91a2026a926fcd11ac086d422226475e956993eb6849536189f1cfecbf428346a427e951831bc1fa91c2439a5d50", 0xdf}, {&(0x7f0000000140)="b4122bdc972e029561e9e30d8712e41abeea300a7d8b98c1f2", 0x19}], 0x2, &(0x7f00000020c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="9d77d091a39f7be0ccc1fb4a30bb516dc8c84a6308", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000011000000", @ANYRES32, @ANYRES32], 0xb8, 0x4040001}}, {{&(0x7f0000000440)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000004c0)="771d0defacef11b43dd99be98b2162a4130599ce4d6cb56c0f67c77d18eef4e5963118c176f014061a1653617e27524961a56a151ebac6b2e722287f07d353ea752c6b7430449ce6399e18e18c03d1e10edf21a842faec8c076bc95b183d4684feb7b7bf31523499141395aa65165dd22c470c", 0x73}, {&(0x7f0000000540)="4d9264f7a529a959f8109a69c2c19084fb3be0e6d28a632b55cadf467acb382a5ffef920727df80bdc689d4c4c292af3739659ad8ad4074477decc6373a1a8b829b50fa7b005", 0x46}, {&(0x7f00000005c0)="f50c2fb2caca1ed26e0047d0f84ed384713ee48307a339c2a3a4bcb58589a1223d7aeb8029625b554c713915bc82796dae09750edc9511db1976bdc8566419885cf79d9ae82cfe648cf8e82c9f1e36cf058e92d3b919d876fde376847b6ead6c1f62be421d4ede8a48de7c51a1394deace99dd0c4fbd14c19dffc827804868ac08f41bf9aa3d3b21aaa21d350fc79215c4e4a6c6699e1a7df82d", 0x9a}, {&(0x7f0000000680)="2a58f44e31261c2ae255dd78b56a9eb42e881219c26585aa69adc6ca3d9efa20c6415e3d511a0a1c5d6021313de25c8128e0c9b3b6f6f739cf0b643440aeaece1701a6add7009d170eeff751a6b1f9210ed12a372b476f30ae2a6042daa1e7", 0x5f}, {&(0x7f0000000700)="24e617cd8e3df481dcf8b3ba7b4c16ee71fd70dcb6ba080803e5f096e6b6fe95608c6b6a18a8c69e993f6a1b4fb1a172428407d4fcf7ed86c5050eac4b6737664d638d3f181af7f0cf7ecfdee6e38687589eb578b30d1950d083fbc453f44b63713a505eab146eb12b248f7875ff14c756eeec05b542b74b51690bd1eceb36b9211fa621dcf8676bc33e058ce2f1967358afcebbd1c8cd31de98221af845a8c6ecde89c278e155d9c9d39571e0ae21a14809544b3d6f8c607c30c1170f09c94c43d9ccaa87ad29718019b4b2ca6695f685fa238ab822feea63f2134cc27d2a6bdbb63fbe62c095e849abb93e66658e4953da47ec1433c173065524d3f805", 0xfe}], 0x5, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0x20, 0x4c080}}, {{&(0x7f00000008c0)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000940)="e2111e367fc3534a2b6b3a167cadfda92e76fb1adbfd31028420d28e87e81346c354f00dc26aeb2ac01b4159356893a3f1f3c176afd31eaebec786c198c0d1f02b99d298ed84dca9d8320762c27d991c65dac6036e87d462b885ac9e09089785a29243931fb6abaf4cceadb23156443bdf4bb884d93b62f6a47727683eca828f27b4a12f4fecfddfb60aa6541464f0d4c92938b53309b3068865846ec7bdbcf00395dd995990cf331102f2516d5ede346869e6bf253bfd53888ec75997239b739924594e9e91bd8397850064", 0xcc}, {&(0x7f0000000a40)="ebbcc0c387278e24e1dbdd4f39a8c11f22c1f74e95d1ea4534d33a2b1411c1e989ea131f1429d7e102cfc8f3a3cc339c35558efb5cfa3486d660d4c1dc2692751f88c217588e957d8256b2a9472ad75dec0917e24141fc56e99bed60cb7b6aef3f770e6b5ad9585d2731f7f7143d719688e289a72dad697f3a2a329e6a5e5e6a3095b5224a8ff61e2ee006045ab0045e217386126aa6ee22c545c5c4b801", 0x9e}, {&(0x7f0000000b00)='qp*w', 0x4}, {&(0x7f0000000b40)="4e0147", 0x3}, {&(0x7f0000000b80)="a614bfdb0f0b79259ed430f5d5d27cac7badb3b62c162f63b354cea30f5c96ccaf423ed5fa25a169c2d5262e8660662e28802e0822c08af00428e3e0bec41a3b90bdcd8a84de04ce01ea31", 0x4b}, {&(0x7f0000000c00)="3aedfd65462e953afcc032068cebd13dd4a35704ceacd3d0cc5073d2fdad8565fd63194239d674c1b52ac86f40585df34e12fc24dc9c36d59c3f94b298418e", 0x3f}], 0x6, &(0x7f0000000e00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff}}}], 0xc8, 0x7c60c9c9566d109}}], 0x3, 0x8) openat2(r3, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000380)={0x2001, 0xc0, 0x1}, 0x18) openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x187842, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x107042, 0x0) quotactl$Q_GETQUOTA(0x7c2ced972d3383d8, &(0x7f0000003240)=@sr0, r7, &(0x7f0000003280)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000003340)=0x4) sendmsg$key(r3, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="02060b050500000028bd7000fddbdf2502001300090000002608700000000000010014001f000000"], 0x28}}, 0x850) write(r11, &(0x7f0000000400)="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", 0x353c00) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000240)={0x3920e, r1}) 22:53:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000002180)=0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1c1002, 0x0) ftruncate(r2, 0x5d801) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000d00), 0x109001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x0, &(0x7f0000000340)=0xfffffff9, 0x4) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x9, 0x2, 0x0, 0x12, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_ident={0x2, 0xa, 0x0, 0x0, 0x3}, @sadb_lifetime={0x4, 0x4, 0x1, 0x8000000000000000, 0x7, 0x8000}, @sadb_sa={0x2, 0x1, 0x4d2, 0x3f, 0x4, 0xa0}, @sadb_x_policy={0x8, 0x12, 0x3, 0x1, 0x0, 0x6e6bba, 0x5, {0x6, 0x3c, 0x9, 0x2, 0x0, 0xfff, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @in6=@empty}}]}, 0x90}}, 0x4004840) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000440)=0x82, 0x49) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r5, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000003300)='dctcp\x00', 0x6) recvmsg(r5, &(0x7f00000033c0)={&(0x7f00000003c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002040)=[{&(0x7f0000000080)=""/49, 0x31}, {&(0x7f0000000f80)=""/4096, 0xffffffe1}, {0x0}, {&(0x7f0000000100)=""/102, 0x66}, {&(0x7f00000021c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001f80)=""/178, 0xb2}, 0x120) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="6fd14b5d036705c2bd00f349e9a426fb4f935b4f251215481c87b90ac6dd5116d16adbfd1d1235aa4d2d18a04a47873dd91474de69aafaa9d25ad694caa17cba9245902c058003cc6c0f50f5396391737912acb540a46eeeacb2a0c6d98de870909813f47b6d3e73816330ea12c63a705000daf2334d74b55f48592406a95b3e5da9287894e1541d4c145c53ba82af4288b91dbe5576b2684b185ddad9a37e915b563ef9a04ccb73ab0df9441a514496b491a2026a926fcd11ac086d422226475e956993eb6849536189f1cfecbf428346a427e951831bc1fa91c2439a5d50", 0xdf}, {&(0x7f0000000140)="b4122bdc972e029561e9e30d8712e41abeea300a7d8b98c1f2", 0x19}], 0x2, &(0x7f00000020c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="9d77d091a39f7be0ccc1fb4a30bb516dc8c84a6308", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000011000000", @ANYRES32, @ANYRES32], 0xb8, 0x4040001}}, {{&(0x7f0000000440)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000004c0)="771d0defacef11b43dd99be98b2162a4130599ce4d6cb56c0f67c77d18eef4e5963118c176f014061a1653617e27524961a56a151ebac6b2e722287f07d353ea752c6b7430449ce6399e18e18c03d1e10edf21a842faec8c076bc95b183d4684feb7b7bf31523499141395aa65165dd22c470c", 0x73}, {&(0x7f0000000540)="4d9264f7a529a959f8109a69c2c19084fb3be0e6d28a632b55cadf467acb382a5ffef920727df80bdc689d4c4c292af3739659ad8ad4074477decc6373a1a8b829b50fa7b005", 0x46}, {&(0x7f00000005c0)="f50c2fb2caca1ed26e0047d0f84ed384713ee48307a339c2a3a4bcb58589a1223d7aeb8029625b554c713915bc82796dae09750edc9511db1976bdc8566419885cf79d9ae82cfe648cf8e82c9f1e36cf058e92d3b919d876fde376847b6ead6c1f62be421d4ede8a48de7c51a1394deace99dd0c4fbd14c19dffc827804868ac08f41bf9aa3d3b21aaa21d350fc79215c4e4a6c6699e1a7df82d", 0x9a}, {&(0x7f0000000680)="2a58f44e31261c2ae255dd78b56a9eb42e881219c26585aa69adc6ca3d9efa20c6415e3d511a0a1c5d6021313de25c8128e0c9b3b6f6f739cf0b643440aeaece1701a6add7009d170eeff751a6b1f9210ed12a372b476f30ae2a6042daa1e7", 0x5f}, {&(0x7f0000000700)="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", 0xfe}], 0x5, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0x20, 0x4c080}}, {{&(0x7f00000008c0)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000940)="e2111e367fc3534a2b6b3a167cadfda92e76fb1adbfd31028420d28e87e81346c354f00dc26aeb2ac01b4159356893a3f1f3c176afd31eaebec786c198c0d1f02b99d298ed84dca9d8320762c27d991c65dac6036e87d462b885ac9e09089785a29243931fb6abaf4cceadb23156443bdf4bb884d93b62f6a47727683eca828f27b4a12f4fecfddfb60aa6541464f0d4c92938b53309b3068865846ec7bdbcf00395dd995990cf331102f2516d5ede346869e6bf253bfd53888ec75997239b739924594e9e91bd8397850064", 0xcc}, {&(0x7f0000000a40)="ebbcc0c387278e24e1dbdd4f39a8c11f22c1f74e95d1ea4534d33a2b1411c1e989ea131f1429d7e102cfc8f3a3cc339c35558efb5cfa3486d660d4c1dc2692751f88c217588e957d8256b2a9472ad75dec0917e24141fc56e99bed60cb7b6aef3f770e6b5ad9585d2731f7f7143d719688e289a72dad697f3a2a329e6a5e5e6a3095b5224a8ff61e2ee006045ab0045e217386126aa6ee22c545c5c4b801", 0x9e}, {&(0x7f0000000b00)='qp*w', 0x4}, {&(0x7f0000000b40)="4e0147", 0x3}, {&(0x7f0000000b80)="a614bfdb0f0b79259ed430f5d5d27cac7badb3b62c162f63b354cea30f5c96ccaf423ed5fa25a169c2d5262e8660662e28802e0822c08af00428e3e0bec41a3b90bdcd8a84de04ce01ea31", 0x4b}, {&(0x7f0000000c00)="3aedfd65462e953afcc032068cebd13dd4a35704ceacd3d0cc5073d2fdad8565fd63194239d674c1b52ac86f40585df34e12fc24dc9c36d59c3f94b298418e", 0x3f}], 0x6, &(0x7f0000000e00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff}}}], 0xc8, 0x7c60c9c9566d109}}], 0x3, 0x8) openat2(r3, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000380)={0x2001, 0xc0, 0x1}, 0x18) openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x187842, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x107042, 0x0) quotactl$Q_GETQUOTA(0x7c2ced972d3383d8, &(0x7f0000003240)=@sr0, r7, &(0x7f0000003280)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000003340)=0x4) sendmsg$key(r3, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="02060b050500000028bd7000fddbdf2502001300090000002608700000000000010014001f000000"], 0x28}}, 0x850) write(r11, &(0x7f0000000400)="6f88b2a60614ef91a3f8ef9e1220b2675bce0f59b2336b1e3eb222ffa77b91bd642da8472b07a5059831e5c03734ccff6480db993a9be5198f428be1838bef5847f8452dab06605676dc879a87d9c28bf128eb784296078f4a28e8a2595743bd65e4e6a9e5ced66e5524edc432ceaab8552a2c2f179d91122a961061343c8695c39084b2370dae938e8d43b6d6fbd905eff6c6360e26d2ef525c6a46357a0f26061ba8da82c8c39b6ec93cea456c8ed747b85fa822136714ad8bdb0d36d7c9c75354e5d73d216e45cb24fc975e092c08bd1bfb1102952f580acce4909b84036801c1f0b88c7508aa2bf5999b5f8b0da1b6d5a83203cf784ce1e8a562c75310eea1c28d9f650073742c8e9311718b35acee6a272bd76b7e547c06b9b9c461163e18f48033a79c7f3a6574c234d84fa9c569100e6c088070010175611c6643b7cd4eb643ab300fa1e46fb4027fe48882975fcfd5a5295ead29b97cb0e86af8a0b4beb400d3b54774eafac72f7d222a4248662afdd0072963aef817701d5fc445f61d563c3ed0992670002289a555f7bebfcc91b5c75e9222b17ed54aff16a3d6a0cfab24f8bffcaef7c61f2be13411eb800853f37dd2d0efc25abc246e833d350206539d5160991f02e4b0201f14ed8fdc814c4034ed7e438934b250352ece17f1145ba3ea72c698adfeeb89e4e1338fd7598d83f70137a83ef553d770193c4738", 0x353c00) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000240)={0x3920e, r1}) 22:53:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000580)=0xfffffefc, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x18, 0x5a, 0x1, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000640)=0x4, 0x2) process_vm_writev(0x0, &(0x7f0000001540)=[{&(0x7f0000000280)=""/217, 0xd9}], 0x1, &(0x7f0000001780)=[{&(0x7f0000000080)=""/231, 0xe7}], 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e20, @multicast2}, 0x10) 22:53:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000580)=0xfffffefc, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x18, 0x5a, 0x1, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000640)=0x4, 0x2) process_vm_writev(0x0, &(0x7f0000001540)=[{&(0x7f0000000280)=""/217, 0xd9}], 0x1, &(0x7f0000001780)=[{&(0x7f0000000080)=""/231, 0xe7}], 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e20, @multicast2}, 0x10) 22:53:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000580)=0xfffffefc, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x18, 0x5a, 0x1, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000640)=0x4, 0x2) process_vm_writev(0x0, &(0x7f0000001540)=[{&(0x7f0000000280)=""/217, 0xd9}], 0x1, &(0x7f0000001780)=[{&(0x7f0000000080)=""/231, 0xe7}], 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e20, @multicast2}, 0x10) 22:53:33 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000002180)=0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1c1002, 0x0) ftruncate(r2, 0x5d801) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000d00), 0x109001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x0, &(0x7f0000000340)=0xfffffff9, 0x4) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x9, 0x2, 0x0, 0x12, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_ident={0x2, 0xa, 0x0, 0x0, 0x3}, @sadb_lifetime={0x4, 0x4, 0x1, 0x8000000000000000, 0x7, 0x8000}, @sadb_sa={0x2, 0x1, 0x4d2, 0x3f, 0x4, 0xa0}, @sadb_x_policy={0x8, 0x12, 0x3, 0x1, 0x0, 0x6e6bba, 0x5, {0x6, 0x3c, 0x9, 0x2, 0x0, 0xfff, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @in6=@empty}}]}, 0x90}}, 0x4004840) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000440)=0x82, 0x49) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r5, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000003300)='dctcp\x00', 0x6) recvmsg(r5, &(0x7f00000033c0)={&(0x7f00000003c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002040)=[{&(0x7f0000000080)=""/49, 0x31}, {&(0x7f0000000f80)=""/4096, 0xffffffe1}, {0x0}, {&(0x7f0000000100)=""/102, 0x66}, {&(0x7f00000021c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001f80)=""/178, 0xb2}, 0x120) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="6fd14b5d036705c2bd00f349e9a426fb4f935b4f251215481c87b90ac6dd5116d16adbfd1d1235aa4d2d18a04a47873dd91474de69aafaa9d25ad694caa17cba9245902c058003cc6c0f50f5396391737912acb540a46eeeacb2a0c6d98de870909813f47b6d3e73816330ea12c63a705000daf2334d74b55f48592406a95b3e5da9287894e1541d4c145c53ba82af4288b91dbe5576b2684b185ddad9a37e915b563ef9a04ccb73ab0df9441a514496b491a2026a926fcd11ac086d422226475e956993eb6849536189f1cfecbf428346a427e951831bc1fa91c2439a5d50", 0xdf}, {&(0x7f0000000140)="b4122bdc972e029561e9e30d8712e41abeea300a7d8b98c1f2", 0x19}], 0x2, &(0x7f00000020c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="9d77d091a39f7be0ccc1fb4a30bb516dc8c84a6308", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000011000000", @ANYRES32, @ANYRES32], 0xb8, 0x4040001}}, {{&(0x7f0000000440)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000004c0)="771d0defacef11b43dd99be98b2162a4130599ce4d6cb56c0f67c77d18eef4e5963118c176f014061a1653617e27524961a56a151ebac6b2e722287f07d353ea752c6b7430449ce6399e18e18c03d1e10edf21a842faec8c076bc95b183d4684feb7b7bf31523499141395aa65165dd22c470c", 0x73}, {&(0x7f0000000540)="4d9264f7a529a959f8109a69c2c19084fb3be0e6d28a632b55cadf467acb382a5ffef920727df80bdc689d4c4c292af3739659ad8ad4074477decc6373a1a8b829b50fa7b005", 0x46}, {&(0x7f00000005c0)="f50c2fb2caca1ed26e0047d0f84ed384713ee48307a339c2a3a4bcb58589a1223d7aeb8029625b554c713915bc82796dae09750edc9511db1976bdc8566419885cf79d9ae82cfe648cf8e82c9f1e36cf058e92d3b919d876fde376847b6ead6c1f62be421d4ede8a48de7c51a1394deace99dd0c4fbd14c19dffc827804868ac08f41bf9aa3d3b21aaa21d350fc79215c4e4a6c6699e1a7df82d", 0x9a}, {&(0x7f0000000680)="2a58f44e31261c2ae255dd78b56a9eb42e881219c26585aa69adc6ca3d9efa20c6415e3d511a0a1c5d6021313de25c8128e0c9b3b6f6f739cf0b643440aeaece1701a6add7009d170eeff751a6b1f9210ed12a372b476f30ae2a6042daa1e7", 0x5f}, {&(0x7f0000000700)="24e617cd8e3df481dcf8b3ba7b4c16ee71fd70dcb6ba080803e5f096e6b6fe95608c6b6a18a8c69e993f6a1b4fb1a172428407d4fcf7ed86c5050eac4b6737664d638d3f181af7f0cf7ecfdee6e38687589eb578b30d1950d083fbc453f44b63713a505eab146eb12b248f7875ff14c756eeec05b542b74b51690bd1eceb36b9211fa621dcf8676bc33e058ce2f1967358afcebbd1c8cd31de98221af845a8c6ecde89c278e155d9c9d39571e0ae21a14809544b3d6f8c607c30c1170f09c94c43d9ccaa87ad29718019b4b2ca6695f685fa238ab822feea63f2134cc27d2a6bdbb63fbe62c095e849abb93e66658e4953da47ec1433c173065524d3f805", 0xfe}], 0x5, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0x20, 0x4c080}}, {{&(0x7f00000008c0)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000940)="e2111e367fc3534a2b6b3a167cadfda92e76fb1adbfd31028420d28e87e81346c354f00dc26aeb2ac01b4159356893a3f1f3c176afd31eaebec786c198c0d1f02b99d298ed84dca9d8320762c27d991c65dac6036e87d462b885ac9e09089785a29243931fb6abaf4cceadb23156443bdf4bb884d93b62f6a47727683eca828f27b4a12f4fecfddfb60aa6541464f0d4c92938b53309b3068865846ec7bdbcf00395dd995990cf331102f2516d5ede346869e6bf253bfd53888ec75997239b739924594e9e91bd8397850064", 0xcc}, {&(0x7f0000000a40)="ebbcc0c387278e24e1dbdd4f39a8c11f22c1f74e95d1ea4534d33a2b1411c1e989ea131f1429d7e102cfc8f3a3cc339c35558efb5cfa3486d660d4c1dc2692751f88c217588e957d8256b2a9472ad75dec0917e24141fc56e99bed60cb7b6aef3f770e6b5ad9585d2731f7f7143d719688e289a72dad697f3a2a329e6a5e5e6a3095b5224a8ff61e2ee006045ab0045e217386126aa6ee22c545c5c4b801", 0x9e}, {&(0x7f0000000b00)='qp*w', 0x4}, {&(0x7f0000000b40)="4e0147", 0x3}, {&(0x7f0000000b80)="a614bfdb0f0b79259ed430f5d5d27cac7badb3b62c162f63b354cea30f5c96ccaf423ed5fa25a169c2d5262e8660662e28802e0822c08af00428e3e0bec41a3b90bdcd8a84de04ce01ea31", 0x4b}, {&(0x7f0000000c00)="3aedfd65462e953afcc032068cebd13dd4a35704ceacd3d0cc5073d2fdad8565fd63194239d674c1b52ac86f40585df34e12fc24dc9c36d59c3f94b298418e", 0x3f}], 0x6, &(0x7f0000000e00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff}}}], 0xc8, 0x7c60c9c9566d109}}], 0x3, 0x8) openat2(r3, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000380)={0x2001, 0xc0, 0x1}, 0x18) openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x187842, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x107042, 0x0) quotactl$Q_GETQUOTA(0x7c2ced972d3383d8, &(0x7f0000003240)=@sr0, r7, &(0x7f0000003280)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000003340)=0x4) sendmsg$key(r3, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="02060b050500000028bd7000fddbdf2502001300090000002608700000000000010014001f000000"], 0x28}}, 0x850) write(r11, &(0x7f0000000400)="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", 0x353c00) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000240)={0x3920e, r1}) 22:53:33 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000002180)=0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1c1002, 0x0) ftruncate(r2, 0x5d801) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000d00), 0x109001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x0, &(0x7f0000000340)=0xfffffff9, 0x4) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x9, 0x2, 0x0, 0x12, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_ident={0x2, 0xa, 0x0, 0x0, 0x3}, @sadb_lifetime={0x4, 0x4, 0x1, 0x8000000000000000, 0x7, 0x8000}, @sadb_sa={0x2, 0x1, 0x4d2, 0x3f, 0x4, 0xa0}, @sadb_x_policy={0x8, 0x12, 0x3, 0x1, 0x0, 0x6e6bba, 0x5, {0x6, 0x3c, 0x9, 0x2, 0x0, 0xfff, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @in6=@empty}}]}, 0x90}}, 0x4004840) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000440)=0x82, 0x49) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r5, &(0x7f0000000480)="fbbf0b5044e308cb7bd572aa2b42e9678bcf30eff9f3aed14dc94a114bd2b45956aebe2b108a87e865501a5f9e0383611afdd3f8bac3d5cfd7772a3ab48d0ba4b600731e357e38716c449fae7c28548a4f2105f44b8fd9b33041270ae01f1a405e3f650fc3b0926d481c364fca00000000000000006d3a3ede9fc738b8d86209c060161d5ddb5fcf3d09001117cdb9d055aa2d89fe3458720724853a876448d4a1fe9ef0569ad98a05ab5df763923b4e2c576e00000000000000000000000000000000002090666159e3075f7244cf4ec3d7814c0c934f44e200219e6dd7bc23397d5f2f2c76a5baddd0fd8c340362691ef226f7a0ac51b74b6be5ed6737948514cd466943d08eeb3895b80499da2b209da4f3ec5e3744ce3e863b0e04d0ec2f39edf50b6e08c4b47e448a35414763d687fbe3792ee15c5b9791310a346472723c100bf77a310b0ced8004b5ac6d48c40439f512e8ef34a53d65f55563f68136a577736ca5f6f66e01ef4ec2cdc8db34f6de50713adaa3f70189958263fddc1314f8a28ccdef6e1390c5fbaeadc3035d019f0dc75de307de6c0d010000000000000027083d1d5b4b013c503b863b560688d94de886b6dc73d5da2dfeff4bed1a49a975a6c8dbb480e4415ddca5657a5a8e3b111015499e952bb5e8d8f60de3d688df7802c6e8b27b31fac4e199038b79a3999920e634a5af162a9581b0e6647e410700246548234acacf9cb43ab332a37bbc926c39897395c974fda31536be523bf4260300730ae6136fecae5f0fa6ab2df8d98128b24589e3bbe5230e07dc5e0d65cc397e3f8204d48e59e8e294a6d7008ba8fba28cd5009fe1a7c569ce740078bf1c7389a6ba0f89257f0eac417aac0d2d89b05ee5dafa2f1d936c87264d077b2c0d5abdbc64ce943f895dd4c2e9dd7393543d89b00dc6b3a25045d4ec932366c67dfad087fa8dc104644828440bdf67dd97ebccb3bd", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000003300)='dctcp\x00', 0x6) recvmsg(r5, &(0x7f00000033c0)={&(0x7f00000003c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002040)=[{&(0x7f0000000080)=""/49, 0x31}, {&(0x7f0000000f80)=""/4096, 0xffffffe1}, {0x0}, {&(0x7f0000000100)=""/102, 0x66}, {&(0x7f00000021c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001f80)=""/178, 0xb2}, 0x120) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="6fd14b5d036705c2bd00f349e9a426fb4f935b4f251215481c87b90ac6dd5116d16adbfd1d1235aa4d2d18a04a47873dd91474de69aafaa9d25ad694caa17cba9245902c058003cc6c0f50f5396391737912acb540a46eeeacb2a0c6d98de870909813f47b6d3e73816330ea12c63a705000daf2334d74b55f48592406a95b3e5da9287894e1541d4c145c53ba82af4288b91dbe5576b2684b185ddad9a37e915b563ef9a04ccb73ab0df9441a514496b491a2026a926fcd11ac086d422226475e956993eb6849536189f1cfecbf428346a427e951831bc1fa91c2439a5d50", 0xdf}, {&(0x7f0000000140)="b4122bdc972e029561e9e30d8712e41abeea300a7d8b98c1f2", 0x19}], 0x2, &(0x7f00000020c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="9d77d091a39f7be0ccc1fb4a30bb516dc8c84a6308", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000011000000", @ANYRES32, @ANYRES32], 0xb8, 0x4040001}}, {{&(0x7f0000000440)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000004c0)="771d0defacef11b43dd99be98b2162a4130599ce4d6cb56c0f67c77d18eef4e5963118c176f014061a1653617e27524961a56a151ebac6b2e722287f07d353ea752c6b7430449ce6399e18e18c03d1e10edf21a842faec8c076bc95b183d4684feb7b7bf31523499141395aa65165dd22c470c", 