ca}]}, 0x2c, 0x0) [ 951.602916][ T25] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 23:21:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect(r0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80) [ 951.712080][T14349] usb 3-1: new full-speed USB device number 27 using dummy_hcd [ 951.782539][ T25] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 951.792137][ T25] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 951.800274][ T25] usb 1-1: Product: syz [ 951.804798][ T25] usb 1-1: Manufacturer: syz [ 951.809507][ T25] usb 1-1: SerialNumber: syz [ 952.113183][T14349] usb 3-1: not running at top speed; connect to a high speed hub [ 952.192691][T14349] usb 3-1: config 1 interface 0 altsetting 4 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 952.204074][T14349] usb 3-1: config 1 interface 0 altsetting 4 endpoint 0x81 has invalid maxpacket 512, setting to 64 [ 952.215303][T14349] usb 3-1: config 1 interface 0 altsetting 4 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 952.228428][T14349] usb 3-1: config 1 interface 0 has no altsetting 0 [ 952.250959][ T25] usb 1-1: USB disconnect, device number 21 [ 952.522407][T14349] usb 3-1: New USB device found, idVendor=056a, idProduct=0027, bcdDevice= 0.40 [ 952.531635][T14349] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 952.539883][T14349] usb 3-1: Product: syz [ 952.544300][T14349] usb 3-1: Manufacturer: Ⰱ [ 952.548996][T14349] usb 3-1: SerialNumber: syz [ 952.633763][T24712] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 953.382318][T14349] usbhid 3-1:1.0: can't add hid device: -71 [ 953.388552][T14349] usbhid: probe of 3-1:1.0 failed with error -71 [ 953.413280][T14349] usb 3-1: USB disconnect, device number 27 [ 953.828750][T23265] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 953.928755][T23265] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 954.051718][T23265] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 954.176214][T23265] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 955.571145][T23265] device hsr_slave_0 left promiscuous mode [ 955.592639][T23265] device hsr_slave_1 left promiscuous mode [ 955.612971][T23265] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 955.620621][T23265] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 955.647499][T23265] device bridge_slave_1 left promiscuous mode [ 955.654561][T23265] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.688439][T23265] device bridge_slave_0 left promiscuous mode [ 955.695242][T23265] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.757648][T23265] device veth1_macvtap left promiscuous mode [ 955.764008][T23265] device veth0_macvtap left promiscuous mode [ 955.770231][T23265] device veth1_vlan left promiscuous mode [ 955.776308][T23265] device veth0_vlan left promiscuous mode [ 956.197788][T23265] team0 (unregistering): Port device team_slave_1 removed [ 956.220421][T23265] team0 (unregistering): Port device team_slave_0 removed [ 956.245727][T23265] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 956.272854][T23265] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 956.400171][T23265] bond0 (unregistering): Released all slaves [ 958.737562][T24862] chnl_net:caif_netlink_parms(): no params data found [ 959.070031][T24862] bridge0: port 1(bridge_slave_0) entered blocking state [ 959.077656][T24862] bridge0: port 1(bridge_slave_0) entered disabled state [ 959.087459][T24862] device bridge_slave_0 entered promiscuous mode [ 959.113449][T24862] bridge0: port 2(bridge_slave_1) entered blocking state [ 959.120809][T24862] bridge0: port 2(bridge_slave_1) entered disabled state [ 959.130710][T24862] device bridge_slave_1 entered promiscuous mode [ 959.196814][T24862] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 959.216690][T24862] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 959.286871][T24862] team0: Port