0x73}, {&(0x7f0000000540)="4d9264f7a529a959f8109a69c2c19084fb3be0e6d28a632b55cadf467acb382a5ffef920727df80bdc689d4c4c292af3739659ad8ad4074477decc6373a1a8b829b50fa7b005", 0x46}, {&(0x7f00000005c0)="f50c2fb2caca1ed26e0047d0f84ed384713ee48307a339c2a3a4bcb58589a1223d7aeb8029625b554c713915bc82796dae09750edc9511db1976bdc8566419885cf79d9ae82cfe648cf8e82c9f1e36cf058e92d3b919d876fde376847b6ead6c1f62be421d4ede8a48de7c51a1394deace99dd0c4fbd14c19dffc827804868ac08f41bf9aa3d3b21aaa21d350fc79215c4e4a6c6699e1a7df82d", 0x9a}, {&(0x7f0000000680)="2a58f44e31261c2ae255dd78b56a9eb42e881219c26585aa69adc6ca3d9efa20c6415e3d511a0a1c5d6021313de25c8128e0c9b3b6f6f739cf0b643440aeaece1701a6add7009d170eeff751a6b1f9210ed12a372b476f30ae2a6042daa1e7", 0x5f}, {&(0x7f0000000700)="24e617cd8e3df481dcf8b3ba7b4c16ee71fd70dcb6ba080803e5f096e6b6fe95608c6b6a18a8c69e993f6a1b4fb1a172428407d4fcf7ed86c5050eac4b6737664d638d3f181af7f0cf7ecfdee6e38687589eb578b30d1950d083fbc453f44b63713a505eab146eb12b248f7875ff14c756eeec05b542b74b51690bd1eceb36b9211fa621dcf8676bc33e058ce2f1967358afcebbd1c8cd31de98221af845a8c6ecde89c278e155d9c9d39571e0ae21a14809544b3d6f8c607c30c1170f09c94c43d9ccaa87ad29718019b4b2ca6695f685fa238ab822feea63f2134cc27d2a6bdbb63fbe62c095e849abb93e66658e4953da47ec1433c173065524d3f805", 0xfe}], 0x5, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0x20, 0x4c080}}, {{&(0x7f00000008c0)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000940)="e2111e367fc3534a2b6b3a167cadfda92e76fb1adbfd31028420d28e87e81346c354f00dc26aeb2ac01b4159356893a3f1f3c176afd31eaebec786c198c0d1f02b99d298ed84dca9d8320762c27d991c65dac6036e87d462b885ac9e09089785a29243931fb6abaf4cceadb23156443bdf4bb884d93b62f6a47727683eca828f27b4a12f4fecfddfb60aa6541464f0d4c92938b53309b3068865846ec7bdbcf00395dd995990cf331102f2516d5ede346869e6bf253bfd53888ec75997239b739924594e9e91bd8397850064", 0xcc}, {&(0x7f0000000a40)="ebbcc0c387278e24e1dbdd4f39a8c11f22c1f74e95d1ea4534d33a2b1411c1e989ea131f1429d7e102cfc8f3a3cc339c35558efb5cfa3486d660d4c1dc2692751f88c217588e957d8256b2a9472ad75dec0917e24141fc56e99bed60cb7b6aef3f770e6b5ad9585d2731f7f7143d719688e289a72dad697f3a2a329e6a5e5e6a3095b5224a8ff61e2ee006045ab0045e217386126aa6ee22c545c5c4b801", 0x9e}, {&(0x7f0000000b00)='qp*w', 0x4}, {&(0x7f0000000b40)="4e0147", 0x3}, {&(0x7f0000000b80)="a614bfdb0f0b79259ed430f5d5d27cac7badb3b62c162f63b354cea30f5c96ccaf423ed5fa25a169c2d5262e8660662e28802e0822c08af00428e3e0bec41a3b90bdcd8a84de04ce01ea31", 0x4b}, {&(0x7f0000000c00)="3aedfd65462e953afcc032068cebd13dd4a35704ceacd3d0cc5073d2fdad8565fd63194239d674c1b52ac86f40585df34e12fc24dc9c36d59c3f94b298418e", 0x3f}], 0x6, &(0x7f0000000e00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff}}}], 0xc8, 0x7c60c9c9566d109}}], 0x3, 0x8) openat2(r3, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000380)={0x2001, 0xc0, 0x1}, 0x18) openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x187842, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x107042, 0x0) quotactl$Q_GETQUOTA(0x7c2ced972d3383d8, &(0x7f0000003240)=@sr0, r7, &(0x7f0000003280)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000003340)=0x4) sendmsg$key(r3, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="02060b050500000028bd7000fddbdf2502001300090000002608700000000000010014001f000000"], 0x28}}, 0x850) write(r11, &(0x7f0000000400)="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", 0x353c00) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000240)={0x3920e, r1}) 22:53:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000580)=0xfffffefc, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x18, 0x5a, 0x1, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000020000000300000060040000d0020000d00200000000000000000000d0020000c8030000c8030000c7fc0000c8030000c8030000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008802d00200000000000000000000000000000000000000005801686173686c696d69740000000000000000000000000000000000000000036970365f7674693000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffffffffffff00000000000000000000000022000000feffffff0000000000000000000000000000000000000000c000737472696e670000000000000000000000000000000000000000000000010000000900736d000000000000000000010000000000000021390eb8a10d61905c915cd228ca97b5ce382683c91019c72674282bfdd8705b2bec82c7e6a47fe2fa5de4d4cffd0a70df1168448dd67391da71a4d40daaf91ee10181a6e2cc70723760440ff801aab7fdb67e5c1a436e18b54efa66ad91f24342af8e7ae060ed1b7e8abb92cc6d113df52f3c0fd51ae5f7d2fe47330100000000000000000000004800544545000000000000000000000000000000000000000000000000000001ff020000000000000000000000000001627071300000000000000000000000000000000000000000ac1414aa00000000000000000000000076657468315f746f5f626f6e64000000658181e193800057000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f80000000000000000000000000000000000000000002800727066696c746572000000000000000000fcff0000000000000000000000000000000000000030006463637000000000000000000000e60000000000000000000000000000000000000000000000000000000000000030005345540000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000e5ffffff00000000feffffff"], 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000640)=0x4, 0x2) process_vm_writev(0x0, &(0x7f0000001540)=[{&(0x7f0000000280)=""/217, 0xd9}], 0x1, &(0x7f0000001780)=[{&(0x7f0000000080)=""/231, 0xe7}], 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e20, @multicast2}, 0x10) 22:53:34 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000002180)=0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1c1002, 0x0) ftruncate(r2, 0x5d801) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000d00), 0x109001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x0, &(0x7f0000000340)=0xfffffff9, 0x4) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x9, 0x2, 0x0, 0x12, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_ident={0x2, 0xa, 0x0, 0x0, 0x3}, @sadb_lifetime={0x4, 0x4, 0x1, 0x8000000000000000, 0x7, 0x8000}, @sadb_sa={0x2, 0x1, 0x4d2, 0x3f, 0x4, 0xa0}, @sadb_x_policy={0x8, 0x12, 0x3, 0x1, 0x0, 0x6e6bba, 0x5, {0x6, 0x3c, 0x9, 0x2, 0x0, 0xfff, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @in6=@empty}}]}, 0x90}}, 0x4004840) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000440)=0x82, 0x49) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r5, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000003300)='dctcp\x00', 0x6) recvmsg(r5, &(0x7f00000033c0)={&(0x7f00000003c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002040)=[{&(0x7f0000000080)=""/49, 0x31}, {&(0x7f0000000f80)=""/4096, 0xffffffe1}, {0x0}, {&(0x7f0000000100)=""/102, 0x66}, {&(0x7f00000021c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001f80)=""/178, 0xb2}, 0x120) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="6fd14b5d036705c2bd00f349e9a426fb4f935b4f251215481c87b90ac6dd5116d16adbfd1d1235aa4d2d18a04a47873dd91474de69aafaa9d25ad694caa17cba9245902c058003cc6c0f50f5396391737912acb540a46eeeacb2a0c6d98de870909813f47b6d3e73816330ea12c63a705000daf2334d74b55f48592406a95b3e5da9287894e1541d4c145c53ba82af4288b91dbe5576b2684b185ddad9a37e915b563ef9a04ccb73ab0df9441a514496b491a2026a926fcd11ac086d422226475e956993eb6849536189f1cfecbf428346a427e951831bc1fa91c2439a5d50", 0xdf}, {&(0x7f0000000140)="b4122bdc972e029561e9e30d8712e41abeea300a7d8b98c1f2", 0x19}], 0x2, &(0x7f00000020c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="9d77d091a39f7be0ccc1fb4a30bb516dc8c84a6308", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000011000000", @ANYRES32, @ANYRES32], 0xb8, 0x4040001}}, {{&(0x7f0000000440)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000004c0)="771d0defacef11b43dd99be98b2162a4130599ce4d6cb56c0f67c77d18eef4e5963118c176f014061a1653617e27524961a56a151ebac6b2e722287f07d353ea752c6b7430449ce6399e18e18c03d1e10edf21a842faec8c076bc95b183d4684feb7b7bf31523499141395aa65165dd22c470c", 0x73}, {&(0x7f0000000540)="4d9264f7a529a959f8109a69c2c19084fb3be0e6d28a632b55cadf467acb382a5ffef920727df80bdc689d4c4c292af3739659ad8ad4074477decc6373a1a8b829b50fa7b005", 0x46}, {&(0x7f00000005c0)="f50c2fb2caca1ed26e0047d0f84ed384713ee48307a339c2a3a4bcb58589a1223d7aeb8029625b554c713915bc82796dae09750edc9511db1976bdc8566419885cf79d9ae82cfe648cf8e82c9f1e36cf058e92d3b919d876fde376847b6ead6c1f62be421d4ede8a48de7c51a1394deace99dd0c4fbd14c19dffc827804868ac08f41bf9aa3d3b21aaa21d350fc79215c4e4a6c6699e1a7df82d", 0x9a}, {&(0x7f0000000680)="2a58f44e31261c2ae255dd78b56a9eb42e881219c26585aa69adc6ca3d9efa20c6415e3d511a0a1c5d6021313de25c8128e0c9b3b6f6f739cf0b643440aeaece1701a6add7009d170eeff751a6b1f9210ed12a372b476f30ae2a6042daa1e7", 0x5f}, {&(0x7f0000000700)="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", 0xfe}], 0x5, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0x20, 0x4c080}}, {{&(0x7f00000008c0)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000940)="e2111e367fc3534a2b6b3a167cadfda92e76fb1adbfd31028420d28e87e81346c354f00dc26aeb2ac01b4159356893a3f1f3c176afd31eaebec786c198c0d1f02b99d298ed84dca9d8320762c27d991c65dac6036e87d462b885ac9e09089785a29243931fb6abaf4cceadb23156443bdf4bb884d93b62f6a47727683eca828f27b4a12f4fecfddfb60aa6541464f0d4c92938b53309b3068865846ec7bdbcf00395dd995990cf331102f2516d5ede346869e6bf253bfd53888ec75997239b739924594e9e91bd8397850064", 0xcc}, {&(0x7f0000000a40)="ebbcc0c387278e24e1dbdd4f39a8c11f22c1f74e95d1ea4534d33a2b1411c1e989ea131f1429d7e102cfc8f3a3cc339c35558efb5cfa3486d660d4c1dc2692751f88c217588e957d8256b2a9472ad75dec0917e24141fc56e99bed60cb7b6aef3f770e6b5ad9585d2731f7f7143d719688e289a72dad697f3a2a329e6a5e5e6a3095b5224a8ff61e2ee006045ab0045e217386126aa6ee22c545c5c4b801", 0x9e}, {&(0x7f0000000b00)='qp*w', 0x4}, {&(0x7f0000000b40)="4e0147", 0x3}, {&(0x7f0000000b80)="a614bfdb0f0b79259ed430f5d5d27cac7badb3b62c162f63b354cea30f5c96ccaf423ed5fa25a169c2d5262e8660662e28802e0822c08af00428e3e0bec41a3b90bdcd8a84de04ce01ea31", 0x4b}, {&(0x7f0000000c00)="3aedfd65462e953afcc032068cebd13dd4a35704ceacd3d0cc5073d2fdad8565fd63194239d674c1b52ac86f40585df34e12fc24dc9c36d59c3f94b298418e", 0x3f}], 0x6, &(0x7f0000000e00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff}}}], 0xc8, 0x7c60c9c9566d109}}], 0x3, 0x8) openat2(r3, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000380)={0x2001, 0xc0, 0x1}, 0x18) openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x187842, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x107042, 0x0) quotactl$Q_GETQUOTA(0x7c2ced972d3383d8, &(0x7f0000003240)=@sr0, r7, &(0x7f0000003280)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000003340)=0x4) sendmsg$key(r3, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="02060b050500000028bd7000fddbdf2502001300090000002608700000000000010014001f000000"], 0x28}}, 0x850) write(r11, &(0x7f0000000400)="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", 0x353c00) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000240)={0x3920e, r1}) [ 172.606683][T11344] net_ratelimit: 11 callbacks suppressed [ 172.606692][T11344] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 22:53:34 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000002180)=0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1c1002, 0x0) ftruncate(r2, 0x5d801) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000d00), 0x109001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x0, &(0x7f0000000340)=0xfffffff9, 0x4) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x9, 0x2, 0x0, 0x12, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_ident={0x2, 0xa, 0x0, 0x0, 0x3}, @sadb_lifetime={0x4, 0x4, 0x1, 0x8000000000000000, 0x7, 0x8000}, @sadb_sa={0x2, 0x1, 0x4d2, 0x3f, 0x4, 0xa0}, @sadb_x_policy={0x8, 0x12, 0x3, 0x1, 0x0, 0x6e6bba, 0x5, {0x6, 0x3c, 0x9, 0x2, 0x0, 0xfff, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @in6=@empty}}]}, 0x90}}, 0x4004840) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000440)=0x82, 0x49) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r5, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000003300)='dctcp\x00', 0x6) recvmsg(r5, &(0x7f00000033c0)={&(0x7f00000003c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002040)=[{&(0x7f0000000080)=""/49, 0x31}, {&(0x7f0000000f80)=""/4096, 0xffffffe1}, {0x0}, {&(0x7f0000000100)=""/102, 0x66}, {&(0x7f00000021c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001f80)=""/178, 0xb2}, 0x120) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="6fd14b5d036705c2bd00f349e9a426fb4f935b4f251215481c87b90ac6dd5116d16adbfd1d1235aa4d2d18a04a47873dd91474de69aafaa9d25ad694caa17cba9245902c058003cc6c0f50f5396391737912acb540a46eeeacb2a0c6d98de870909813f47b6d3e73816330ea12c63a705000daf2334d74b55f48592406a95b3e5da9287894e1541d4c145c53ba82af4288b91dbe5576b2684b185ddad9a37e915b563ef9a04ccb73ab0df9441a514496b491a2026a926fcd11ac086d422226475e956993eb6849536189f1cfecbf428346a427e951831bc1fa91c2439a5d50", 0xdf}, {&(0x7f0000000140)="b4122bdc972e029561e9e30d8712e41abeea300a7d8b98c1f2", 0x19}], 0x2, &(0x7f00000020c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="9d77d091a39f7be0ccc1fb4a30bb516dc8c84a6308", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000011000000", @ANYRES32, @ANYRES32], 0xb8, 0x4040001}}, {{&(0x7f0000000440)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000004c0)="771d0defacef11b43dd99be98b2162a4130599ce4d6cb56c0f67c77d18eef4e5963118c176f014061a1653617e27524961a56a151ebac6b2e722287f07d353ea752c6b7430449ce6399e18e18c03d1e10edf21a842faec8c076bc95b183d4684feb7b7bf31523499141395aa65165dd22c470c", 0x73}, {&(0x7f0000000540)="4d9264f7a529a959f8109a69c2c19084fb3be0e6d28a632b55cadf467acb382a5ffef920727df80bdc689d4c4c292af3739659ad8ad4074477decc6373a1a8b829b50fa7b005", 0x46}, {&(0x7f00000005c0)="f50c2fb2caca1ed26e0047d0f84ed384713ee48307a339c2a3a4bcb58589a1223d7aeb8029625b554c713915bc82796dae09750edc9511db1976bdc8566419885cf79d9ae82cfe648cf8e82c9f1e36cf058e92d3b919d876fde376847b6ead6c1f62be421d4ede8a48de7c51a1394deace99dd0c4fbd14c19dffc827804868ac08f41bf9aa3d3b21aaa21d350fc79215c4e4a6c6699e1a7df82d", 0x9a}, {&(0x7f0000000680)="2a58f44e31261c2ae255dd78b56a9eb42e881219c26585aa69adc6ca3d9efa20c6415e3d511a0a1c5d6021313de25c8128e0c9b3b6f6f739cf0b643440aeaece1701a6add7009d170eeff751a6b1f9210ed12a372b476f30ae2a6042daa1e7", 0x5f}, {&(0x7f0000000700)="24e617cd8e3df481dcf8b3ba7b4c16ee71fd70dcb6ba080803e5f096e6b6fe95608c6b6a18a8c69e993f6a1b4fb1a172428407d4fcf7ed86c5050eac4b6737664d638d3f181af7f0cf7ecfdee6e38687589eb578b30d1950d083fbc453f44b63713a505eab146eb12b248f7875ff14c756eeec05b542b74b51690bd1eceb36b9211fa621dcf8676bc33e058ce2f1967358afcebbd1c8cd31de98221af845a8c6ecde89c278e155d9c9d39571e0ae21a14809544b3d6f8c607c30c1170f09c94c43d9ccaa87ad29718019b4b2ca6695f685fa238ab822feea63f2134cc27d2a6bdbb63fbe62c095e849abb93e66658e4953da47ec1433c173065524d3f805", 0xfe}], 0x5, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0x20, 0x4c080}}, {{&(0x7f00000008c0)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000940)="e2111e367fc3534a2b6b3a167cadfda92e76fb1adbfd31028420d28e87e81346c354f00dc26aeb2ac01b4159356893a3f1f3c176afd31eaebec786c198c0d1f02b99d298ed84dca9d8320762c27d991c65dac6036e87d462b885ac9e09089785a29243931fb6abaf4cceadb23156443bdf4bb884d93b62f6a47727683eca828f27b4a12f4fecfddfb60aa6541464f0d4c92938b53309b3068865846ec7bdbcf00395dd995990cf331102f2516d5ede346869e6bf253bfd53888ec75997239b739924594e9e91bd8397850064", 0xcc}, {&(0x7f0000000a40)="ebbcc0c387278e24e1dbdd4f39a8c11f22c1f74e95d1ea4534d33a2b1411c1e989ea131f1429d7e102cfc8f3a3cc339c35558efb5cfa3486d660d4c1dc2692751f88c217588e957d8256b2a9472ad75dec0917e24141fc56e99bed60cb7b6aef3f770e6b5ad9585d2731f7f7143d719688e289a72dad697f3a2a329e6a5e5e6a3095b5224a8ff61e2ee006045ab0045e217386126aa6ee22c545c5c4b801", 0x9e}, {&(0x7f0000000b00)='qp*w', 0x4}, {&(0x7f0000000b40)="4e0147", 0x3}, {&(0x7f0000000b80)="a614bfdb0f0b79259ed430f5d5d27cac7badb3b62c162f63b354cea30f5c96ccaf423ed5fa25a169c2d5262e8660662e28802e0822c08af00428e3e0bec41a3b90bdcd8a84de04ce01ea31", 0x4b}, {&(0x7f0000000c00)="3aedfd65462e953afcc032068cebd13dd4a35704ceacd3d0cc5073d2fdad8565fd63194239d674c1b52ac86f40585df34e12fc24dc9c36d59c3f94b298418e", 0x3f}], 0x6, &(0x7f0000000e00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff}}}], 0xc8, 0x7c60c9c9566d109}}], 0x3, 0x8) openat2(r3, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000380)={0x2001, 0xc0, 0x1}, 0x18) openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x187842, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x107042, 0x0) quotactl$Q_GETQUOTA(0x7c2ced972d3383d8, &(0x7f0000003240)=@sr0, r7, &(0x7f0000003280)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000003340)=0x4) sendmsg$key(r3, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="02060b050500000028bd7000fddbdf2502001300090000002608700000000000010014001f000000"], 0x28}}, 0x850) write(r11, &(0x7f0000000400)="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", 0x353c00) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000240)={0x3920e, r1}) 22:53:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000580)=0xfffffefc, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x18, 0x5a, 0x1, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000640)=0x4, 0x2) process_vm_writev(0x0, &(0x7f0000001540)=[{&(0x7f0000000280)=""/217, 0xd9}], 0x1, &(0x7f0000001780)=[{&(0x7f0000000080)=""/231, 0xe7}], 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e20, @multicast2}, 0x10) [ 172.695891][T11349] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 172.820097][T11355] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 22:53:34 executing program 2: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x4) r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f00000001c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x69, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) 22:53:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x100000000000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000580)=0xfffffefc, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x18, 0x5a, 0x1, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000640)=0x4, 0x2) process_vm_writev(0x0, &(0x7f0000001540)=[{&(0x7f0000000280)=""/217, 0xd9}], 0x1, &(0x7f0000001780)=[{&(0x7f0000000080)=""/231, 0xe7}], 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e20, @multicast2}, 0x10) 22:53:35 executing program 2: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x4) r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f00000001c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x69, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) 22:53:35 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) 22:53:35 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) 22:53:35 executing program 2: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x4) r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f00000001c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x69, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) [ 173.632436][ T27] audit: type=1400 audit(1709938415.146:423): avc: denied { checkpoint_restore } for pid=11378 comm="syz-executor.4" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 22:53:35 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000002180)=0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1c1002, 0x0) ftruncate(r2, 0x5d801) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000d00), 0x109001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x0, &(0x7f0000000340)=0xfffffff9, 0x4) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x9, 0x2, 0x0, 0x12, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_ident={0x2, 0xa, 0x0, 0x0, 0x3}, @sadb_lifetime={0x4, 0x4, 0x1, 0x8000000000000000, 0x7, 0x8000}, @sadb_sa={0x2, 0x1, 0x4d2, 0x3f, 0x4, 0xa0}, @sadb_x_policy={0x8, 0x12, 0x3, 0x1, 0x0, 0x6e6bba, 0x5, {0x6, 0x3c, 0x9, 0x2, 0x0, 0xfff, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @in6=@empty}}]}, 0x90}}, 0x4004840) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000440)=0x82, 0x49) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r5, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000003300)='dctcp\x00', 0x6) recvmsg(r5, &(0x7f00000033c0)={&(0x7f00000003c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002040)=[{&(0x7f0000000080)=""/49, 0x31}, {&(0x7f0000000f80)=""/4096, 0xffffffe1}, {0x0}, {&(0x7f0000000100)=""/102, 0x66}, {&(0x7f00000021c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001f80)=""/178, 0xb2}, 0x120) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="6fd14b5d036705c2bd00f349e9a426fb4f935b4f251215481c87b90ac6dd5116d16adbfd1d1235aa4d2d18a04a47873dd91474de69aafaa9d25ad694caa17cba9245902c058003cc6c0f50f5396391737912acb540a46eeeacb2a0c6d98de870909813f47b6d3e73816330ea12c63a705000daf2334d74b55f48592406a95b3e5da9287894e1541d4c145c53ba82af4288b91dbe5576b2684b185ddad9a37e915b563ef9a04ccb73ab0df9441a514496b491a2026a926fcd11ac086d422226475e956993eb6849536189f1cfecbf428346a427e951831bc1fa91c2439a5d50", 0xdf}, {&(0x7f0000000140)="b4122bdc972e029561e9e30d8712e41abeea300a7d8b98c1f2", 0x19}], 0x2, &(0x7f00000020c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="9d77d091a39f7be0ccc1fb4a30bb516dc8c84a6308", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000011000000", @ANYRES32, @ANYRES32], 0xb8, 0x4040001}}, {{&(0x7f0000000440)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000004c0)="771d0defacef11b43dd99be98b2162a4130599ce4d6cb56c0f67c77d18eef4e5963118c176f014061a1653617e27524961a56a151ebac6b2e722287f07d353ea752c6b7430449ce6399e18e18c03d1e10edf21a842faec8c076bc95b183d4684feb7b7bf31523499141395aa65165dd22c470c", 0x73}, {&(0x7f0000000540)="4d9264f7a529a959f8109a69c2c19084fb3be0e6d28a632b55cadf467acb382a5ffef920727df80bdc689d4c4c292af3739659ad8ad4074477decc6373a1a8b829b50fa7b005", 0x46}, {&(0x7f00000005c0)="f50c2fb2caca1ed26e0047d0f84ed384713ee48307a339c2a3a4bcb58589a1223d7aeb8029625b554c713915bc82796dae09750edc9511db1976bdc8566419885cf79d9ae82cfe648cf8e82c9f1e36cf058e92d3b919d876fde376847b6ead6c1f62be421d4ede8a48de7c51a1394deace99dd0c4fbd14c19dffc827804868ac08f41bf9aa3d3b21aaa21d350fc79215c4e4a6c6699e1a7df82d", 0x9a}, {&(0x7f0000000680)="2a58f44e31261c2ae255dd78b56a9eb42e881219c26585aa69adc6ca3d9efa20c6415e3d511a0a1c5d6021313de25c8128e0c9b3b6f6f739cf0b643440aeaece1701a6add7009d170eeff751a6b1f9210ed12a372b476f30ae2a6042daa1e7", 0x5f}, {&(0x7f0000000700)="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", 0xfe}], 0x5, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0x20, 0x4c080}}, {{&(0x7f00000008c0)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000940)="e2111e367fc3534a2b6b3a167cadfda92e76fb1adbfd31028420d28e87e81346c354f00dc26aeb2ac01b4159356893a3f1f3c176afd31eaebec786c198c0d1f02b99d298ed84dca9d8320762c27d991c65dac6036e87d462b885ac9e09089785a29243931fb6abaf4cceadb23156443bdf4bb884d93b62f6a47727683eca828f27b4a12f4fecfddfb60aa6541464f0d4c92938b53309b3068865846ec7bdbcf00395dd995990cf331102f2516d5ede346869e6bf253bfd53888ec75997239b739924594e9e91bd8397850064", 0xcc}, {&(0x7f0000000a40)="ebbcc0c387278e24e1dbdd4f39a8c11f22c1f74e95d1ea4534d33a2b1411c1e989ea131f1429d7e102cfc8f3a3cc339c35558efb5cfa3486d660d4c1dc2692751f88c217588e957d8256b2a9472ad75dec0917e24141fc56e99bed60cb7b6aef3f770e6b5ad9585d2731f7f7143d719688e289a72dad697f3a2a329e6a5e5e6a3095b5224a8ff61e2ee006045ab0045e217386126aa6ee22c545c5c4b801", 0x9e}, {&(0x7f0000000b00)='qp*w', 0x4}, {&(0x7f0000000b40)="4e0147", 0x3}, {&(0x7f0000000b80)="a614bfdb0f0b79259ed430f5d5d27cac7badb3b62c162f63b354cea30f5c96ccaf423ed5fa25a169c2d5262e8660662e28802e0822c08af00428e3e0bec41a3b90bdcd8a84de04ce01ea31", 0x4b}, {&(0x7f0000000c00)="3aedfd65462e953afcc032068cebd13dd4a35704ceacd3d0cc5073d2fdad8565fd63194239d674c1b52ac86f40585df34e12fc24dc9c36d59c3f94b298418e", 0x3f}], 0x6, &(0x7f0000000e00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff}}}], 0xc8, 0x7c60c9c9566d109}}], 0x3, 0x8) openat2(r3, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000380)={0x2001, 0xc0, 0x1}, 0x18) openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x187842, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x107042, 0x0) quotactl$Q_GETQUOTA(0x7c2ced972d3383d8, &(0x7f0000003240)=@sr0, r7, &(0x7f0000003280)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000003340)=0x4) sendmsg$key(r3, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="02060b050500000028bd7000fddbdf2502001300090000002608700000000000010014001f000000"], 0x28}}, 0x850) write(r11, &(0x7f0000000400)="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", 0x353c00) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000240)={0x3920e, r1}) 22:53:35 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000002180)=0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1c1002, 0x0) ftruncate(r2, 0x5d801) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000d00), 0x109001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x0, &(0x7f0000000340)=0xfffffff9, 0x4) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x9, 0x2, 0x0, 0x12, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_ident={0x2, 0xa, 0x0, 0x0, 0x3}, @sadb_lifetime={0x4, 0x4, 0x1, 0x8000000000000000, 0x7, 0x8000}, @sadb_sa={0x2, 0x1, 0x4d2, 0x3f, 0x4, 0xa0}, @sadb_x_policy={0x8, 0x12, 0x3, 0x1, 0x0, 0x6e6bba, 0x5, {0x6, 0x3c, 0x9, 0x2, 0x0, 0xfff, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @in6=@empty}}]}, 0x90}}, 0x4004840) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000440)=0x82, 0x49) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r5, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000003300)='dctcp\x00', 0x6) recvmsg(r5, &(0x7f00000033c0)={&(0x7f00000003c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002040)=[{&(0x7f0000000080)=""/49, 0x31}, {&(0x7f0000000f80)=""/4096, 0xffffffe1}, {0x0}, {&(0x7f0000000100)=""/102, 0x66}, {&(0x7f00000021c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001f80)=""/178, 0xb2}, 0x120) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="6fd14b5d036705c2bd00f349e9a426fb4f935b4f251215481c87b90ac6dd5116d16adbfd1d1235aa4d2d18a04a47873dd91474de69aafaa9d25ad694caa17cba9245902c058003cc6c0f50f5396391737912acb540a46eeeacb2a0c6d98de870909813f47b6d3e73816330ea12c63a705000daf2334d74b55f48592406a95b3e5da9287894e1541d4c145c53ba82af4288b91dbe5576b2684b185ddad9a37e915b563ef9a04ccb73ab0df9441a514496b491a2026a926fcd11ac086d422226475e956993eb6849536189f1cfecbf428346a427e951831bc1fa91c2439a5d50", 0xdf}, {&(0x7f0000000140)="b4122bdc972e029561e9e30d8712e41abeea300a7d8b98c1f2", 0x19}], 0x2, &(0x7f00000020c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="9d77d091a39f7be0ccc1fb4a30bb516dc8c84a6308", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000011000000", @ANYRES32, @ANYRES32], 0xb8, 0x4040001}}, {{&(0x7f0000000440)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000004c0)="771d0defacef11b43dd99be98b2162a4130599ce4d6cb56c0f67c77d18eef4e5963118c176f014061a1653617e27524961a56a151ebac6b2e722287f07d353ea752c6b7430449ce6399e18e18c03d1e10edf21a842faec8c076bc95b183d4684feb7b7bf31523499141395aa65165dd22c470c", 0x73}, {&(0x7f0000000540)="4d9264f7a529a959f8109a69c2c19084fb3be0e6d28a632b55cadf467acb382a5ffef920727df80bdc689d4c4c292af3739659ad8ad4074477decc6373a1a8b829b50fa7b005", 0x46}, {&(0x7f00000005c0)="f50c2fb2caca1ed26e0047d0f84ed384713ee48307a339c2a3a4bcb58589a1223d7aeb8029625b554c713915bc82796dae09750edc9511db1976bdc8566419885cf79d9ae82cfe648cf8e82c9f1e36cf058e92d3b919d876fde376847b6ead6c1f62be421d4ede8a48de7c51a1394deace99dd0c4fbd14c19dffc827804868ac08f41bf9aa3d3b21aaa21d350fc79215c4e4a6c6699e1a7df82d", 0x9a}, {&(0x7f0000000680)="2a58f44e31261c2ae255dd78b56a9eb42e881219c26585aa69adc6ca3d9efa20c6415e3d511a0a1c5d6021313de25c8128e0c9b3b6f6f739cf0b643440aeaece1701a6add7009d170eeff751a6b1f9210ed12a372b476f30ae2a6042daa1e7", 0x5f}, {&(0x7f0000000700)="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", 0xfe}], 0x5, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0x20, 0x4c080}}, {{&(0x7f00000008c0)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000940)="e2111e367fc3534a2b6b3a167cadfda92e76fb1adbfd31028420d28e87e81346c354f00dc26aeb2ac01b4159356893a3f1f3c176afd31eaebec786c198c0d1f02b99d298ed84dca9d8320762c27d991c65dac6036e87d462b885ac9e09089785a29243931fb6abaf4cceadb23156443bdf4bb884d93b62f6a47727683eca828f27b4a12f4fecfddfb60aa6541464f0d4c92938b53309b3068865846ec7bdbcf00395dd995990cf331102f2516d5ede346869e6bf253bfd53888ec75997239b739924594e9e91bd8397850064", 0xcc}, {&(0x7f0000000a40)="ebbcc0c387278e24e1dbdd4f39a8c11f22c1f74e95d1ea4534d33a2b1411c1e989ea131f1429d7e102cfc8f3a3cc339c35558efb5cfa3486d660d4c1dc2692751f88c217588e957d8256b2a9472ad75dec0917e24141fc56e99bed60cb7b6aef3f770e6b5ad9585d2731f7f7143d719688e289a72dad697f3a2a329e6a5e5e6a3095b5224a8ff61e2ee006045ab0045e217386126aa6ee22c545c5c4b801", 0x9e}, {&(0x7f0000000b00)='qp*w', 0x4}, {&(0x7f0000000b40)="4e0147", 0x3}, {&(0x7f0000000b80)="a614bfdb0f0b79259ed430f5d5d27cac7badb3b62c162f63b354cea30f5c96ccaf423ed5fa25a169c2d5262e8660662e28802e0822c08af00428e3e0bec41a3b90bdcd8a84de04ce01ea31", 0x4b}, {&(0x7f0000000c00)="3aedfd65462e953afcc032068cebd13dd4a35704ceacd3d0cc5073d2fdad8565fd63194239d674c1b52ac86f40585df34e12fc24dc9c36d59c3f94b298418e", 0x3f}], 0x6, &(0x7f0000000e00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff}}}], 0xc8, 0x7c60c9c9566d109}}], 0x3, 0x8) openat2(r3, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000380)={0x2001, 0xc0, 0x1}, 0x18) openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x187842, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x107042, 0x0) quotactl$Q_GETQUOTA(0x7c2ced972d3383d8, &(0x7f0000003240)=@sr0, r7, &(0x7f0000003280)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000003340)=0x4) sendmsg$key(r3, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="02060b050500000028bd7000fddbdf2502001300090000002608700000000000010014001f000000"], 0x28}}, 0x850) write(r11, &(0x7f0000000400)="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", 0x353c00) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000240)={0x3920e, r1}) 22:53:35 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000002180)=0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1c1002, 0x0) ftruncate(r2, 0x5d801) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000d00), 0x109001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x0, &(0x7f0000000340)=0xfffffff9, 0x4) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x9, 0x2, 0x0, 0x12, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_ident={0x2, 0xa, 0x0, 0x0, 0x3}, @sadb_lifetime={0x4, 0x4, 0x1, 0x8000000000000000, 0x7, 0x8000}, @sadb_sa={0x2, 0x1, 0x4d2, 0x3f, 0x4, 0xa0}, @sadb_x_policy={0x8, 0x12, 0x3, 0x1, 0x0, 0x6e6bba, 0x5, {0x6, 0x3c, 0x9, 0x2, 0x0, 0xfff, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @in6=@empty}}]}, 0x90}}, 0x4004840) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000440)=0x82, 0x49) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r5, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000003300)='dctcp\x00', 0x6) recvmsg(r5, &(0x7f00000033c0)={&(0x7f00000003c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002040)=[{&(0x7f0000000080)=""/49, 0x31}, {&(0x7f0000000f80)=""/4096, 0xffffffe1}, {0x0}, {&(0x7f0000000100)=""/102, 0x66}, {&(0x7f00000021c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001f80)=""/178, 0xb2}, 0x120) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="6fd14b5d036705c2bd00f349e9a426fb4f935b4f251215481c87b90ac6dd5116d16adbfd1d1235aa4d2d18a04a47873dd91474de69aafaa9d25ad694caa17cba9245902c058003cc6c0f50f5396391737912acb540a46eeeacb2a0c6d98de870909813f47b6d3e73816330ea12c63a705000daf2334d74b55f48592406a95b3e5da9287894e1541d4c145c53ba82af4288b91dbe5576b2684b185ddad9a37e915b563ef9a04ccb73ab0df9441a514496b491a2026a926fcd11ac086d422226475e956993eb6849536189f1cfecbf428346a427e951831bc1fa91c2439a5d50", 0xdf}, {&(0x7f0000000140)="b4122bdc972e029561e9e30d8712e41abeea300a7d8b98c1f2", 0x19}], 0x2, &(0x7f00000020c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="9d77d091a39f7be0ccc1fb4a30bb516dc8c84a6308", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000011000000", @ANYRES32, @ANYRES32], 0xb8, 0x4040001}}, {{&(0x7f0000000440)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000004c0)="771d0defacef11b43dd99be98b2162a4130599ce4d6cb56c0f67c77d18eef4e5963118c176f014061a1653617e27524961a56a151ebac6b2e722287f07d353ea752c6b7430449ce6399e18e18c03d1e10edf21a842faec8c076bc95b183d4684feb7b7bf31523499141395aa65165dd22c470c", 0x73}, {&(0x7f0000000540)="4d9264f7a529a959f8109a69c2c19084fb3be0e6d28a632b55cadf467acb382a5ffef920727df80bdc689d4c4c292af3739659ad8ad4074477decc6373a1a8b829b50fa7b005", 0x46}, {&(0x7f00000005c0)="f50c2fb2caca1ed26e0047d0f84ed384713ee48307a339c2a3a4bcb58589a1223d7aeb8029625b554c713915bc82796dae09750edc9511db1976bdc8566419885cf79d9ae82cfe648cf8e82c9f1e36cf058e92d3b919d876fde376847b6ead6c1f62be421d4ede8a48de7c51a1394deace99dd0c4fbd14c19dffc827804868ac08f41bf9aa3d3b21aaa21d350fc79215c4e4a6c6699e1a7df82d", 0x9a}, {&(0x7f0000000680)="2a58f44e31261c2ae255dd78b56a9eb42e881219c26585aa69adc6ca3d9efa20c6415e3d511a0a1c5d6021313de25c8128e0c9b3b6f6f739cf0b643440aeaece1701a6add7009d170eeff751a6b1f9210ed12a372b476f30ae2a6042daa1e7", 0x5f}, {&(0x7f0000000700)="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", 0xfe}], 0x5, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0x20, 0x4c080}}, {{&(0x7f00000008c0)=@file={0x0, './bus/file0\x00'}, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000940)="e2111e367fc3534a2b6b3a167cadfda92e76fb1adbfd31028420d28e87e81346c354f00dc26aeb2ac01b4159356893a3f1f3c176afd31eaebec786c198c0d1f02b99d298ed84dca9d8320762c27d991c65dac6036e87d462b885ac9e09089785a29243931fb6abaf4cceadb23156443bdf4bb884d93b62f6a47727683eca828f27b4a12f4fecfddfb60aa6541464f0d4c92938b53309b3068865846ec7bdbcf00395dd995990cf331102f2516d5ede346869e6bf253bfd53888ec75997239b739924594e9e91bd8397850064", 0xcc}, {&(0x7f0000000a40)="ebbcc0c387278e24e1dbdd4f39a8c11f22c1f74e95d1ea4534d33a2b1411c1e989ea131f1429d7e102cfc8f3a3cc339c35558efb5cfa3486d660d4c1dc2692751f88c217588e957d8256b2a9472ad75dec0917e24141fc56e99bed60cb7b6aef3f770e6b5ad9585d2731f7f7143d719688e289a72dad697f3a2a329e6a5e5e6a3095b5224a8ff61e2ee006045ab0045e217386126aa6ee22c545c5c4b801", 0x9e}, {&(0x7f0000000b00)='qp*w', 0x4}, {&(0x7f0000000b40)="4e0147", 0x3}, {&(0x7f0000000b80)="a614bfdb0f0b79259ed430f5d5d27cac7badb3b62c162f63b354cea30f5c96ccaf423ed5fa25a169c2d5262e8660662e28802e0822c08af00428e3e0bec41a3b90bdcd8a84de04ce01ea31", 0x4b}, {&(0x7f0000000c00)="3aedfd65462e953afcc032068cebd13dd4a35704ceacd3d0cc5073d2fdad8565fd63194239d674c1b52ac86f40585df34e12fc24dc9c36d59c3f94b298418e", 0x3f}], 0x6, &(0x7f0000000e00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xffffffffffffffff}}}], 0xc8, 0x7c60c9c9566d109}}], 0x3, 0x8) openat2(r3, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000380)={0x2001, 0xc0, 0x1}, 0x18) openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x187842, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x107042, 0x0) quotactl$Q_GETQUOTA(0x7c2ced972d3383d8, &(0x7f0000003240)=@sr0, r7, &(0x7f0000003280)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000003340)=0x4) sendmsg$key(r3, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="02060b050500000028bd7000fddbdf2502001300090000002608700000000000010014001f000000"], 0x28}}, 0x850) write(r11, &(0x7f0000000400)="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", 0x353c00) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000240)={0x3920e, r1}) 22:53:35 executing program 2: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x4) r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f00000001c0)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x69, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) 22:53:35 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) 22:53:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) [ 173.829736][T11394] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 173.863801][T11397] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 174.077045][T11396] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 22:53:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) 22:53:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) 22:53:36 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) 22:53:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) 22:53:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) 22:53:36 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@l2, 0x80) 22:53:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) nanosleep(&(0x7f0000000040)={0x0, 0x3938700}, 0x0) 22:53:36 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@l2, 0x80) 22:53:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) 22:53:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) [ 174.924572][ T27] audit: type=1400 audit(1709938416.448:424): avc: denied { create } for pid=11438 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 174.988122][ T27] audit: type=1400 audit(1709938416.469:425): avc: denied { connect } for pid=11438 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 175.008699][ T27] audit: type=1326 audit(1709938416.479:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11433 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4890e8cda9 code=0x7ffc0000 22:53:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) nanosleep(&(0x7f0000000040)={0x0, 0x3938700}, 0x0) 22:53:36 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x990, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000766c616e300000000000000000000000736974300000000000000000000000007465716c3000008000000000000000000000000000000000000000000180c20000000000000000000000b8080000b808000030090000616d6f6e670000000000000000000000000000002000000000000000000000002008000000000000140400000c000000000000000a0000000000003c31957c58e609ea3404000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000002f00000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff000000000000000000000000e4ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000006fb7cd02b734bcce41ef6e95bd000000008000100000000000000000000000000000000000000000000000000000000000000040000000008fc7660c490587b3ab213098a6767c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000088b999350317960900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000629244b7a419c5f714f4d16c370000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e12396f8138f7dc06107436b86700000000000000949853000000000000000000000000440a05000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f18a0afe99350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b389d708839d3c00000000000000000000000000000000000000000056629f615a20576900000000000000000000000000de44000000000000000000000000000000000000000000000000f4f016fa70c1255400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e3ff0000000000000000feffffff00000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000062f75a00627f34dd71012eed00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00000000000000000000000000000000000000000000001b000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2573bd04a330000000e00000000000000000000000000000000000000e9ffffff00000000000000000000000000000000000000000000000000f56ed659f0072400000000000000000000000000000000000000000000000000000000000000000000000000003a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000075dab07149f533af00000000000000000000cb33322c9c564ae5f8eef74d5aa7cc9c000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000003f7f1c53c1b3e90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006fd5809800000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002ac8b856d3d2e85100000000000000000000000000000000000000000000000000000000006e666c6f670000001100000000000000000000000000000000000000000000005080000000e3c800000000000000000000010000a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c770000"]}, 0xa08) 22:53:36 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@l2, 0x80) [ 175.032700][ T27] audit: type=1326 audit(1709938416.479:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11433 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=35 compat=0 ip=0x7f4890e8cda9 code=0x7ffc0000 [ 175.098347][ T27] audit: type=1326 audit(1709938416.549:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11433 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4890e8cda9 code=0x7ffc0000 [ 175.103825][T11455] ebt_among: dst integrity fail: 107 22:53:36 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@l2, 0x80) 22:53:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x12, r1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0x9f, 0x0, &(0x7f0000000040)) [ 175.122303][ T27] audit: type=1326 audit(1709938416.549:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11433 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4890e8cda9 code=0x7ffc0000 22:53:36 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x990, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"]}, 0xa08) 22:53:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x12, r1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0x9f, 0x0, &(0x7f0000000040)) 22:53:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) nanosleep(&(0x7f0000000040)={0x0, 0x3938700}, 0x0) 22:53:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) 22:53:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x105, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd27, 0x9}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) unshare(0x20000000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() syz_clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[r2, 0x0], 0x2}, 0x58) [ 175.232616][ T27] audit: type=1326 audit(1709938416.709:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4890e8cda9 code=0x7ffc0000 [ 175.256623][ T27] audit: type=1326 audit(1709938416.709:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=35 compat=0 ip=0x7f4890e8cda9 code=0x7ffc0000 22:53:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x12, r1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0x9f, 0x0, &(0x7f0000000040)) 22:53:36 