device team_slave_0 added [ 959.318255][T24862] team0: Port device team_slave_1 added [ 959.382826][T24862] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 959.389858][T24862] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 959.417428][T24862] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 959.436263][T24862] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 959.443660][T24862] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 959.469935][T24862] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 959.539534][T24862] device hsr_slave_0 entered promiscuous mode [ 959.550325][T24862] device hsr_slave_1 entered promiscuous mode [ 959.558851][T24862] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 959.566716][T24862] Cannot create hsr debugfs directory [ 960.080295][T24862] 8021q: adding VLAN 0 to HW filter on device bond0 [ 960.113241][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 960.123261][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 960.151745][T24862] 8021q: adding VLAN 0 to HW filter on device team0 [ 960.178293][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 960.188726][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 960.198874][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 960.206262][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 960.218186][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 960.244831][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 960.255267][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 960.265225][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 960.272604][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 960.291667][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 960.321671][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 960.363494][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 960.374753][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 960.393653][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 960.420133][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 960.431328][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 960.455792][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 960.466013][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 960.489509][ T3552] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 960.500089][ T3552] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 960.510809][ T25] ===================================================== [ 960.517880][ T25] BUG: KMSAN: uninit-value in memcmp+0x23e/0x290 [ 960.524253][ T25] memcmp+0x23e/0x290 [ 960.528271][ T25] __hw_addr_add_ex+0x2f9/0x1020 [ 960.533292][ T25] __hw_addr_sync_multiple+0x35f/0xa40 [ 960.535693][ T3552] Bluetooth: hci0: command 0x0409 tx timeout [ 960.538788][ T25] dev_mc_sync_multiple+0x195/0x2b0 [ 960.549975][ T25] team_set_rx_mode+0x143/0x230 [ 960.554911][ T25] __dev_set_rx_mode+0x3b0/0x440 [ 960.559995][ T25] dev_mc_add+0x180/0x1d0 [ 960.564371][ T25] igmp6_group_added+0x320/0x830 [ 960.569356][ T25] __ipv6_dev_mc_inc+0x11e9/0x1620 [ 960.574515][ T25] ipv6_dev_mc_inc+0x70/0x80 [ 960.579145][ T25] addrconf_dad_work+0x736/0x2210 [ 960.584198][ T25] process_one_work+0xdb9/0x1820 [ 960.589248][ T25] worker_thread+0x10bc/0x21f0 [ 960.594056][ T25] kthread+0x721/0x850 [ 960.598162][ T25] ret_from_fork+0x1f/0x30 [ 960.602633][ T25] [ 960.604964][ T25] Uninit was stored to memory at: [ 960.610066][ T25] __hw_addr_add_ex+0x718/0x1020 [ 960.615045][ T25] dev_mc_add+0x10a/0x1d0 [ 960.619416][ T25] igmp6_group_added+0x320/0x830 [ 960.624399][ T25] __ipv6_dev_mc_inc+0x11e9/0x1620 [ 960.629557][ T25] ipv6_dev_mc_inc+0x70/0x80 [ 960.634190][ T25] addrconf_dad_work+0x736/0x2210 [ 960.639247][ T25] process_one_work+0xdb9/0x1820 [ 960.644235][ T25] worker_thread+0x10bc/0x21f0 [ 960.649048][ T25] kthread+0x721/0x850 [ 960.653154][ T25] ret_from_fork+0x1f/0x30 [ 960.657610][ T25] [ 960.659939][ T25] Local variable buf created at: [ 960.664884][ T25] igmp6_group_added+0x9b/0x830 [ 960.669783][ T25] __ipv6_dev_mc_inc+0x11e9/0x1620 [ 960.674930][ T25] [ 960.677280][ T25] CPU: 1 PID: 25 Comm: kworker/1:1 Not tainted 5.16.0-rc5-syzkaller #0 [ 960.685546][ T25] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.695627][ T25] Workqueue: ipv6_addrconf addrconf_dad_work [ 960.701646][ T25] ===================================================== [ 960.708585][ T25] Disabling lock debugging due to kernel taint [ 960.714877][ T25] Kernel panic - not syncing: kmsan.panic set ... [ 960.721300][ T25] CPU: 1 PID: 25 Comm: kworker/1:1 Tainted: G B 5.16.0-rc5-syzkaller #0 [ 960.730968][ T25] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.741152][ T25] Workqueue: ipv6_addrconf addrconf_dad_work [ 960.747171][ T25] Call Trace: [ 960.750459][ T25] [ 960.753410][ T25] dump_stack_lvl+0x1ff/0x28e [ 960.758144][ T25] dump_stack+0x25/0x28 [ 960.762343][ T25] panic+0x487/0xe1f [ 960.766288][ T25] ? add_taint+0x181/0x210 [ 960.770800][ T25] ? _raw_spin_unlock_irqrestore+0x78/0xb0 [ 960.776650][ T25] kmsan_report+0x2e6/0x2f0 [ 960.781206][ T25] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 960.787070][ T25] ? __msan_warning+0xb8/0x130 [ 960.791871][ T25] ? memcmp+0x23e/0x290 [ 960.796065][ T25] ? __hw_addr_add_ex+0x2f9/0x1020 [ 960.801219][ T25] ? __hw_addr_sync_multiple+0x35f/0xa40 [ 960.806899][ T25] ? dev_mc_sync_multiple+0x195/0x2b0 [ 960.812318][ T25] ? team_set_rx_mode+0x143/0x230 [ 960.817384][ T25] ? __dev_set_rx_mode+0x3b0/0x440 [ 960.822530][ T25] ? dev_mc_add+0x180/0x1d0 [ 960.827074][ T25] ? igmp6_group_added+0x320/0x830 [ 960.832237][ T25] ? __ipv6_dev_mc_inc+0x11e9/0x1620 [ 960.837574][ T25] ? ipv6_dev_mc_inc+0x70/0x80 [ 960.842379][ T25] ? addrconf_dad_work+0x736/0x2210 [ 960.847611][ T25] ? process_one_work+0xdb9/0x1820 [ 960.852776][ T25] ? worker_thread+0x10bc/0x21f0 [ 960.857770][ T25] ? kthread+0x721/0x850 [ 960.862054][ T25] ? ret_from_fork+0x1f/0x30 [ 960.866686][ T25] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 960.872540][ T25] ? ret_from_fork+0x1f/0x30 [ 960.877176][ T25] ? arch_stack_walk+0x32e/0x3c0 [ 960.882181][ T25] ? stack_trace_save+0x1a0/0x1a0 [ 960.887304][ T25] ? kmsan_get_metadata+0x33/0x220 [ 960.892462][ T25] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 960.898321][ T25] ? kthread+0x721/0x850 [ 960.902606][ T25] ? filter_irq_stacks+0xb5/0x230 [ 960.907675][ T25] ? kmsan_get_metadata+0x33/0x220 [ 960.912831][ T25] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 960.918686][ T25] __msan_warning+0xb8/0x130 [ 960.923316][ T25] memcmp+0x23e/0x290 [ 960.927346][ T25] __hw_addr_add_ex+0x2f9/0x1020 [ 960.932418][ T25] ? ___slab_alloc+0x1720/0x1e30 [ 960.937476][ T25] __hw_addr_sync_multiple+0x35f/0xa40 [ 960.942972][ T25] dev_mc_sync_multiple+0x195/0x2b0 [ 960.948198][ T25] team_set_rx_mode+0x143/0x230 [ 960.953070][ T25] ? team_change_rx_flags+0x440/0x440 [ 960.958482][ T25] __dev_set_rx_mode+0x3b0/0x440 [ 960.963439][ T25] dev_mc_add+0x180/0x1d0 [ 960.967794][ T25] igmp6_group_added+0x320/0x830 [ 960.972763][ T25] ? kmsan_internal_unpoison_memory+0x10/0x20 [ 960.978871][ T25] __ipv6_dev_mc_inc+0x11e9/0x1620 [ 960.984019][ T25] ipv6_dev_mc_inc+0x70/0x80 [ 960.988634][ T25] addrconf_dad_work+0x736/0x2210 [ 960.993675][ T25] ? kmsan_get_metadata+0x33/0x220 [ 960.998828][ T25] ? kmsan_get_shadow_origin_ptr+0x9b/0xf0 [ 961.004655][ T25] ? refcount_inc+0x120/0x120 [ 961.009342][ T25] process_one_work+0xdb9/0x1820 [ 961.014322][ T25] worker_thread+0x10bc/0x21f0 [ 961.019128][ T25] kthread+0x721/0x850 [ 961.023214][ T25] ? worker_clr_flags+0x370/0x370 [ 961.028285][ T25] ? kthread_blkcg+0x120/0x120 [ 961.033074][ T25] ret_from_fork+0x1f/0x30 [ 961.037532][ T25] [ 961.040817][ T25] Kernel Offset: disabled [ 961.054122][ T25] Rebooting in 86400 seconds..