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x990, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000766c616e300000000000000000000000736974300000000000000000000000007465716c3000008000000000000000000000000000000000000000000180c20000000000000000000000b8080000b808000030090000616d6f6e670000000000000000000000000000002000000000000000000000002008000000000000140400000c000000000000000a0000000000003c31957c58e609ea3404000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000002f00000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff000000000000000000000000e4ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000006fb7cd02b734bcce41ef6e95bd000000008000100000000000000000000000000000000000000000000000000000000000000040000000008fc7660c490587b3ab213098a6767c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000088b999350317960900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000629244b7a419c5f714f4d16c370000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e12396f8138f7dc06107436b86700000000000000949853000000000000000000000000440a05000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f18a0afe99350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b389d708839d3c00000000000000000000000000000000000000000056629f615a20576900000000000000000000000000de44000000000000000000000000000000000000000000000000f4f016fa70c1255400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e3ff0000000000000000feffffff00000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000062f75a00627f34dd71012eed00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00000000000000000000000000000000000000000000001b000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2573bd04a330000000e00000000000000000000000000000000000000e9ffffff00000000000000000000000000000000000000000000000000f56ed659f0072400000000000000000000000000000000000000000000000000000000000000000000000000003a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000075dab07149f533af00000000000000000000cb33322c9c564ae5f8eef74d5aa7cc9c000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000003f7f1c53c1b3e90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006fd5809800000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002ac8b856d3d2e85100000000000000000000000000000000000000000000000000000000006e666c6f670000001100000000000000000000000000000000000000000000005080000000e3c800000000000000000000010000a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c770000"]}, 0xa08) [ 175.316851][T11466] ebt_among: dst integrity fail: 107 22:53:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x12, r1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0x9f, 0x0, &(0x7f0000000040)) 22:53:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x12, r1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0x9f, 0x0, &(0x7f0000000040)) 22:53:36 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x990, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"]}, 0xa08) [ 175.348989][ T27] audit: type=1326 audit(1709938416.809:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4890e8cda9 code=0x7ffc0000 [ 175.366214][T11475] ebt_among: dst integrity fail: 107 22:53:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x12, r1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0x9f, 0x0, &(0x7f0000000040)) 22:53:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) nanosleep(&(0x7f0000000040)={0x0, 0x3938700}, 0x0) 22:53:37 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "00629a7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x12) 22:53:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000600), 0x1, 0x56f, &(0x7f0000000640)="$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") r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000002280)=ANY=[@ANYBLOB="010000000000000000030000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./']) [ 175.446450][T11486] ebt_among: dst integrity fail: 107 22:53:37 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x12, r1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) r2 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r2, 0x10d, 0x9f, 0x0, &(0x7f0000000040)) 22:53:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0x0, 0x0) 22:53:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000080)=0xffff7b6e, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000000c0)=0xfa0, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000001500)=""/19, &(0x7f0000000240)=0xb) 22:53:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x60, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0}]}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x60}}, 0x0) [ 175.586616][T11497] loop3: detected capacity change from 0 to 1024 22:53:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000080)=0xffff7b6e, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000000c0)=0xfa0, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000001500)=""/19, &(0x7f0000000240)=0xb) 22:53:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x60, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0}]}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x60}}, 0x0) 22:53:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x60, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0}]}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x60}}, 0x0) 22:53:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0x0, 0x0) 22:53:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000080)=0xffff7b6e, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000000c0)=0xfa0, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000001500)=""/19, &(0x7f0000000240)=0xb) 22:53:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x60, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0}]}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x60}}, 0x0) 22:53:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0x0, 0x0) [ 175.709531][T11497] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 22:53:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000600), 0x1, 0x56f, &(0x7f0000000640)="$eJzs3c9rHFUcAPDvm2zSH6kmFUFrDwYKtqAmTVpRRLDFevPgj4InwZikpXTbhiaCrRVbqP+B/gGCNy/isYgU9eLVm+AfIMUiNRdvkdnMbLfNbpo0m07tfD4wybx5u3zf7PLdN/P2zWwAtTWW/8ki9kTEfIoY6ahrRFE5tvK4f25dmlm6dWkmxfLye3+nSMW28vGp+D9cPHl7RPz2U4onBlbHXbhw8fR0szl3vihPLJ6Zn1i4cPHFU2emT86dnDs7Nfny5EuHD00dPti3ff1l/Fjj6ok39n43883uz3/49lqKI7GrqOvcj34Zi7H2a9Ipf11f6XewigwU+9P5FqdGhQ1iQ8r3bzAinoqRGIjbb95IfPFOpY0DttRyilgGairJf6ip8jggP/8tl2qPSIAH5ebRlQGAcmxvqZ3/jZWxwdjeGhvYuZSic1gnRUQ/RubyGPPPpZF8iS0ahwO6u3wlIp7u1v+nVm6Otkbx8/zP7sj/LCLeLv7n29+9z/hjd5XlPzw4m8n/Dzvy/6P7jC//AQAAAAAAoH+uH42IF7p9/5e15/9El/k/wxFxpA/x7/39X3ajD2GALm4ejXgtIpZWzf/LyoeMDhSlx1rzAQbTiVPNuYMR8XhEHIjBbXl5co0YY3t/HexZ1zH/L1/y+OVcwKIdNxrb7nzO7PTi9Gb2GVhx80rEM41u+Z/a/X/q0v/nnwfz64yxfOz1n3vV3Tv/ga2y/HXE/q79/+07V6S1788x0ToemCiPClb79INr3/eKL/+hOnn/v3Pt/B9NnffrWdh4jM/++mMT+d/9+H8oHW/dcmao2PbJ9OLi+cmIofTW6u1TG28zPIrKfCjzJc//A/u6n/+vdfy/IyIurzPm8R/fvNqrTv8P1cnzf3ZD/f/GV/a9/9W/veKvr/8/3OrTDxRbjP/B2taboFW3EwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD+j7KI2BUpG2+vZ9n4eMRwRDwZO7PmuYXF50+c+/jsbF7X+v3/rPyl35GVcip//3+0ozx1V/lQROyOiC8HdrTK4zPnmrNV7zwAAAAAAAAAAAAAAAAAAAA8JIZ7XP+f+3Og6tYBW65RdQOAysh/qC/5D/Ul/6G+5D/Ul/yH+pL/UF/yH+pL/kN9yX8AAAAAAHik7H72+u8pIi6/uqO15IaKusFKWwZstazqBgCVcYsfqC9Tf6C+nOMD6R712+/7mQAAAAAAAAAAAABAv+zf4/p/qCvX/0N9uf4f6sv1/1BfzvEB1/8DAAAAAAAAAAAAwMNv4cLF09PN5tx5K1asWGmvVP3JBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAlP4LAAD//xTf+Ts=") r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000002280)=ANY=[@ANYBLOB="010000000000000000030000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./']) 22:53:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000080)=0xffff7b6e, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000000c0)=0xfa0, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000001500)=""/19, &(0x7f0000000240)=0xb) 22:53:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000600), 0x1, 0x56f, &(0x7f0000000640)="$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") r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000002280)=ANY=[@ANYBLOB="010000000000000000030000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./']) 22:53:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0x0, 0x0) [ 175.776216][ T3116] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 22:53:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0x0, 0x0) 22:53:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000080)=0xffff7b6e, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000000c0)=0xfa0, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000001500)=""/19, &(0x7f0000000240)=0xb) [ 175.819858][T11521] loop4: detected capacity change from 0 to 1024 22:53:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0x0, 0x0) 22:53:37 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "00629a7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x12) 22:53:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000080)=0xffff7b6e, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000000c0)=0xfa0, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000001500)=""/19, &(0x7f0000000240)=0xb) 22:53:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000600), 0x1, 0x56f, &(0x7f0000000640)="$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") r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000002280)=ANY=[@ANYBLOB="010000000000000000030000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./']) [ 175.864587][T11521] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 175.891199][T11532] loop3: detected capacity change from 0 to 1024 22:53:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0x0, 0x0) 22:53:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000080)=0xffff7b6e, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000000c0)=0xfa0, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000001500)=""/19, &(0x7f0000000240)=0xb) [ 175.921142][T11532] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 22:53:37 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "00629a7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x12) 22:53:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000600), 0x1, 0x56f, &(0x7f0000000640)="$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") r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000002280)=ANY=[@ANYBLOB="010000000000000000030000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./']) 22:53:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000080)=0xffff7b6e, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000000c0)=0xfa0, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000001500)=""/19, &(0x7f0000000240)=0xb) 22:53:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000080)=0xffff7b6e, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000000c0)=0xfa0, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000001500)=""/19, &(0x7f0000000240)=0xb) [ 175.966645][ T3088] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 175.989236][ T3116] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 22:53:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000080)=0xffff7b6e, 0x4) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000000c0)=0xfa0, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000001500)=""/19, &(0x7f0000000240)=0xb) [ 176.071884][T11550] loop4: detected capacity change from 0 to 1024 [ 176.104276][T11554] loop3: detected capacity change from 0 to 1024 22:53:37 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2006) close_range(r0, 0xffffffffffffffff, 0x0) [ 176.107856][T11550] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 22:53:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000600), 0x1, 0x56f, &(0x7f0000000640)="$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") r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000002280)=ANY=[@ANYBLOB="010000000000000000030000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./']) [ 176.149764][T11554] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 176.171463][T11561] serio: Serial port pts2 22:53:37 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2006) close_range(r0, 0xffffffffffffffff, 0x0) 22:53:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000600), 0x1, 0x56f, &(0x7f0000000640)="$eJzs3c9rHFUcAPDvm2zSH6kmFUFrDwYKtqAmTVpRRLDFevPgj4InwZikpXTbhiaCrRVbqP+B/gGCNy/isYgU9eLVm+AfIMUiNRdvkdnMbLfNbpo0m07tfD4wybx5u3zf7PLdN/P2zWwAtTWW/8ki9kTEfIoY6ahrRFE5tvK4f25dmlm6dWkmxfLye3+nSMW28vGp+D9cPHl7RPz2U4onBlbHXbhw8fR0szl3vihPLJ6Zn1i4cPHFU2emT86dnDs7Nfny5EuHD00dPti3ff1l/Fjj6ok39n43883uz3/49lqKI7GrqOvcj34Zi7H2a9Ipf11f6XewigwU+9P5FqdGhQ1iQ8r3bzAinoqRGIjbb95IfPFOpY0DttRyilgGairJf6ip8jggP/8tl2qPSIAH5ebRlQGAcmxvqZ3/jZWxwdjeGhvYuZSic1gnRUQ/RubyGPPPpZF8iS0ahwO6u3wlIp7u1v+nVm6Otkbx8/zP7sj/LCLeLv7n29+9z/hjd5XlPzw4m8n/Dzvy/6P7jC//AQAAAAAAoH+uH42IF7p9/5e15/9El/k/wxFxpA/x7/39X3ajD2GALm4ejXgtIpZWzf/LyoeMDhSlx1rzAQbTiVPNuYMR8XhEHIjBbXl5co0YY3t/HexZ1zH/L1/y+OVcwKIdNxrb7nzO7PTi9Gb2GVhx80rEM41u+Z/a/X/q0v/nnwfz64yxfOz1n3vV3Tv/ga2y/HXE/q79/+07V6S1788x0ToemCiPClb79INr3/eKL/+hOnn/v3Pt/B9NnffrWdh4jM/++mMT+d/9+H8oHW/dcmao2PbJ9OLi+cmIofTW6u1TG28zPIrKfCjzJc//A/u6n/+vdfy/IyIurzPm8R/fvNqrTv8P1cnzf3ZD/f/GV/a9/9W/veKvr/8/3OrTDxRbjP/B2taboFW3EwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD+j7KI2BUpG2+vZ9n4eMRwRDwZO7PmuYXF50+c+/jsbF7X+v3/rPyl35GVcip//3+0ozx1V/lQROyOiC8HdrTK4zPnmrNV7zwAAAAAAAAAAAAAAAAAAAA8JIZ7XP+f+3Og6tYBW65RdQOAysh/qC/5D/Ul/6G+5D/Ul/yH+pL/UF/yH+pL/kN9yX8AAAAAAHik7H72+u8pIi6/uqO15IaKusFKWwZstazqBgCVcYsfqC9Tf6C+nOMD6R712+/7mQAAAAAAAAAAAABAv+zf4/p/qCvX/0N9uf4f6sv1/1BfzvEB1/8DAAAAAAAAAAAAwMNv4cLF09PN5tx5K1asWGmvVP3JBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAlP4LAAD//xTf+Ts=") r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000002280)=ANY=[@ANYBLOB="010000000000000000030000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./']) [ 176.210397][ T3088] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 176.244967][ T3116] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 176.276566][T11564] serio: Serial port pts2 22:53:37 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "00629a7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x12) 22:53:37 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2006) close_range(r0, 0xffffffffffffffff, 0x0) [ 176.327726][T11566] loop4: detected capacity change from 0 to 1024 [ 176.354003][T11569] loop3: detected capacity change from 0 to 1024 22:53:37 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2006) close_range(r0, 0xffffffffffffffff, 0x0) 22:53:37 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "00629a7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x12) 22:53:37 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2006) close_range(r0, 0xffffffffffffffff, 0x0) [ 176.372245][T11569] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 176.372285][T11572] serio: Serial port pts1 [ 176.399428][ T3116] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 176.401128][T11566] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 22:53:38 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2006) close_range(r0, 0xffffffffffffffff, 0x0) [ 176.461467][T11581] serio: Serial port pts2 22:53:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x5c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GENEVE_LABEL={0x8, 0xb, 0x1, 0x0, 0x1e82}, @IFLA_GENEVE_COLLECT_METADATA={0x4}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback}, @IFLA_GENEVE_PORT={0x6}]}}}]}, 0x5c}}, 0x0) 22:53:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x5c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GENEVE_LABEL={0x8, 0xb, 0x1, 0x0, 0x1e82}, @IFLA_GENEVE_COLLECT_METADATA={0x4}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback}, @IFLA_GENEVE_PORT={0x6}]}}}]}, 0x5c}}, 0x0) [ 176.503100][ T3088] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 176.535183][T11585] serio: Serial port pts2 22:53:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x5c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GENEVE_LABEL={0x8, 0xb, 0x1, 0x0, 0x1e82}, @IFLA_GENEVE_COLLECT_METADATA={0x4}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback}, @IFLA_GENEVE_PORT={0x6}]}}}]}, 0x5c}}, 0x0) 22:53:38 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2006) close_range(r0, 0xffffffffffffffff, 0x0) 22:53:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x5c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GENEVE_LABEL={0x8, 0xb, 0x1, 0x0, 0x1e82}, @IFLA_GENEVE_COLLECT_METADATA={0x4}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback}, @IFLA_GENEVE_PORT={0x6}]}}}]}, 0x5c}}, 0x0) 22:53:38 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "00629a7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x12) [ 176.626142][T11594] serio: Serial port pts2 [ 176.642977][T11593] serio: Serial port pts3 22:53:38 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2006) close_range(r0, 0xffffffffffffffff, 0x0) 22:53:38 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2006) close_range(r0, 0xffffffffffffffff, 0x0) 22:53:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) sendfile(r1, r1, 0x0, 0x3) 22:53:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) sendfile(r1, r1, 0x0, 0x3) 22:53:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) sendfile(r1, r1, 0x0, 0x3) [ 176.731596][T11606] serio: Serial port pts2 [ 176.742004][T11608] serio: Serial port pts3 22:53:38 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "00629a7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x12) 22:53:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) sendfile(r1, r1, 0x0, 0x3) 22:53:38 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2006) close_range(r0, 0xffffffffffffffff, 0x0) 22:53:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) sendfile(r1, r1, 0x0, 0x3) 22:53:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) sendfile(r1, r1, 0x0, 0x3) 22:53:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) sendfile(r1, r1, 0x0, 0x3) [ 176.859143][T11622] serio: Serial port pts2 22:53:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) sendfile(r1, r1, 0x0, 0x3) 22:53:38 executing program 4: r0 = socket(0x1000000000000010, 0x80802, 0x0) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x10004400}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@delchain={0x24}, 0x24}}, 0x0) 22:53:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) sendfile(r1, r1, 0x0, 0x3) 22:53:38 executing program 3: socket$igmp(0x2, 0x5, 0x2) 22:53:38 executing program 4: r0 = socket(0x1000000000000010, 0x80802, 0x0) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x10004400}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@delchain={0x24}, 0x24}}, 0x0) 22:53:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) sendfile(r1, r1, 0x0, 0x3) 22:53:38 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x10004400}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@delchain={0x24}, 0x24}}, 0x0) 22:53:38 executing program 4: r0 = socket(0x1000000000000010, 0x80802, 0x0) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x10004400}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@delchain={0x24}, 0x24}}, 0x0) 22:53:38 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x10004400}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@delchain={0x24}, 0x24}}, 0x0) 22:53:38 executing program 0: r0 = socket(0x1000000000000010, 0x80802, 0x0) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x10004400}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@delchain={0x24}, 0x24}}, 0x0) 22:53:38 executing program 4: r0 = socket(0x1000000000000010, 0x80802, 0x0) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x10004400}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c00095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36b26fb0b71d0e6adfefcf1d8f7faf75e0f226bd99eea7960717142fa9ea4318123741c4a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ce99fbfbf9b0a4def23d410f6296b32a334388107200759cda9036b4e369a9e152ddcc7f05a5f3c4744aeaccd3641110bec4e9027a0c8055bbfc3a96d2e8910c2c3b35967deabe802f5ab3e89bd6c662ed4048d3b3e22278d00031e5388ee5c867ddd58211d6ececb0cd2b6d357b85a0218ce740068725837074e098ee207d2f73902fbcfcf49822775985bf32d715f5888b24efa000000000000ffffffdf000000000000000000000089a7b9b00000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf449c3bfd09000000b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f292324b7ab7f91a31cf41ab11f12fb1e0a494034127de7c6592df1a6c64d8f20a67745409e011f1264d43e153b3d34899f40159e800ea2474b544035a30b23bcee46762c2093bcc9eae5dff5adbdee3e980026c96f80ee1a74e04bde740750fa4d9aaa705989b8e673e3296e52d337c56abf1128744bab6677fcb78e313841ec309baed0495f06d058a75fa4c81e5c9f42d9383e41d277b10392a912ffaf6f658f3fadd16286744f839c3f128f8f92d0992239eafce5c1b3f97a297c9e49a0c3510ef74080e6d1e0c8a868a353409e34d3e82279637598f37ad380a447483cac394c7bbdcd0e3b1c39b6e00916de48a4e70f03cc4146a77af02c1d4cef5379da860aed8477dfa8ceefb405005c6977c78cdbf37704ec73755539280b064bda154910fe050038ec9e47de89298b7bf4d769ccc18eede00e8ca5457870eb30d211e23ccc8e06cd58b61799257ab55ff413c86ba9affb12ec757c7234c270246c87a901160e6c07bc6cf8809c3a0d46ff7f008000000000ad1e1f493354b2822b98371d000000167d78e65b90eba0768e825972ea3b774a1467c89fa0f82e8440105051e5510a33dcda5e143fbfff161c12ca389cbe4c51b3fa00675cd1b66c5fd9c26a54d43fa050645bd9109b7e7131421c0f39113be7664e08bdd7115c61afcb718cf3c4680b2f6c7a84a4e3344b155cc20f49e298727340e97cdefb40e56e9cfad973347d0de7ba4754ff231a1b033d8f931ba3442b2c7c503f3d0e7ab0e958adb862822e40009995ae166deb9856291a43a6f7eb2e32cefbf46306f2ef79b8d4c2ff030000000000000007b82e6044f643068cd47ae636a5dbe9864a117d27326850a7c3b570863f532c218b10af13d7be94987005088a83880ccab9c99220002af8c5e53d52c83ac3fa7c3a3ee6c08384865b66d2b4dcb5dd9cba16b64ebbbf8702ae12c77e6e34991a225c120a3c950942fe0bc9f2a1a7506d35e5b439edeb7088aeda890cf8a4a6f31ba6d9b8cb098f935bdcbb29fd0f1a342c9eed00000000ab6648a9dea0b6c91996d65da6c24a702a86c814459f3cdaaf99000000000000000000bfb32c826563c518d0ad23bc83ba3f3757210a057eff7615c868bd7d74233da1a3b56d4e04a7ec4792b1c4cffddbbdcfdd23ab5268f1b3d08ebb8ce498cbaaf5aaab812201d1aba3d70471fcd9b466569f3ef72f39d87fcccab514fc02b70be8629c9b73ce7bc4be7f8be71cb7b2d0a4acff8f6abe7dbad64dfa44966945d93c33b038ce0d890f851811e387723a25dda119f64b35e71c5400000000000000000000000000000034c751ebdf3f20a95b817ea3df3d6c0002a41783058e56c70afe8016b3dd9dc7785b36e609f173cc6b893ecd138289709839747837d6a6283b3452c57a5d44cacd363589845637071320921d22c1663964eddec902fc7cc33158bc306d8c3bdae8108a23d2dc96a5cdb518f58832ec0906aaec43659c79c8ad37b0f961f3beaa3e02f7762c5dd633d13b5e487e996597b2ab42c898b7dd8390e13b395aacce4683e55bcfe8c17615257364365fd48bd77da79e52ce9adfe6dca9c42c4d719347f39ef006c2df747ee6adb7cd04faf05c36de72354c64ebaf28a3de18607ebc4b70f50f71dae565749568a23319232dc213342fb472e98c9a412199ce7976bee5eaf40e60cb3fbe8b92dae5008e92d17d05ce74ffffe74ae71d5b8bd43a4e0bf0390335aa489689f5e3a4ac5adca96caab658b43cd499d95d3876c220d147ad1d0e626621d88f1370982f663793cac52ea0d14e595ff1f56427a0a813bb3b84d31d021eeea8faeff25bb66f5940d08a5509a66fc43962bcb2f7415bc38e355e80ec935aa6fe2d74bd475d89449fb46320fee40faff2fd005549fe6a042bd95decfde5e166971935f4cfd9c9e5bfd2d803644f4e5b7e6dc1a7a35df7134e2fad79269bf24bea4eb0213068e3054d9e4a8d1a9eb032cb390e2016d0ce10549728cb4732dc5adab16fa19ac70780b29e079be27c95d3dd2bd91a584c46d84d430fc6ea31ce0ba62fa27be9f6bc435203da7c3a5d68bf4dd4f81cbfaa1c87a15b9272853c9837db930952dca667194b71815a9eb49b495360dcdf31e0e560857d0541a916d6b5469ac1b36babc5a91e1d58925f20d9d5f8a0da3c30711b0d101cabceffbe072be69613ea0003c6e9bb5cd2413c8ddc17cfa319cf7aaeed0ffb07a08f8fb439f709dfe0732fe42192819870bdd87d5f612ade03540a28be446095269d9ea5a60bba1f2462f9921f2a731dbcf1d03964ea1e4f79514914d37877f57617b60fa2b58aa694fcb023024653c4b73efb12a57ffc6f8943262b77be933051e12bd4d768a422ea652d45b04a9c43b5c97fc3edea7002d51a0a74889334ee"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@delchain={0x24}, 0x24}}, 0x0) 22:53:38 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x10004400}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@delchain={0x24}, 0x24}}, 0x0) 22:53:38 executing program 0: r0 = socket(0x1000000000000010, 0x80802, 0x0) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x10004400}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@delchain={0x24}, 0x24}}, 0x0) 22:53:38 executing program 4: socket$igmp(0x10, 0x3, 0x8) 22:53:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_proto_private(r0, 0x89b1, &(0x7f0000000000)="6a9ad70fa13a") 22:53:38 executing program 0: r0 = socket(0x1000000000000010, 0x80802, 0x0) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x10004400}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@delchain={0x24}, 0x24}}, 0x0) 22:53:38 executing program 4: socket$igmp(0x10, 0x3, 0x8) 22:53:38 executing program 3: syz_mount_image$iso9660(&(0x7f0000000780), &(0x7f0000000000)='./file0\x00', 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=normal\x00map=acorn,dmode=0x8000000000000001,cruft,uid=', @ANYRESHEX=0x0, @ANYBLOB='Acruft,euit=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'], 0x1, 0x62f, &(0x7f00000007c0)="$eJzs3V1v29Ydx/EfZfkhHhAM21AEQZqcJiuQYJkiyY0DI7sYRx3J7CRRIOnBBgYUWWMXQeR0SzJg8U3hmz0A3RvYXW92sRcxYNd7F7scUGx3A3ajgaRoy9ajE8Vu1+9HSHhE/snzP6TNA1rioQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgByvVi5XHDX99ta2Gc+rhUFrwvJsa4u6kxXuTK1XcpJ/WlnRlWzWle8dL34n+e+mrmXvrmklmazo4FvvfPvhd4uFfP0JCb0OnXWDL14dPH3U7e4+n3MiXwEqzBDUsG0/CvyW27DGjwKzsb5evrdZj0zdb9poJ4pty3ihLcRBaG57d0xlY2PN2NJOsNVu1NymzWc++GG1XF43Hy73D/+9D0uRt+k3m367kcYki5OYB+bzn2ch1m0Zs/eku7s2LckkqDJLUHVaULVcrVYq1Wpl/f7G/QflcnFoRvkUDUXM/YcWXzPzO3kDb6iQ9P//cKSmVtTWlrZlRr481RQqUGvM8r68/3//np1Y72D/n/fyV44XX1Xa/1/P3l0f1/+PycXIpCuMWuKMmf96rxd6pQM91SN11dWuns9nuzfml+HbfTWkouQrUiBfLblqyMr05xhtaF3rKusjbaquSEZ1+WrKKtKOIsWyaqXHJJSVq1iBQhndlqc7MqpoQxtak5FVSTsKtKW2GqrJ1X96vd6enqT7fW1CjsqDKrMEVScEjev/f/FZ9nNK//9Nl5+/ZokBLlyvf/1/RjfeTjYAAAAAAOBtcNK/vjvpZ/fvSuqp7jdt+aLTAgAAAAAAc5R+8n8tmSwmpXfljLn+751/bgAAAAAAYD6c9B47R9Jq+qV+5/hOqFm+BLBwDikCAAAAAIA3lH7+f31J6qVjr92Qc6brfwAAAAAA8DXw+4Ex9ov5GLu9/GP9gqSos+z89V/LChedw8729519N1ni7vdjhr4BENevOpf7A/WmkyVJ6TvPXnP64wP3B8F0soF9pS/3po3174SnElhayP98MS2B9WL/nT7Xe1nMe/16Hx8UlC7Jalmt+01b8oLmw4pc93Ihttvxr589+Y0UHrVz70l3t/Txp93HaS6HyazD/SSPz06kU5iWy8t0vIX0notRLb6kel7lH9qtVSett5y3f0HufmGwotna/1vdzGJurmbT1YP8CKTtX0naXymlh+y49enoEM5xFpXTLR91IMZksZJmcSuLuXX7VjbJ8+tn8YMFqVoaPgbhYBbVwSym7wvn30P7YkoWyb5YS7L4W7KhMVmsnS2LoSMCABdl77gXSgcxHx5j/3S/+zpnuem9+49P1vLyT73shsMFqdj/bGJiLStKzui3s5glpSfW4tURZ/Ryv19Z0ZgzevkNerekrr8cPwOpn/ZQFv/t9XoPK2m9fzzVq36RrPDF2HqjZnUh2YX3Xu7/Mh0AP/HJ7ie7z6rVtfXyB+Xy/aoW02b0J/Q9AIARpj9jZ2qE88HRVfXjf76flU70eN85+kpBSR/rU3X1WHfzRwjcGL3V1YGvIdwdvmpNYi9Jp2Mrujv2qi7tSwdiq0exi8pXOdlTH8euveWjAADA+bo5pR+epf+/m19337468rr7ZF9++gnB42Ir57wnAAD45rDhl85q/DsnDP3OR5WNjYobb1oTBt5PTejXGtb47diG3qbbbljTCYM48IKm6YRa9ms2MtFWpxOEsakHoekEkb+dPvnd9B/9HtmW2459L+o0rRtZ4wXt2PViU/Mjz3S2ftL0o00bpitHHev5dd9zYz9omyjYCj1bMiaydiDQr9l27Nf9pNg2ndBvueGO+VnQ3GpZU7ORF/qdOMg2mNflt+tB2Eo3W1LvzA86BADg/9GLVwdPH3W7u88nFA41PaZfWBq1wYtuIwAAOIleGgAAAAAAAAAAAAAAAAAAAACAr75Z7v87U2Fx1M2C0tGcX12eaTuO5p3YWQqF11/97xNiLh3NyXf/YMzhBbRUWaE4/y1fkma/bXQOhR/tZXt0bEyycOSi5aNjUZz/r0NSePbnMYt6vV5v8urLJ/fh0qQGniwUJT1feoNDcDHnIwDn538BAAD//08LRBY=") r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000400)=""/153, 0x99) 22:53:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}}}, 0x90) 22:53:38 executing program 4: socket$igmp(0x10, 0x3, 0x8) 22:53:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_proto_private(r0, 0x89b1, &(0x7f0000000000)="6a9ad70fa13a") 22:53:38 executing program 4: socket$igmp(0x10, 0x3, 0x8) 22:53:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}}}, 0x90) 22:53:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}}}, 0x90) 22:53:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@datasec={0x1, 0x1, 0x0, 0xf, 0x1, [{0x1, 0x10001}], "c1"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "a1"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "5cca"}]}, {0x0, [0x61]}}, 0x0, 0x4f, 0x0, 0x8}, 0x20) 22:53:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}}}, 0x90) 22:53:38 executing program 3: syz_mount_image$iso9660(&(0x7f0000000780), &(0x7f0000000000)='./file0\x00', 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=normal\x00map=acorn,dmode=0x8000000000000001,cruft,uid=', @ANYRESHEX=0x0, @ANYBLOB='Acruft,euit=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'], 0x1, 0x62f, &(0x7f00000007c0)="$eJzs3V1v29Ydx/EfZfkhHhAM21AEQZqcJiuQYJkiyY0DI7sYRx3J7CRRIOnBBgYUWWMXQeR0SzJg8U3hmz0A3RvYXW92sRcxYNd7F7scUGx3A3ajgaRoy9ajE8Vu1+9HSHhE/snzP6TNA1rioQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgByvVi5XHDX99ta2Gc+rhUFrwvJsa4u6kxXuTK1XcpJ/WlnRlWzWle8dL34n+e+mrmXvrmklmazo4FvvfPvhd4uFfP0JCb0OnXWDL14dPH3U7e4+n3MiXwEqzBDUsG0/CvyW27DGjwKzsb5evrdZj0zdb9poJ4pty3ihLcRBaG57d0xlY2PN2NJOsNVu1NymzWc++GG1XF43Hy73D/+9D0uRt+k3m367kcYki5OYB+bzn2ch1m0Zs/eku7s2LckkqDJLUHVaULVcrVYq1Wpl/f7G/QflcnFoRvkUDUXM/YcWXzPzO3kDb6iQ9P//cKSmVtTWlrZlRr481RQqUGvM8r68/3//np1Y72D/n/fyV44XX1Xa/1/P3l0f1/+PycXIpCuMWuKMmf96rxd6pQM91SN11dWuns9nuzfml+HbfTWkouQrUiBfLblqyMr05xhtaF3rKusjbaquSEZ1+WrKKtKOIsWyaqXHJJSVq1iBQhndlqc7MqpoQxtak5FVSTsKtKW2GqrJ1X96vd6enqT7fW1CjsqDKrMEVScEjev/f/FZ9nNK//9Nl5+/ZokBLlyvf/1/RjfeTjYAAAAAAOBtcNK/vjvpZ/fvSuqp7jdt+aLTAgAAAAAAc5R+8n8tmSwmpXfljLn+751/bgAAAAAAYD6c9B47R9Jq+qV+5/hOqFm+BLBwDikCAAAAAIA3lH7+f31J6qVjr92Qc6brfwAAAAAA8DXw+4Ex9ov5GLu9/GP9gqSos+z89V/LChedw8729519N1ni7vdjhr4BENevOpf7A/WmkyVJ6TvPXnP64wP3B8F0soF9pS/3po3174SnElhayP98MS2B9WL/nT7Xe1nMe/16Hx8UlC7Jalmt+01b8oLmw4pc93Ihttvxr589+Y0UHrVz70l3t/Txp93HaS6HyazD/SSPz06kU5iWy8t0vIX0notRLb6kel7lH9qtVSett5y3f0HufmGwotna/1vdzGJurmbT1YP8CKTtX0naXymlh+y49enoEM5xFpXTLR91IMZksZJmcSuLuXX7VjbJ8+tn8YMFqVoaPgbhYBbVwSym7wvn30P7YkoWyb5YS7L4W7KhMVmsnS2LoSMCABdl77gXSgcxHx5j/3S/+zpnuem9+49P1vLyT73shsMFqdj/bGJiLStKzui3s5glpSfW4tURZ/Ryv19Z0ZgzevkNerekrr8cPwOpn/ZQFv/t9XoPK2m9fzzVq36RrPDF2HqjZnUh2YX3Xu7/Mh0AP/HJ7ie7z6rVtfXyB+Xy/aoW02b0J/Q9AIARpj9jZ2qE88HRVfXjf76flU70eN85+kpBSR/rU3X1WHfzRwjcGL3V1YGvIdwdvmpNYi9Jp2Mrujv2qi7tSwdiq0exi8pXOdlTH8euveWjAADA+bo5pR+epf+/m19337468rr7ZF9++gnB42Ir57wnAAD45rDhl85q/DsnDP3OR5WNjYobb1oTBt5PTejXGtb47diG3qbbbljTCYM48IKm6YRa9ms2MtFWpxOEsakHoekEkb+dPvnd9B/9HtmW2459L+o0rRtZ4wXt2PViU/Mjz3S2ftL0o00bpitHHev5dd9zYz9omyjYCj1bMiaydiDQr9l27Nf9pNg2ndBvueGO+VnQ3GpZU7ORF/qdOMg2mNflt+tB2Eo3W1LvzA86BADg/9GLVwdPH3W7u88nFA41PaZfWBq1wYtuIwAAOIleGgAAAAAAAAAAAAAAAAAAAACAr75Z7v87U2Fx1M2C0tGcX12eaTuO5p3YWQqF11/97xNiLh3NyXf/YMzhBbRUWaE4/y1fkma/bXQOhR/tZXt0bEyycOSi5aNjUZz/r0NSePbnMYt6vV5v8urLJ/fh0qQGniwUJT1feoNDcDHnIwDn538BAAD//08LRBY=") r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000400)=""/153, 0x99) [ 177.265830][T11673] loop3: detected capacity change from 0 to 164 [ 177.291006][T11673] Unable to read rock-ridge attributes [ 177.307402][T11673] Unable to read rock-ridge attributes 22:53:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_proto_private(r0, 0x89b1, &(0x7f0000000000)="6a9ad70fa13a") 22:53:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@datasec={0x1, 0x1, 0x0, 0xf, 0x1, [{0x1, 0x10001}], "c1"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "a1"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "5cca"}]}, {0x0, [0x61]}}, 0x0, 0x4f, 0x0, 0x8}, 0x20) 22:53:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}}}, 0x90) 22:53:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}}}, 0x90) 22:53:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@datasec={0x1, 0x1, 0x0, 0xf, 0x1, [{0x1, 0x10001}], "c1"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "a1"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "5cca"}]}, {0x0, [0x61]}}, 0x0, 0x4f, 0x0, 0x8}, 0x20) 22:53:38 executing program 0: syz_mount_image$iso9660(&(0x7f0000000780), &(0x7f0000000000)='./file0\x00', 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=normal\x00map=acorn,dmode=0x8000000000000001,cruft,uid=', @ANYRESHEX=0x0, @ANYBLOB='Acruft,euit=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'], 0x1, 0x62f, &(0x7f00000007c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000400)=""/153, 0x99) 22:53:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}}}, 0x90) 22:53:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@datasec={0x1, 0x1, 0x0, 0xf, 0x1, [{0x1, 0x10001}], "c1"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "a1"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "5cca"}]}, {0x0, [0x61]}}, 0x0, 0x4f, 0x0, 0x8}, 0x20) 22:53:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_proto_private(r0, 0x89b1, &(0x7f0000000000)="6a9ad70fa13a") [ 177.401458][T11694] loop3: detected capacity change from 0 to 164 22:53:39 executing program 1: lsm_get_self_attr(0x67, 0xffffffffffffffff, &(0x7f0000000040)=0x4a, 0x0) 22:53:39 executing program 3: syz_mount_image$iso9660(&(0x7f0000000780), &(0x7f0000000000)='./file0\x00', 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=normal\x00map=acorn,dmode=0x8000000000000001,cruft,uid=', @ANYRESHEX=0x0, @ANYBLOB='Acruft,euit=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'], 0x1, 0x62f, &(0x7f00000007c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000400)=""/153, 0x99) 22:53:39 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "e309d13f2db6f7af52d571d422cb07c223a1ca101f48b382b1a8f4230d4e8dc3df8e30613c994ca70ad3b6eb34c4fda339a1332520f38819182c76de68d169127a2e21c875520c71307f022ccdca5f68bc328f80a96662214d1db3248d070310c3c112363134dc15d627c10122842e72f0c924e81538f440f19f17dd7f8128825a8fc71b86d2cc094efd5222f7016a6bbccd95e86c7d7d9dfae2f9afee99377869cd4fa9266307e9631a2e321c93316863d2f9da1fbf8153b584b2954ee8db4a3b006b2b4cc93685e4c2186cf122df3d1c084257ba756d2572e01b976ab5677436529b818035115df94d0130a6560e1e1d78e2bb440de2eef801cf20ed35815c"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 1: lsm_get_self_attr(0x67, 0xffffffffffffffff, &(0x7f0000000040)=0x4a, 0x0) [ 177.448640][T11694] Unable to read rock-ridge attributes [ 177.461749][T11694] Unable to read rock-ridge attributes [ 177.469528][T11709] loop0: detected capacity change from 0 to 164 22:53:39 executing program 0: syz_mount_image$iso9660(&(0x7f0000000780), &(0x7f0000000000)='./file0\x00', 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=normal\x00map=acorn,dmode=0x8000000000000001,cruft,uid=', @ANYRESHEX=0x0, @ANYBLOB='Acruft,euit=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'], 0x1, 0x62f, &(0x7f00000007c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000400)=""/153, 0x99) 22:53:39 executing program 1: lsm_get_self_attr(0x67, 0xffffffffffffffff, &(0x7f0000000040)=0x4a, 0x0) 22:53:39 executing program 1: lsm_get_self_attr(0x67, 0xffffffffffffffff, &(0x7f0000000040)=0x4a, 0x0) [ 177.508761][T11709] Unable to read rock-ridge attributes [ 177.526004][T11709] Unable to read rock-ridge attributes [ 177.536923][T11715] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 177.549495][T11719] loop3: detected capacity change from 0 to 164 22:53:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x10, &(0x7f0000000040)=ANY=[], 0x1, 0x7f0, &(0x7f0000000340)="$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") 22:53:39 executing program 3: syz_mount_image$iso9660(&(0x7f0000000780), &(0x7f0000000000)='./file0\x00', 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=normal\x00map=acorn,dmode=0x8000000000000001,cruft,uid=', @ANYRESHEX=0x0, @ANYBLOB='Acruft,euit=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'], 0x1, 0x62f, &(0x7f00000007c0)="$eJzs3V1v29Ydx/EfZfkhHhAM21AEQZqcJiuQYJkiyY0DI7sYRx3J7CRRIOnBBgYUWWMXQeR0SzJg8U3hmz0A3RvYXW92sRcxYNd7F7scUGx3A3ajgaRoy9ajE8Vu1+9HSHhE/snzP6TNA1rioQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgByvVi5XHDX99ta2Gc+rhUFrwvJsa4u6kxXuTK1XcpJ/WlnRlWzWle8dL34n+e+mrmXvrmklmazo4FvvfPvhd4uFfP0JCb0OnXWDL14dPH3U7e4+n3MiXwEqzBDUsG0/CvyW27DGjwKzsb5evrdZj0zdb9poJ4pty3ihLcRBaG57d0xlY2PN2NJOsNVu1NymzWc++GG1XF43Hy73D/+9D0uRt+k3m367kcYki5OYB+bzn2ch1m0Zs/eku7s2LckkqDJLUHVaULVcrVYq1Wpl/f7G/QflcnFoRvkUDUXM/YcWXzPzO3kDb6iQ9P//cKSmVtTWlrZlRr481RQqUGvM8r68/3//np1Y72D/n/fyV44XX1Xa/1/P3l0f1/+PycXIpCuMWuKMmf96rxd6pQM91SN11dWuns9nuzfml+HbfTWkouQrUiBfLblqyMr05xhtaF3rKusjbaquSEZ1+WrKKtKOIsWyaqXHJJSVq1iBQhndlqc7MqpoQxtak5FVSTsKtKW2GqrJ1X96vd6enqT7fW1CjsqDKrMEVScEjev/f/FZ9nNK//9Nl5+/ZokBLlyvf/1/RjfeTjYAAAAAAOBtcNK/vjvpZ/fvSuqp7jdt+aLTAgAAAAAAc5R+8n8tmSwmpXfljLn+751/bgAAAAAAYD6c9B47R9Jq+qV+5/hOqFm+BLBwDikCAAAAAIA3lH7+f31J6qVjr92Qc6brfwAAAAAA8DXw+4Ex9ov5GLu9/GP9gqSos+z89V/LChedw8729519N1ni7vdjhr4BENevOpf7A/WmkyVJ6TvPXnP64wP3B8F0soF9pS/3po3174SnElhayP98MS2B9WL/nT7Xe1nMe/16Hx8UlC7Jalmt+01b8oLmw4pc93Ihttvxr589+Y0UHrVz70l3t/Txp93HaS6HyazD/SSPz06kU5iWy8t0vIX0notRLb6kel7lH9qtVSett5y3f0HufmGwotna/1vdzGJurmbT1YP8CKTtX0naXymlh+y49enoEM5xFpXTLR91IMZksZJmcSuLuXX7VjbJ8+tn8YMFqVoaPgbhYBbVwSym7wvn30P7YkoWyb5YS7L4W7KhMVmsnS2LoSMCABdl77gXSgcxHx5j/3S/+zpnuem9+49P1vLyT73shsMFqdj/bGJiLStKzui3s5glpSfW4tURZ/Ryv19Z0ZgzevkNerekrr8cPwOpn/ZQFv/t9XoPK2m9fzzVq36RrPDF2HqjZnUh2YX3Xu7/Mh0AP/HJ7ie7z6rVtfXyB+Xy/aoW02b0J/Q9AIARpj9jZ2qE88HRVfXjf76flU70eN85+kpBSR/rU3X1WHfzRwjcGL3V1YGvIdwdvmpNYi9Jp2Mrujv2qi7tSwdiq0exi8pXOdlTH8euveWjAADA+bo5pR+epf+/m19337468rr7ZF9++gnB42Ir57wnAAD45rDhl85q/DsnDP3OR5WNjYobb1oTBt5PTejXGtb47diG3qbbbljTCYM48IKm6YRa9ms2MtFWpxOEsakHoekEkb+dPvnd9B/9HtmW2459L+o0rRtZ4wXt2PViU/Mjz3S2ftL0o00bpitHHev5dd9zYz9omyjYCj1bMiaydiDQr9l27Nf9pNg2ndBvueGO+VnQ3GpZU7ORF/qdOMg2mNflt+tB2Eo3W1LvzA86BADg/9GLVwdPH3W7u88nFA41PaZfWBq1wYtuIwAAOIleGgAAAAAAAAAAAAAAAAAAAACAr75Z7v87U2Fx1M2C0tGcX12eaTuO5p3YWQqF11/97xNiLh3NyXf/YMzhBbRUWaE4/y1fkma/bXQOhR/tZXt0bEyycOSi5aNjUZz/r0NSePbnMYt6vV5v8urLJ/fh0qQGniwUJT1feoNDcDHnIwDn538BAAD//08LRBY=") r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000400)=""/153, 0x99) [ 177.573911][T11719] Unable to read rock-ridge attributes [ 177.580583][T11715] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.586937][T11719] Unable to read rock-ridge attributes [ 177.593937][T11715] bridge_slave_0: left allmulticast mode [ 177.599792][T11715] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.617347][T11715] team0: Port device bridge_slave_0 added 22:53:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000380)=0x6) setresuid(0x0, r2, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000000c0)="9ea11f8bfd0d", 0x0, 0x0, 0x0, 0x0, 0x0}) 22:53:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000380)=0x6) setresuid(0x0, r2, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000000c0)="9ea11f8bfd0d", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 177.622786][T11725] loop0: detected capacity change from 0 to 164 22:53:39 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000380)=0x6) setresuid(0x0, r2, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000000c0)="9ea11f8bfd0d", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 177.663699][T11725] Unable to read rock-ridge attributes [ 177.669404][T11733] loop3: detected capacity change from 0 to 164 [ 177.676551][T11725] Unable to read rock-ridge attributes [ 177.692806][T11736] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 22:53:39 executing program 0: syz_mount_image$iso9660(&(0x7f0000000780), &(0x7f0000000000)='./file0\x00', 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=normal\x00map=acorn,dmode=0x8000000000000001,cruft,uid=', @ANYRESHEX=0x0, @ANYBLOB='Acruft,euit=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'], 0x1, 0x62f, &(0x7f00000007c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000400)=""/153, 0x99) 22:53:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000380)=0x6) setresuid(0x0, r2, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000000c0)="9ea11f8bfd0d", 0x0, 0x0, 0x0, 0x0, 0x0}) 22:53:39 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "e309d13f2db6f7af52d571d422cb07c223a1ca101f48b382b1a8f4230d4e8dc3df8e30613c994ca70ad3b6eb34c4fda339a1332520f38819182c76de68d169127a2e21c875520c71307f022ccdca5f68bc328f80a96662214d1db3248d070310c3c112363134dc15d627c10122842e72f0c924e81538f440f19f17dd7f8128825a8fc71b86d2cc094efd5222f7016a6bbccd95e86c7d7d9dfae2f9afee99377869cd4fa9266307e9631a2e321c93316863d2f9da1fbf8153b584b2954ee8db4a3b006b2b4cc93685e4c2186cf122df3d1c084257ba756d2572e01b976ab5677436529b818035115df94d0130a6560e1e1d78e2bb440de2eef801cf20ed35815c"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) [ 177.722379][T11734] loop1: detected capacity change from 0 to 2048 [ 177.740862][T11733] Unable to read rock-ridge attributes [ 177.753500][T11733] Unable to read rock-ridge attributes [ 177.754994][T11734] EXT4-fs warning (device loop1): read_mmp_block:115: Error -117 while reading MMP block 0 [ 177.789478][T11743] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 177.800058][T11746] loop0: detected capacity change from 0 to 164 [ 177.823584][T11745] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 22:53:39 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x10, &(0x7f0000000040)=ANY=[], 0x1, 0x7f0, &(0x7f0000000340)="$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") 22:53:39 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) [ 177.842237][T11746] Unable to read rock-ridge attributes [ 177.853726][T11746] Unable to read rock-ridge attributes [ 177.871706][T11749] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 177.900595][T11752] loop1: detected capacity change from 0 to 2048 [ 177.907067][T11750] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 177.916350][T11752] EXT4-fs warning (device loop1): read_mmp_block:115: Error -117 while reading MMP block 0 [ 177.945107][T11750] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.954505][T11750] bridge_slave_0: left allmulticast mode [ 177.960329][T11750] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.969841][T11750] team0: Port device bridge_slave_0 added [ 177.987221][T11745] bridge0: port 1(bridge_slave_0) entered disabled state 22:53:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x10, &(0x7f0000000040)=ANY=[], 0x1, 0x7f0, &(0x7f0000000340)="$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") [ 177.996566][T11745] bridge_slave_0: left allmulticast mode [ 178.002435][T11745] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.019597][T11745] team0: Port device bridge_slave_0 added [ 178.023904][T11760] loop1: detected capacity change from 0 to 2048 22:53:39 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x10, &(0x7f0000000040)=ANY=[], 0x1, 0x7f0, &(0x7f0000000340)="$eJzs3c9rXFsdAPDvncxkkrSaCILWVUDQQOnEtLFVcBFxIUILBV3bhsk01EwyJTMpTQhoUcGNoOJC0E3X/qg7wYX4YyXU/8KFtNTXNLyUx+ORx525k6bJTJpfzfQ1nw9ccs695873fHPvnDkz9zITwKk1GhEDEXEuIn6RRAxn65OIKDRL+YipVruNtdVyuiSxufnd95Jmm/W11fLgtn1SZ7LK5yPinz+NOJ/bHbe+vDI3Xa1WFrP6eGP+znh9eeXC7fnp2dhsuXjlq1cuZw3uHzbD4lbp/f+snH3yy29/+U9TH/z4cw9//q8kpuJsti3N47ARuhmN0ex/Uti17VvHHazHkgO2/+Eb6gcHkz41+1rP8jgXw9HXLAEA77J0HrYJAJwyidd/ADhl2p8DrK+tltvL1ocDV3v1qcTJefrN1gXQ9eza5sZW/vmYav4daF69G1pPXrkykkTEyDHEH42I3/3l+39Il9jHdcjdVxIBDudH9yPi5sjo7vE/yca/w/vKPtqM/rX4Sr0Zv3jEwMC+/D2d/3yt0/wvtzX/iQ7zn2I2dzmqnY+xe/6Te3wMYbpK53/f2HZv28a2/DMjfVntU805XyG5dbtaSce2T0fEWBSKaX2i3Xpgd4yx5x897xZ/+/zv2a9+8Ps0fvr3ZYvc4/yO8XBmujF91Lzbnt6P+EK+U/7t8X+g+Sah0/z3+j5jfOfrP/ttt21p/mm+6dKe26bl5ITmupsPIr7U8fi/vKMt2Xl/YmW2snB5YnKyeX/iePN0GG+fFB38+b+/GeoWf/vxT5c0fvu9wElIj//Q3vmPJNvv16wfPMajB8P/6LZtdOvT5275dz7/+5PvNcv92bp7043G4kREf3J19/qL7T3Tta16u32a/9gXOz//2+Nf0uH8L0T87eY+888/+f8fd6x69jL/3h//mQMd/52FJOm6KSs83Jjr6xZ/j/z//ZPWifE4X5xsth3L9mmOf8/3vl13j+5UK4uDcfizGQAAAAAAAAAAAAAAAAAAAAAAAAAOLhcRZyPJlbbKuVyp1PoN78/GUK5aqzfO36otLcxE87eyR6KQa3/V5fC270OdyL4Pv12/uKN+KSI+ExG/Lg4266VyrTrT6+QBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIHOmy+//p/5XfLHZ0nX3/pPrKQBwrAZ63QEA4MR5/QeA08frPwCcPl7/AeD0eZTrdQ8AgJPW/f1/3x57Fd9IXwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgnXb92LV02X6ytltP6zN3lpbna3QszlfpcaX6pXCrXFu+UZmu12WqlVK7Nv+7xqrXanclYWLo33qjUG+P15ZUb87WlhcaN2/PTs5UblcKJZAUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB1NfXpmbrlYri0cv5CKi46b8a2LFSMTxdaMnhYF4K7qxv8KljdbxONZHzh/rA374Vvyj3kyhcIDGg9lTpwdd7dWIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPDJ8nEAAAD//9UnMzQ=") [ 178.042060][T11760] EXT4-fs warning (device loop1): read_mmp_block:115: Error -117 while reading MMP block 0 [ 178.052577][T11755] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 178.083908][T11761] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.111108][T11761] bridge_slave_0: left allmulticast mode [ 178.116961][T11761] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.134735][T11770] loop1: detected capacity change from 0 to 2048 [ 178.135404][T11761] team0: Port device bridge_slave_0 added [ 178.149819][T11770] EXT4-fs warning (device loop1): read_mmp_block:115: Error -117 while reading MMP block 0 22:53:39 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "e309d13f2db6f7af52d571d422cb07c223a1ca101f48b382b1a8f4230d4e8dc3df8e30613c994ca70ad3b6eb34c4fda339a1332520f38819182c76de68d169127a2e21c875520c71307f022ccdca5f68bc328f80a96662214d1db3248d070310c3c112363134dc15d627c10122842e72f0c924e81538f440f19f17dd7f8128825a8fc71b86d2cc094efd5222f7016a6bbccd95e86c7d7d9dfae2f9afee99377869cd4fa9266307e9631a2e321c93316863d2f9da1fbf8153b584b2954ee8db4a3b006b2b4cc93685e4c2186cf122df3d1c084257ba756d2572e01b976ab5677436529b818035115df94d0130a6560e1e1d78e2bb440de2eef801cf20ed35815c"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 1: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) [ 178.161438][T11764] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 178.177407][T11768] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 178.194984][T11766] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 22:53:39 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) [ 178.260145][T11775] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 22:53:39 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000380)=0x6) setresuid(0x0, r2, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000000c0)="9ea11f8bfd0d", 0x0, 0x0, 0x0, 0x0, 0x0}) 22:53:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$eJzs3d1rW+cZAPDnyFLkONnswWDLrgyDzRAiz4mXbLCLjF2MQQKB7XqJkRWTWbaCJYfYGLawFnpTaEsvCu1NrvuR3vW2H1eF9L/oRUlIGyfUoZTicvThOLbk2LFiufHvB8d+33Ne6XkfnQ+9OucgBXBgDad/MhHHIuK1JGKwOT+JiFy9lI0422i3srxUTKckVlf/+U1Sb/Nweal4eN1jUkealV9HxKcvRxzPbI5bXVicniiXS3PN+mht5upodWHxxJWZianSVGn29Nj4+MkzfzxzercZ5tdK336xePTu63///Qdnv/v/r269+lkSZ+Noc1max24jbTQcw83XJJe+hE/4W7eD9Viyw/b/fU79YGfSXbOvsZfHsRiMvnoJAHiRpeOwVQDggEm8/wPAAdM6D/BweanYmtZODpzr1VmJvXPvrxHR38i/dX2zsSTbvGbXX78OOvAweeLKSBIRQ12IPxwR73z07/fSKbZxHTLXhZgAqf/diIhLQ8Obj//JpnsWduoP22gzvKH+PO7DANr7OB3//Knd+C+zNv6JNuOffJt991k8ff/P3OlCmI7S8d9f1t3btrIu/6ahvmbtZ/UxXy65fKVcSo9tP4+Ikcjl0/pYq3X/5hgjD3540Cn++vHf/Tf+824aP/3/uEXmTjb/5GMmJ2oTu8275d6NiN9k2+XfOv731z8ktBv/XthmjH/8+ZW3Oy1L80/zTafW2DYtJ3s01l29GfG7tuv/8R1tyZb3J47WN4fR1kbRxodfvjXQKf769Z9OafzWZ4G9kK7/ga3zH0rW369Z3XmM2zcHP+m0bHjt7HOn/Ntv/4eSf9XLh5rzrk/UanNjEYeSc5vnn2w9Mp3bqLfap/mP/Lb9/t86/iVttv9027y0zfyzd79+f8Os+4/z7/36n9zR+t9YSJKOi5qFWyvTfZ3ib5H/5y81Now72fx4ve1I8zH149+DrYeJW3SnXJo7HM++NQMAAAAAAAAAAAAAAAAAAAAAAADAzmUi4mgkmcJaOZMpFBq/4f3LGMiUK9Xa8cuV+dnJqP9W9lDkMq2vuhxc932oY83vw2/VT26on4qIX0TEm/nD9XqhWClP9jp5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGg60uH3/1Nf5R+tNvS6lwBA1/X3ugMAwJ7z/g8AB4/3fwA4eLz/A8DBczvT6x4AAHvt2T7/57veDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF5YF86fT6fVR8tLxbQ+eW1hfrpy7cRkqTpdmJkvFoqVuauFqUplqlwqFCszT3u+cqVydTxm56+P1krV2mh1YfHiTGV+tnbxyszEVOliKbcnWQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAzlQXFqcnyuXS3O4LmYhouyjb/Vj7rdAf+6Ib2yucWmmsj64+c7arT/j9vnihnk8htz+68bRCL49KAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8dPwYAAP//WQAx3w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x86, 0x0, &(0x7f00000000c0)) 22:53:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x6, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 22:53:39 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) [ 178.339312][T11781] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.348061][T11781] bridge_slave_0: left allmulticast mode [ 178.353802][T11781] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.363059][T11781] team0: Port device bridge_slave_0 added 22:53:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x6, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 22:53:39 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000380)=0x6) setresuid(0x0, r2, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000000c0)="9ea11f8bfd0d", 0x0, 0x0, 0x0, 0x0, 0x0}) 22:53:39 executing program 1: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:39 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x84, 0x36, 0x0, 0x0) 22:53:40 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000380)=0x6) setresuid(0x0, r2, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000000c0)="9ea11f8bfd0d", 0x0, 0x0, 0x0, 0x0, 0x0}) 22:53:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x6, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) [ 178.428023][T11790] loop2: detected capacity change from 0 to 2048 22:53:40 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x84, 0x36, 0x0, 0x0) 22:53:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x6, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 22:53:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) 22:53:40 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x84, 0x36, 0x0, 0x0) [ 178.471523][T11790] EXT4-fs (loop2): warning: checktime reached, running e2fsck is recommended [ 178.498823][T11790] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 22:53:40 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x84, 0x36, 0x0, 0x0) 22:53:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x86, 0x0, &(0x7f00000000c0)) 22:53:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x86, 0x0, &(0x7f00000000c0)) 22:53:40 executing program 1: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000018c0)=@newlink={0x58, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000, @local}}]}]}, @IFLA_MTU={0x8}]}, 0x58}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10104}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_0\x00'}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000090", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@TCA_STAB={0x4, 0x8, 0x0, 0x1, [{{0x1c, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@ipv6_getnetconf={0x5c, 0x52, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xfffffffd}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xbf}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004004}, 0xc015) r8 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800e3001000e501000000000000000007000000", @ANYRES32=r9, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="00bba30000000000"], 0x38}}, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r11, 0x890c, &(0x7f0000000100)={@remote, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0xd929, 0x40, 0xfffd, 0x100, 0x9, 0x40000000, r12}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x78, 0x40, 0x6, 0x42, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x8000, 0x40, 0x7f}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x3f, 0x3, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x7800, 0x3, 0x10000}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000dc0)={0x204, r0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r16 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r16, 0x400448cc, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000840)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000800)={&(0x7f00000005c0)=@delqdisc={0x208, 0x25, 0x405, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xe, 0xffe0}, {0xfff1, 0xf}, {0xfff3, 0xc}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x9c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x98, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x9}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x7}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x54}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0xee}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x8}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80}, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x40}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x101}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0xfe24}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x3}, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x5c101cc3}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x10001}]}]}]}}, @qdisc_kind_options=@q_red={{0x8}, {0x134, 0x2, [@TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x8001}, @TCA_RED_MARK_BLOCK={0x8, 0x6, 0x6}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x7f}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x8}}, @TCA_RED_EARLY_DROP_BLOCK={0x8, 0x5, 0x9}]}}]}, 0x208}, 0x1, 0x0, 0x0, 0x10}, 0x4040891) 22:53:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) [ 178.541277][T10049] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 22:53:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x86, 0x0, &(0x7f00000000c0)) 22:53:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) 22:53:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)={0x14, 0x1, 0x7, 0x3}, 0x14}}, 0x0) 22:53:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) 22:53:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)={0x14, 0x1, 0x7, 0x3}, 0x14}}, 0x0) [ 178.630179][T11823] loop3: detected capacity change from 0 to 2048 [ 178.663323][T11830] loop4: detected capacity change from 0 to 2048 22:53:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)={0x14, 0x1, 0x7, 0x3}, 0x14}}, 0x0) 22:53:40 executing program 0: syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000440), 0x1, 0x3b4, &(0x7f0000000480)="$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") 22:53:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)={0x14, 0x1, 0x7, 0x3}, 0x14}}, 0x0) [ 178.678501][T11835] loop2: detected capacity change from 0 to 2048 [ 178.691412][T11823] EXT4-fs (loop3): warning: checktime reached, running e2fsck is recommended [ 178.704750][T11823] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 178.718502][T11830] EXT4-fs (loop4): warning: checktime reached, running e2fsck is recommended 22:53:40 executing program 1: quotactl$Q_SETINFO(0xffffffff80000601, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x1, 0x7}) 22:53:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$eJzs3d1rW+cZAPDnyFLkONnswWDLrgyDzRAiz4mXbLCLjF2MQQKB7XqJkRWTWbaCJYfYGLawFnpTaEsvCu1NrvuR3vW2H1eF9L/oRUlIGyfUoZTicvThOLbk2LFiufHvB8d+33Ne6XkfnQ+9OucgBXBgDad/MhHHIuK1JGKwOT+JiFy9lI0422i3srxUTKckVlf/+U1Sb/Nweal4eN1jUkealV9HxKcvRxzPbI5bXVicniiXS3PN+mht5upodWHxxJWZianSVGn29Nj4+MkzfzxzercZ5tdK336xePTu63///Qdnv/v/r269+lkSZ+Noc1max24jbTQcw83XJJe+hE/4W7eD9Viyw/b/fU79YGfSXbOvsZfHsRiMvnoJAHiRpeOwVQDggEm8/wPAAdM6D/BweanYmtZODpzr1VmJvXPvrxHR38i/dX2zsSTbvGbXX78OOvAweeLKSBIRQ12IPxwR73z07/fSKbZxHTLXhZgAqf/diIhLQ8Obj//JpnsWduoP22gzvKH+PO7DANr7OB3//Knd+C+zNv6JNuOffJt991k8ff/P3OlCmI7S8d9f1t3btrIu/6ahvmbtZ/UxXy65fKVcSo9tP4+Ikcjl0/pYq3X/5hgjD3540Cn++vHf/Tf+824aP/3/uEXmTjb/5GMmJ2oTu8275d6NiN9k2+XfOv731z8ktBv/XthmjH/8+ZW3Oy1L80/zTafW2DYtJ3s01l29GfG7tuv/8R1tyZb3J47WN4fR1kbRxodfvjXQKf769Z9OafzWZ4G9kK7/ga3zH0rW369Z3XmM2zcHP+m0bHjt7HOn/Ntv/4eSf9XLh5rzrk/UanNjEYeSc5vnn2w9Mp3bqLfap/mP/Lb9/t86/iVttv9027y0zfyzd79+f8Os+4/z7/36n9zR+t9YSJKOi5qFWyvTfZ3ib5H/5y81Now72fx4ve1I8zH149+DrYeJW3SnXJo7HM++NQMAAAAAAAAAAAAAAAAAAAAAAADAzmUi4mgkmcJaOZMpFBq/4f3LGMiUK9Xa8cuV+dnJqP9W9lDkMq2vuhxc932oY83vw2/VT26on4qIX0TEm/nD9XqhWClP9jp5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGg60uH3/1Nf5R+tNvS6lwBA1/X3ugMAwJ7z/g8AB4/3fwA4eLz/A8DBczvT6x4AAHvt2T7/57veDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF5YF86fT6fVR8tLxbQ+eW1hfrpy7cRkqTpdmJkvFoqVuauFqUplqlwqFCszT3u+cqVydTxm56+P1krV2mh1YfHiTGV+tnbxyszEVOliKbcnWQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAzlQXFqcnyuXS3O4LmYhouyjb/Vj7rdAf+6Ib2yucWmmsj64+c7arT/j9vnihnk8htz+68bRCL49KAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8dPwYAAP//WQAx3w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x86, 0x0, &(0x7f00000000c0)) [ 178.733009][T11835] EXT4-fs (loop2): warning: checktime reached, running e2fsck is recommended [ 178.741657][T11849] loop0: detected capacity change from 0 to 136 [ 178.749353][T11830] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 178.751696][T11835] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 22:53:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$eJzs3d1rW+cZAPDnyFLkONnswWDLrgyDzRAiz4mXbLCLjF2MQQKB7XqJkRWTWbaCJYfYGLawFnpTaEsvCu1NrvuR3vW2H1eF9L/oRUlIGyfUoZTicvThOLbk2LFiufHvB8d+33Ne6XkfnQ+9OucgBXBgDad/MhHHIuK1JGKwOT+JiFy9lI0422i3srxUTKckVlf/+U1Sb/Nweal4eN1jUkealV9HxKcvRxzPbI5bXVicniiXS3PN+mht5upodWHxxJWZianSVGn29Nj4+MkzfzxzercZ5tdK336xePTu63///Qdnv/v/r269+lkSZ+Noc1max24jbTQcw83XJJe+hE/4W7eD9Viyw/b/fU79YGfSXbOvsZfHsRiMvnoJAHiRpeOwVQDggEm8/wPAAdM6D/BweanYmtZODpzr1VmJvXPvrxHR38i/dX2zsSTbvGbXX78OOvAweeLKSBIRQ12IPxwR73z07/fSKbZxHTLXhZgAqf/diIhLQ8Obj//JpnsWduoP22gzvKH+PO7DANr7OB3//Knd+C+zNv6JNuOffJt991k8ff/P3OlCmI7S8d9f1t3btrIu/6ahvmbtZ/UxXy65fKVcSo9tP4+Ikcjl0/pYq3X/5hgjD3540Cn++vHf/Tf+824aP/3/uEXmTjb/5GMmJ2oTu8275d6NiN9k2+XfOv731z8ktBv/XthmjH/8+ZW3Oy1L80/zTafW2DYtJ3s01l29GfG7tuv/8R1tyZb3J47WN4fR1kbRxodfvjXQKf769Z9OafzWZ4G9kK7/ga3zH0rW369Z3XmM2zcHP+m0bHjt7HOn/Ntv/4eSf9XLh5rzrk/UanNjEYeSc5vnn2w9Mp3bqLfap/mP/Lb9/t86/iVttv9027y0zfyzd79+f8Os+4/z7/36n9zR+t9YSJKOi5qFWyvTfZ3ib5H/5y81Now72fx4ve1I8zH149+DrYeJW3SnXJo7HM++NQMAAAAAAAAAAAAAAAAAAAAAAADAzmUi4mgkmcJaOZMpFBq/4f3LGMiUK9Xa8cuV+dnJqP9W9lDkMq2vuhxc932oY83vw2/VT26on4qIX0TEm/nD9XqhWClP9jp5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGg60uH3/1Nf5R+tNvS6lwBA1/X3ugMAwJ7z/g8AB4/3fwA4eLz/A8DBczvT6x4AAHvt2T7/57veDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF5YF86fT6fVR8tLxbQ+eW1hfrpy7cRkqTpdmJkvFoqVuauFqUplqlwqFCszT3u+cqVydTxm56+P1krV2mh1YfHiTGV+tnbxyszEVOliKbcnWQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAzlQXFqcnyuXS3O4LmYhouyjb/Vj7rdAf+6Ib2yucWmmsj64+c7arT/j9vnihnk8htz+68bRCL49KAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8dPwYAAP//WQAx3w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x86, 0x0, &(0x7f00000000c0)) 22:53:40 executing program 0: syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000440), 0x1, 0x3b4, &(0x7f0000000480)="$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") 22:53:40 executing program 1: quotactl$Q_SETINFO(0xffffffff80000601, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x1, 0x7}) 22:53:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x86, 0x0, &(0x7f00000000c0)) 22:53:40 executing program 1: quotactl$Q_SETINFO(0xffffffff80000601, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x1, 0x7}) [ 178.787114][ T3116] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 178.813386][T10049] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 22:53:40 executing program 1: quotactl$Q_SETINFO(0xffffffff80000601, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x1, 0x7}) [ 178.829322][ T3088] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 22:53:40 executing program 0: syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000440), 0x1, 0x3b4, &(0x7f0000000480)="$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") 22:53:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000500)={0x60, 0x2, 0x6, 0x301, 0x0, 0x7000000, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x1b}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) [ 178.860721][T11863] loop0: detected capacity change from 0 to 136 [ 178.905870][T11862] loop3: detected capacity change from 0 to 2048 [ 178.926911][T11868] loop2: detected capacity change from 0 to 2048 [ 178.931005][T11865] loop4: detected capacity change from 0 to 2048 [ 178.939665][ T9205] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 22:53:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000500)={0x60, 0x2, 0x6, 0x301, 0x0, 0x7000000, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x1b}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) 22:53:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000500)={0x60, 0x2, 0x6, 0x301, 0x0, 0x7000000, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x1b}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) 22:53:40 executing program 0: syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f0000000440), 0x1, 0x3b4, &(0x7f0000000480)="$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") [ 178.957365][T11871] loop0: detected capacity change from 0 to 136 [ 178.973066][T11862] EXT4-fs (loop3): warning: checktime reached, running e2fsck is recommended [ 178.992219][T11868] EXT4-fs (loop2): warning: checktime reached, running e2fsck is recommended 22:53:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000500)={0x60, 0x2, 0x6, 0x301, 0x0, 0x7000000, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x1b}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) [ 179.009936][T11862] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 179.012386][T11868] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 22:53:40 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000680), 0x0, 0x0) ioctl$SG_IO(r0, 0x4020940d, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 22:53:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$eJzs3d1rW+cZAPDnyFLkONnswWDLrgyDzRAiz4mXbLCLjF2MQQKB7XqJkRWTWbaCJYfYGLawFnpTaEsvCu1NrvuR3vW2H1eF9L/oRUlIGyfUoZTicvThOLbk2LFiufHvB8d+33Ne6XkfnQ+9OucgBXBgDad/MhHHIuK1JGKwOT+JiFy9lI0422i3srxUTKckVlf/+U1Sb/Nweal4eN1jUkealV9HxKcvRxzPbI5bXVicniiXS3PN+mht5upodWHxxJWZianSVGn29Nj4+MkzfzxzercZ5tdK336xePTu63///Qdnv/v/r269+lkSZ+Noc1max24jbTQcw83XJJe+hE/4W7eD9Viyw/b/fU79YGfSXbOvsZfHsRiMvnoJAHiRpeOwVQDggEm8/wPAAdM6D/BweanYmtZODpzr1VmJvXPvrxHR38i/dX2zsSTbvGbXX78OOvAweeLKSBIRQ12IPxwR73z07/fSKbZxHTLXhZgAqf/diIhLQ8Obj//JpnsWduoP22gzvKH+PO7DANr7OB3//Knd+C+zNv6JNuOffJt991k8ff/P3OlCmI7S8d9f1t3btrIu/6ahvmbtZ/UxXy65fKVcSo9tP4+Ikcjl0/pYq3X/5hgjD3540Cn++vHf/Tf+824aP/3/uEXmTjb/5GMmJ2oTu8275d6NiN9k2+XfOv731z8ktBv/XthmjH/8+ZW3Oy1L80/zTafW2DYtJ3s01l29GfG7tuv/8R1tyZb3J47WN4fR1kbRxodfvjXQKf769Z9OafzWZ4G9kK7/ga3zH0rW369Z3XmM2zcHP+m0bHjt7HOn/Ntv/4eSf9XLh5rzrk/UanNjEYeSc5vnn2w9Mp3bqLfap/mP/Lb9/t86/iVttv9027y0zfyzd79+f8Os+4/z7/36n9zR+t9YSJKOi5qFWyvTfZ3ib5H/5y81Now72fx4ve1I8zH149+DrYeJW3SnXJo7HM++NQMAAAAAAAAAAAAAAAAAAAAAAADAzmUi4mgkmcJaOZMpFBq/4f3LGMiUK9Xa8cuV+dnJqP9W9lDkMq2vuhxc932oY83vw2/VT26on4qIX0TEm/nD9XqhWClP9jp5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGg60uH3/1Nf5R+tNvS6lwBA1/X3ugMAwJ7z/g8AB4/3fwA4eLz/A8DBczvT6x4AAHvt2T7/57veDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF5YF86fT6fVR8tLxbQ+eW1hfrpy7cRkqTpdmJkvFoqVuauFqUplqlwqFCszT3u+cqVydTxm56+P1krV2mh1YfHiTGV+tnbxyszEVOliKbcnWQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAzlQXFqcnyuXS3O4LmYhouyjb/Vj7rdAf+6Ib2yucWmmsj64+c7arT/j9vnihnk8htz+68bRCL49KAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8dPwYAAP//WQAx3w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x86, 0x0, &(0x7f00000000c0)) 22:53:40 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000680), 0x0, 0x0) ioctl$SG_IO(r0, 0x4020940d, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 179.050903][T11885] loop0: detected capacity change from 0 to 136 [ 179.051574][T11865] EXT4-fs (loop4): warning: checktime reached, running e2fsck is recommended [ 179.082158][T10049] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 22:53:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x86, 0x0, &(0x7f00000000c0)) 22:53:40 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000680), 0x0, 0x0) ioctl$SG_IO(r0, 0x4020940d, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 22:53:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x86, 0x0, &(0x7f00000000c0)) 22:53:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x178, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000f8ffffff000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000f00c0000000000000000000000000000000000e60000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f767469301d0000000000000002697036746e6c30000000000000000000aa0000aaaabb0000000000000180c20000000000000000000000b8000000b8000000e80000006970000000000000000000000000000000000000000000a823c565625b8d720020000000000000007f000001ac1414000000000000000000008430d006ec3e160000000000000041554449540000bcb92dfff07fca000000466ef58f5dc8438b000000000000000800"/376]}, 0x1f0) 22:53:40 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000680), 0x0, 0x0) ioctl$SG_IO(r0, 0x4020940d, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 22:53:40 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cgroup.max.depth\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0xb) 22:53:40 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cgroup.max.depth\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0xb) [ 179.091962][T11865] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 179.115603][ T3116] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 179.133620][ T3088] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 22:53:40 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cgroup.max.depth\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0xb) 22:53:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x178, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/376]}, 0x1f0) 22:53:40 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cgroup.max.depth\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0xb) 22:53:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x178, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/376]}, 0x1f0) [ 179.243602][T11904] loop3: detected capacity change from 0 to 2048 [ 179.254294][T11906] loop4: detected capacity change from 0 to 2048 [ 179.277663][T11902] loop2: detected capacity change from 0 to 2048 22:53:40 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0x34b}) 22:53:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x178, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/376]}, 0x1f0) [ 179.294915][T11904] EXT4-fs (loop3): warning: checktime reached, running e2fsck is recommended [ 179.308206][T11906] EXT4-fs (loop4): warning: checktime reached, running e2fsck is recommended [ 179.321944][T11906] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 22:53:40 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0x34b}) 22:53:40 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0x34b}) 22:53:40 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0x34b}) 22:53:40 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0x34b}) [ 179.332232][T11904] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 179.357215][T11902] EXT4-fs (loop2): warning: checktime reached, running e2fsck is recommended [ 179.367114][T11902] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 22:53:40 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socketpair(0x2d, 0x0, 0x0, &(0x7f0000000000)) 22:53:40 executing program 2: bpf$PROG_LOAD_XDP(0x3, &(0x7f00000003c0)={0x6, 0x0, 0x0, 0x0}, 0x90) 22:53:40 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x6908, &(0x7f0000000340)={0x0, 0x0, 0x10100}, &(0x7f0000000140), &(0x7f0000000100)=0x0) syz_io_uring_setup(0x1868, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, r1, &(0x7f00000001c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x10000}) io_uring_enter(r0, 0x184c, 0x0, 0x0, 0x0, 0x0) 22:53:40 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0x34b}) 22:53:40 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0x34b}) [ 179.398432][ T3088] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 179.413679][T10049] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 22:53:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000024c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20044015, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004080800418e00000004fcff", 0x58}], 0x1) 22:53:41 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socketpair(0x2d, 0x0, 0x0, &(0x7f0000000000)) 22:53:41 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socketpair(0x2d, 0x0, 0x0, &(0x7f0000000000)) [ 179.451026][ T27] kauditd_printk_skb: 16 callbacks suppressed [ 179.451048][ T27] audit: type=1400 audit(1709938420.976:449): avc: denied { create } for pid=11932 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=mctp_socket permissive=1 [ 179.451630][ T3116] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 22:53:41 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socketpair(0x2d, 0x0, 0x0, &(0x7f0000000000)) 22:53:41 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socketpair(0x2d, 0x0, 0x0, &(0x7f0000000000)) 22:53:41 executing program 2: bpf$PROG_LOAD_XDP(0x3, &(0x7f00000003c0)={0x6, 0x0, 0x0, 0x0}, 0x90) 22:53:41 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socketpair(0x2d, 0x0, 0x0, &(0x7f0000000000)) 22:53:41 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socketpair(0x2d, 0x0, 0x0, &(0x7f0000000000)) 22:53:41 executing program 2: bpf$PROG_LOAD_XDP(0x3, &(0x7f00000003c0)={0x6, 0x0, 0x0, 0x0}, 0x90) 22:53:41 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socketpair(0x2d, 0x0, 0x0, &(0x7f0000000000)) 22:53:41 executing program 2: bpf$PROG_LOAD_XDP(0x3, &(0x7f00000003c0)={0x6, 0x0, 0x0, 0x0}, 0x90) [ 179.626395][ T27] audit: type=1400 audit(1709938421.157:450): avc: denied { create } for pid=11948 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 22:53:41 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x90) 22:53:41 executing program 2: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socketpair(0x2d, 0x0, 0x0, &(0x7f0000000000)) 22:53:41 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socketpair(0x2d, 0x0, 0x0, &(0x7f0000000000)) 22:53:41 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x90) [ 179.705689][ T27] audit: type=1400 audit(1709938421.187:451): avc: denied { write } for pid=11948 comm="syz-executor.3" path="socket:[33771]" dev="sockfs" ino=33771 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 179.730421][ T27] audit: type=1400 audit(1709938421.187:452): avc: denied { nlmsg_read } for pid=11948 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 22:53:41 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x90) 22:53:41 executing program 2: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 1: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x6908, &(0x7f0000000340)={0x0, 0x0, 0x10100}, &(0x7f0000000140), &(0x7f0000000100)=0x0) syz_io_uring_setup(0x1868, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, r1, &(0x7f00000001c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x10000}) io_uring_enter(r0, 0x184c, 0x0, 0x0, 0x0, 0x0) 22:53:41 executing program 2: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x90) 22:53:41 executing program 2: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 1: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x6908, &(0x7f0000000340)={0x0, 0x0, 0x10100}, &(0x7f0000000140), &(0x7f0000000100)=0x0) syz_io_uring_setup(0x1868, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, r1, &(0x7f00000001c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x10000}) io_uring_enter(r0, 0x184c, 0x0, 0x0, 0x0, 0x0) 22:53:41 executing program 0: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 0: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 1: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 0: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 0: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 1: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 0: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000024c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20044015, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004080800418e00000004fcff", 0x58}], 0x1) 22:53:41 executing program 0: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 1: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x6908, &(0x7f0000000340)={0x0, 0x0, 0x10100}, &(0x7f0000000140), &(0x7f0000000100)=0x0) syz_io_uring_setup(0x1868, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, r1, &(0x7f00000001c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x10000}) io_uring_enter(r0, 0x184c, 0x0, 0x0, 0x0, 0x0) 22:53:41 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x6908, &(0x7f0000000340)={0x0, 0x0, 0x10100}, &(0x7f0000000140), &(0x7f0000000100)=0x0) syz_io_uring_setup(0x1868, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, r1, &(0x7f00000001c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x10000}) io_uring_enter(r0, 0x184c, 0x0, 0x0, 0x0, 0x0) 22:53:41 executing program 1: r0 = memfd_secret(0x0) ftruncate(r0, 0x5) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x280000b, 0x4011, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000040), 0x0, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x0, &(0x7f00000000c0), 0x0, 0x4) 22:53:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000024c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20044015, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004080800418e00000004fcff", 0x58}], 0x1) 22:53:42 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000004c0)="97edbf1fbbec6eb7e3c83e1a5160a6cf", 0x10) 22:53:42 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000004c0)="97edbf1fbbec6eb7e3c83e1a5160a6cf", 0x10) 22:53:42 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000004c0)="97edbf1fbbec6eb7e3c83e1a5160a6cf", 0x10) 22:53:42 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x6908, &(0x7f0000000340)={0x0, 0x0, 0x10100}, &(0x7f0000000140), &(0x7f0000000100)=0x0) syz_io_uring_setup(0x1868, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, r1, &(0x7f00000001c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x10000}) io_uring_enter(r0, 0x184c, 0x0, 0x0, 0x0, 0x0) 22:53:42 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x6908, &(0x7f0000000340)={0x0, 0x0, 0x10100}, &(0x7f0000000140), &(0x7f0000000100)=0x0) syz_io_uring_setup(0x1868, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, r1, &(0x7f00000001c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x10000}) io_uring_enter(r0, 0x184c, 0x0, 0x0, 0x0, 0x0) 22:53:42 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000004c0)="97edbf1fbbec6eb7e3c83e1a5160a6cf", 0x10) 22:53:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:42 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') [ 180.870840][ T27] audit: type=1326 audit(1709938422.399:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12048 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc587bada9 code=0x7ffc0000 [ 180.894819][ T27] audit: type=1326 audit(1709938422.399:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12048 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc587bada9 code=0x7ffc0000 [ 180.919097][ T27] audit: type=1326 audit(1709938422.399:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12048 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=133 compat=0 ip=0x7fcc587bada9 code=0x7ffc0000 [ 180.943185][ T27] audit: type=1326 audit(1709938422.429:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12048 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc587bada9 code=0x7ffc0000 22:53:42 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 22:53:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') [ 180.967290][ T27] audit: type=1326 audit(1709938422.429:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12048 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc587bada9 code=0x7ffc0000 22:53:42 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 22:53:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') [ 181.039590][ T27] audit: type=1326 audit(1709938422.479:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12048 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=82 compat=0 ip=0x7fcc587bada9 code=0x7ffc0000 22:53:42 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 22:53:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 22:53:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:42 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000024c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20044015, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004080800418e00000004fcff", 0x58}], 0x1) 22:53:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000024c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20044015, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004080800418e00000004fcff", 0x58}], 0x1) 22:53:42 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000024c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20044015, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004080800418e00000004fcff", 0x58}], 0x1) 22:53:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000024c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20044015, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004080800418e00000004fcff", 0x58}], 0x1) 22:53:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:44 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) r2 = eventfd(0x0) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x25, 0xe7030000, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 22:53:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:44 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) r2 = eventfd(0x0) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x25, 0xe7030000, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 22:53:44 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) r2 = eventfd(0x0) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x25, 0xe7030000, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 22:53:44 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) r2 = eventfd(0x0) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x25, 0xe7030000, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 22:53:44 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) r2 = eventfd(0x0) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x25, 0xe7030000, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 22:53:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:44 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) r2 = eventfd(0x0) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x25, 0xe7030000, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 22:53:44 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) r2 = eventfd(0x0) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x25, 0xe7030000, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 22:53:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x57}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000000000009500000000000000950000000000000045432b3088755bdcaa107b1630e4bdeed667ccffef5ae52940734db95d2267143587d88c"], 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80080900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0xc4, 0x1, 0x81, 0xa1, 0x0, 0x3b3, 0x1905, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0x8}, 0xc084, 0x96, 0x3, 0x7, 0xffff, 0x0, 0x69fc, 0x0, 0x7, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2a, &(0x7f0000000a80)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @snprintf, @map_val={0x18, 0x8, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, @tail_call], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000340)=""/221, 0x41000, 0x9, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x5, 0xfffffff7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000900)=[{0x3, 0x2, 0x0, 0x3}, {0x0, 0x2, 0x8, 0xc}, {0x5, 0x5, 0xd, 0xe}, {0x4, 0x3, 0x9, 0x6}, {0x5, 0x0, 0xa, 0x4}, {0x4, 0x4, 0x7, 0x1}], 0x10, 0xfffffffa}, 0x90) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x1e, 0x1f, 0x9, 0x1, 0x0, 0x1, 0x20001, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000000000001, 0x3}, 0x57bbc2a2a7cd5a72, 0x0, 0x0, 0x3, 0x8000000000000000, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x7fffffff}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000180)='netfs_rreq\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200)=0x8, 0x806000) write$cgroup_subtree(r6, 0x0, 0x400ffc06000) 22:53:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x6, &(0x7f0000000140)={0x14, {{0x29, 0x0, 0x43000000, @remote}}}, 0x88) 22:53:45 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)='D', 0x1}], 0x1, 0x0, 0x0, 0x14) 22:53:45 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PPPOEIOCDFWD(r0, 0x5411, 0xf0ff1f00000000) 22:53:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x6, &(0x7f0000000140)={0x14, {{0x29, 0x0, 0x43000000, @remote}}}, 0x88) 22:53:45 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PPPOEIOCDFWD(r0, 0x5411, 0xf0ff1f00000000) 22:53:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x6, &(0x7f0000000140)={0x14, {{0x29, 0x0, 0x43000000, @remote}}}, 0x88) 22:53:45 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)='D', 0x1}], 0x1, 0x0, 0x0, 0x14) 22:53:45 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PPPOEIOCDFWD(r0, 0x5411, 0xf0ff1f00000000) 22:53:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x6, &(0x7f0000000140)={0x14, {{0x29, 0x0, 0x43000000, @remote}}}, 0x88) 22:53:45 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PPPOEIOCDFWD(r0, 0x5411, 0xf0ff1f00000000) 22:53:45 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)='D', 0x1}], 0x1, 0x0, 0x0, 0x14) 22:53:45 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)='D', 0x1}], 0x1, 0x0, 0x0, 0x14) 22:53:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000100)={0x6, 'batadv_slave_1\x00'}) 22:53:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xa0}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 22:53:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000100)={0x6, 'batadv_slave_1\x00'}) 22:53:45 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)='D', 0x1}], 0x1, 0x0, 0x0, 0x14) 22:53:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xa0}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 22:53:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000010000000000000002"], 0x2c}}, 0x0) 22:53:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000100)={0x6, 'batadv_slave_1\x00'}) 22:53:45 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)='D', 0x1}], 0x1, 0x0, 0x0, 0x14) 22:53:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xa0}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 22:53:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000100)={0x6, 'batadv_slave_1\x00'}) 22:53:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000010000000000000002"], 0x2c}}, 0x0) 22:53:45 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) pwritev2(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)='D', 0x1}], 0x1, 0x0, 0x0, 0x14) 22:53:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xa0}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 22:53:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 22:53:45 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_clone3(&(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_pidfd_open(r1, 0x0) pidfd_getfd(r2, r0, 0x0) 22:53:45 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_clone3(&(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_pidfd_open(r1, 0x0) pidfd_getfd(r2, r0, 0x0) 22:53:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000010000000000000002"], 0x2c}}, 0x0) 22:53:45 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_clone3(&(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_pidfd_open(r1, 0x0) pidfd_getfd(r2, r0, 0x0) 22:53:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 22:53:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 22:53:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000010000000000000002"], 0x2c}}, 0x0) 22:53:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 22:53:45 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_clone3(&(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_pidfd_open(r1, 0x0) pidfd_getfd(r2, r0, 0x0) 22:53:45 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_clone3(&(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_pidfd_open(r1, 0x0) pidfd_getfd(r2, r0, 0x0) 22:53:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 22:53:45 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_clone3(&(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_pidfd_open(r1, 0x0) pidfd_getfd(r2, r0, 0x0) 22:53:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 22:53:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 22:53:45 executing program 0: r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) r1 = socket(0x2, 0x80805, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = dup2(r1, r1) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000240)={r3}, 0x8) 22:53:45 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_clone3(&(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_pidfd_open(r1, 0x0) pidfd_getfd(r2, r0, 0x0) 22:53:45 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_clone3(&(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_pidfd_open(r1, 0x0) pidfd_getfd(r2, r0, 0x0) 22:53:45 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000009c0)=ANY=[], 0xc8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f0000000080)={0x1d, r4}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8003, 0x0) 22:53:45 executing program 0: r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) r1 = socket(0x2, 0x80805, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = dup2(r1, r1) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000240)={r3}, 0x8) 22:53:45 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_clone3(&(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_pidfd_open(r1, 0x0) pidfd_getfd(r2, r0, 0x0) 22:53:45 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_clone3(&(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_pidfd_open(r1, 0x0) pidfd_getfd(r2, r0, 0x0) 22:53:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1) 22:53:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x12, 0x9c}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 22:53:45 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000009c0)=ANY=[], 0xc8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f0000000080)={0x1d, r4}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8003, 0x0) 22:53:45 executing program 0: r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) r1 = socket(0x2, 0x80805, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = dup2(r1, r1) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000240)={r3}, 0x8) 22:53:45 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000009c0)=ANY=[], 0xc8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f0000000080)={0x1d, r4}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8003, 0x0) 22:53:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1) 22:53:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x12, 0x9c}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 22:53:45 executing program 0: r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) r1 = socket(0x2, 0x80805, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = dup2(r1, r1) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000240)={r3}, 0x8) 22:53:45 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000009c0)=ANY=[], 0xc8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f0000000080)={0x1d, r4}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8003, 0x0) 22:53:45 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000009c0)=ANY=[], 0xc8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f0000000080)={0x1d, r4}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8003, 0x0) 22:53:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1) 22:53:45 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000009c0)=ANY=[], 0xc8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f0000000080)={0x1d, r4}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8003, 0x0) 22:53:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x12, 0x9c}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 22:53:45 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000009c0)=ANY=[], 0xc8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f0000000080)={0x1d, r4}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8003, 0x0) 22:53:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1) 22:53:45 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000009c0)=ANY=[], 0xc8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f0000000080)={0x1d, r4}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8003, 0x0) 22:53:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x12, 0x9c}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 22:53:45 executing program 1: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x4) r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000140)={0x77359400}}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24fa, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000140)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}) io_uring_enter(r0, 0x4866, 0x0, 0x0, 0x0, 0x0) 22:53:45 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000009c0)=ANY=[], 0xc8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f0000000080)={0x1d, r4}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8003, 0x0) 22:53:45 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:45 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000009c0)=ANY=[], 0xc8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f0000000080)={0x1d, r4}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8003, 0x0) 22:53:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffd000), &(0x7f0000ffd000)) 22:53:45 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:45 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:45 executing program 1: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x4) r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000140)={0x77359400}}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24fa, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000140)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}) io_uring_enter(r0, 0x4866, 0x0, 0x0, 0x0, 0x0) 22:53:45 executing program 0: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x4) r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000140)={0x77359400}}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24fa, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000140)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}) io_uring_enter(r0, 0x4866, 0x0, 0x0, 0x0, 0x0) 22:53:45 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:45 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:45 executing program 0: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x4) r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000140)={0x77359400}}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24fa, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000140)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}) io_uring_enter(r0, 0x4866, 0x0, 0x0, 0x0, 0x0) 22:53:45 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:45 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:46 executing program 1: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x4) r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000140)={0x77359400}}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24fa, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000140)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}) io_uring_enter(r0, 0x4866, 0x0, 0x0, 0x0, 0x0) 22:53:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffd000), &(0x7f0000ffd000)) 22:53:46 executing program 0: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x4) r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000140)={0x77359400}}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24fa, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000140)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}) io_uring_enter(r0, 0x4866, 0x0, 0x0, 0x0, 0x0) 22:53:46 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:46 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:46 executing program 1: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x3, 0x4) r0 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000140)={0x77359400}}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x24fa, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000140)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}) io_uring_enter(r0, 0x4866, 0x0, 0x0, 0x0, 0x0) 22:53:46 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) 22:53:46 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:46 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:46 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 22:53:46 executing program 2: ioperm(0x0, 0x7, 0x16) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x746b134e09cc0245) 22:53:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) 22:53:46 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3e, &(0x7f0000001040)=0xfffffbfd, 0x4) 22:53:46 executing program 1: r0 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) shmdt(r0) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) 22:53:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffd000), &(0x7f0000ffd000)) 22:53:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) 22:53:46 executing program 2: ioperm(0x0, 0x7, 0x16) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x746b134e09cc0245) 22:53:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) 22:53:46 executing program 1: r0 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) shmdt(r0) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) 22:53:46 executing program 2: ioperm(0x0, 0x7, 0x16) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x746b134e09cc0245) 22:53:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffb}, 0x48) 22:53:46 executing program 2: ioperm(0x0, 0x7, 0x16) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x746b134e09cc0245) 22:53:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffb}, 0x48) 22:53:46 executing program 1: r0 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) shmdt(r0) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) 22:53:46 executing program 1: r0 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) shmdt(r0) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x5000) 22:53:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffb}, 0x48) 22:53:46 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="30000000101401000000000000000000080003000100000008004a000000000008004b0013090000080001"], 0x30}}, 0x0) 22:53:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffd000), &(0x7f0000ffd000)) 22:53:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffb}, 0x48) 22:53:46 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="30000000101401000000000000000000080003000100000008004a000000000008004b0013090000080001"], 0x30}}, 0x0) 22:53:46 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)) 22:53:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x41) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000002c0)) 22:53:46 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="30000000101401000000000000000000080003000100000008004a000000000008004b0013090000080001"], 0x30}}, 0x0) 22:53:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x41) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000002c0)) 22:53:46 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)) 22:53:46 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="30000000101401000000000000000000080003000100000008004a000000000008004b0013090000080001"], 0x30}}, 0x0) 22:53:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x41) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000002c0)) [ 184.839608][ T27] kauditd_printk_skb: 46 callbacks suppressed [ 184.839624][ T27] audit: type=1400 audit(1709938426.375:505): avc: denied { getopt } for pid=12380 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 22:53:46 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)) 22:53:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x41) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000002c0)) 22:53:46 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) 22:53:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x41) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000002c0)) 22:53:46 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)) 22:53:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x41) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000002c0)) 22:53:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 22:53:47 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) 22:53:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x2, 0xa, 0x0, 0x3, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1, 0x0, 0xf9b04e73d6f7b2eb}]}, 0x38}}, 0x0) 22:53:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x41) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000002c0)) 22:53:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 22:53:47 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3e, &(0x7f0000001040)=0xfffffbfd, 0x4) 22:53:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x2, 0xa, 0x0, 0x3, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1, 0x0, 0xf9b04e73d6f7b2eb}]}, 0x38}}, 0x0) 22:53:47 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) 22:53:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 22:53:47 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) 22:53:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3e, &(0x7f0000001040)=0xfffffbfd, 0x4) 22:53:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 22:53:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 22:53:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x2, 0xa, 0x0, 0x3, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1, 0x0, 0xf9b04e73d6f7b2eb}]}, 0x38}}, 0x0) 22:53:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 22:53:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)={0x48, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8}]}, 0x48}}, 0x0) 22:53:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x2, 0xa, 0x0, 0x3, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1, 0x0, 0xf9b04e73d6f7b2eb}]}, 0x38}}, 0x0) 22:53:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x47) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x3c) setsockopt$inet6_tcp_int(r0, 0x11a, 0x1, &(0x7f0000000000), 0x4) 22:53:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)={0x48, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8}]}, 0x48}}, 0x0) 22:53:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 22:53:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x47) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x3c) setsockopt$inet6_tcp_int(r0, 0x11a, 0x1, &(0x7f0000000000), 0x4) 22:53:47 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETDEVINFO(r0, 0x801c581f, 0x0) 22:53:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)={0x48, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8}]}, 0x48}}, 0x0) 22:53:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x47) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x3c) setsockopt$inet6_tcp_int(r0, 0x11a, 0x1, &(0x7f0000000000), 0x4) 22:53:47 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETDEVINFO(r0, 0x801c581f, 0x0) 22:53:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)={0x48, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8}]}, 0x48}}, 0x0) 22:53:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x47) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x3c) setsockopt$inet6_tcp_int(r0, 0x11a, 0x1, &(0x7f0000000000), 0x4) 22:53:47 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETDEVINFO(r0, 0x801c581f, 0x0) 22:53:47 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETDEVINFO(r0, 0x801c581f, 0x0) 22:53:47 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETDEVINFO(r0, 0x801c581f, 0x0) 22:53:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bcc1ae1c25f1aa2c1f561ac887ec526ed8eff6"}) 22:53:47 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="71756f74612c00a35c5e37ece04e206d531145b674157292002380445b2316653ddbfaaa55d92246c056c531ae9ee84e509ef01086be6402d9a2c301000000000000006182581f1e1aad4c51675af09b429dd5358788cdeb542786bfe038144504000f1ee4c8bec9b4fc4398f1ad4412456734a17b3829766c988d77bfd68e2f7835ee8fb85170205b9633741eac154608629cc8797636390fafcf55f7cd59376dc504a26d48b1ddf2a29f870ffd1185ec89c16298ca820279fb2876c85559b3b250118ccc2bd520d717bdd788356ca6b70245a1665e64d7fe2f08224f3c1da38e7624e2631051b9307b9eb73e17a8ab2a872c41026d779dad000093c67aecb55973b5a00493d75df375c532ec7c598d88960957a3cd5e15fd69c1294ffb49936c97ed8fddcf0b23a42eb49302aca87580e5b511c4941ae55f3f34f4a633cf64127e67b7b971a29b13782b4c204d79d780c9b0127362f634e4f3981a48749a31bad9d6d02fc433798d37661f7a8046d66dd762305f8c14df600b086086af8efc2f37e7942b97a19dc19385fbb7c78f7ce6b6b34fe99e669adcb0f000d003bc4cbd26618755ebb3e0cc550f183fc3ad0831e7a9336148bec6249eebdde43fbd442360b651654ee52bd13f412f788a4fa8f578a61bed2ddc39e40a7648cdad36043f84d67529d452b7fbcebaa8cd10fdcdde231c013abf2fe0ade5ae1c360632532c10d24289095a1562943524c406089c5f4542dfd592973b43f3a2ff4143d35d3e14fa42fd4514146520df83162de77bf0b9e78c3edeb56d49e2ebf75833a0f12bc1548717fb1262378d45c37bef3bed17ae8ce243556e1ea378472ae88a9ca69ee59eaa01d68b916214705b41ea2cfe778568b46110ebd6c8339f944fad22b0364122d4337e75aac9d0759dd2efcaa0f93027246d611b766cbabf7814a4cabd5e21045369c75d2c9f5c910a5dcbdc7e19a91bbd2477fd5fbd0aeefd131eedd5d8a0df4645c16a768607bf"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:47 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETDEVINFO(r0, 0x801c581f, 0x0) 22:53:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bcc1ae1c25f1aa2c1f561ac887ec526ed8eff6"}) 22:53:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bcc1ae1c25f1aa2c1f561ac887ec526ed8eff6"}) 22:53:47 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETDEVINFO(r0, 0x801c581f, 0x0) 22:53:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bcc1ae1c25f1aa2c1f561ac887ec526ed8eff6"}) [ 185.751830][T12471] loop3: detected capacity change from 0 to 2048 [ 185.777072][T12471] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 185.786870][T12471] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 185.816658][T12471] EXT4-fs (loop3): failed to initialize system zone (-117) [ 185.823993][T12471] EXT4-fs (loop3): mount failed [ 185.847777][T12471] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 185.856826][T12471] __nla_validate_parse: 41 callbacks suppressed [ 185.856837][T12471] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 185.876763][T12471] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12471 comm=syz-executor.3 [ 185.890585][ T27] audit: type=1400 audit(1709938427.437:506): avc: denied { create } for pid=12470 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 185.910628][ T27] audit: type=1400 audit(1709938427.437:507): avc: denied { ioctl } for pid=12470 comm="syz-executor.3" path="socket:[35662]" dev="sockfs" ino=35662 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 22:53:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bcc1ae1c25f1aa2c1f561ac887ec526ed8eff6"}) 22:53:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bcc1ae1c25f1aa2c1f561ac887ec526ed8eff6"}) 22:53:47 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:47 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3e, &(0x7f0000001040)=0xfffffbfd, 0x4) 22:53:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bcc1ae1c25f1aa2c1f561ac887ec526ed8eff6"}) 22:53:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3e, &(0x7f0000001040)=0xfffffbfd, 0x4) 22:53:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bcc1ae1c25f1aa2c1f561ac887ec526ed8eff6"}) 22:53:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bcc1ae1c25f1aa2c1f561ac887ec526ed8eff6"}) 22:53:47 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00n\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "bcc1ae1c25f1aa2c1f561ac887ec526ed8eff6"}) [ 186.353669][T12489] loop3: detected capacity change from 0 to 2048 [ 186.379148][T12489] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 186.389087][T12489] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 22:53:47 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 186.419125][T12500] loop1: detected capacity change from 0 to 2048 [ 186.426664][T12489] EXT4-fs (loop3): failed to initialize system zone (-117) [ 186.437067][T12500] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 186.443952][T12489] EXT4-fs (loop3): mount failed [ 186.446999][T12500] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 186.465983][T12500] EXT4-fs (loop1): failed to initialize system zone (-117) [ 186.473956][T12500] EXT4-fs (loop1): mount failed [ 186.482882][T12506] loop0: detected capacity change from 0 to 2048 [ 186.491380][T12506] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 186.501171][T12506] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 186.512534][T12506] EXT4-fs (loop0): failed to initialize system zone (-117) [ 186.519768][T12506] EXT4-fs (loop0): mount failed [ 186.537262][T12489] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 186.549208][T12489] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 186.553909][T12500] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 22:53:48 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="71756f74612c00a35c5e37ece04e206d531145b674157292002380445b2316653ddbfaaa55d92246c056c531ae9ee84e509ef01086be6402d9a2c301000000000000006182581f1e1aad4c51675af09b429dd5358788cdeb542786bfe038144504000f1ee4c8bec9b4fc4398f1ad4412456734a17b3829766c988d77bfd68e2f7835ee8fb85170205b9633741eac154608629cc8797636390fafcf55f7cd59376dc504a26d48b1ddf2a29f870ffd1185ec89c16298ca820279fb2876c85559b3b250118ccc2bd520d717bdd788356ca6b70245a1665e64d7fe2f08224f3c1da38e7624e2631051b9307b9eb73e17a8ab2a872c41026d779dad000093c67aecb55973b5a00493d75df375c532ec7c598d88960957a3cd5e15fd69c1294ffb49936c97ed8fddcf0b23a42eb49302aca87580e5b511c4941ae55f3f34f4a633cf64127e67b7b971a29b13782b4c204d79d780c9b0127362f634e4f3981a48749a31bad9d6d02fc433798d37661f7a8046d66dd762305f8c14df600b086086af8efc2f37e7942b97a19dc19385fbb7c78f7ce6b6b34fe99e669adcb0f000d003bc4cbd26618755ebb3e0cc550f183fc3ad0831e7a9336148bec6249eebdde43fbd442360b651654ee52bd13f412f788a4fa8f578a61bed2ddc39e40a7648cdad36043f84d67529d452b7fbcebaa8cd10fdcdde231c013abf2fe0ade5ae1c360632532c10d24289095a1562943524c406089c5f4542dfd592973b43f3a2ff4143d35d3e14fa42fd4514146520df83162de77bf0b9e78c3edeb56d49e2ebf75833a0f12bc1548717fb1262378d45c37bef3bed17ae8ce243556e1ea378472ae88a9ca69ee59eaa01d68b916214705b41ea2cfe778568b46110ebd6c8339f944fad22b0364122d4337e75aac9d0759dd2efcaa0f93027246d611b766cbabf7814a4cabd5e21045369c75d2c9f5c910a5dcbdc7e19a91bbd2477fd5fbd0aeefd131eedd5d8a0df4645c16a768607bf"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 186.560804][T12489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12489 comm=syz-executor.3 [ 186.575171][T12500] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 186.607035][T12500] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12500 comm=syz-executor.1 22:53:48 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 186.620306][T12506] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 186.649567][T12513] loop1: detected capacity change from 0 to 2048 [ 186.649795][T12511] loop3: detected capacity change from 0 to 2048 [ 186.658537][T12506] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 186.679368][T12511] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 186.680327][T12506] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12506 comm=syz-executor.0 [ 186.689125][T12511] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 22:53:48 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 186.713933][T12513] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 186.723739][T12513] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 186.732492][T12511] EXT4-fs (loop3): failed to initialize system zone (-117) [ 186.742560][T12511] EXT4-fs (loop3): mount failed [ 186.750219][T12513] EXT4-fs (loop1): failed to initialize system zone (-117) [ 186.757691][T12513] EXT4-fs (loop1): mount failed [ 186.761604][T12517] loop0: detected capacity change from 0 to 2048 [ 186.772039][T12517] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 186.781874][T12517] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 186.793457][T12517] EXT4-fs (loop0): failed to initialize system zone (-117) [ 186.800792][T12517] EXT4-fs (loop0): mount failed [ 186.827527][T12511] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 186.840094][T12513] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 186.841140][T12511] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 186.849920][T12513] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 186.873377][T12517] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 186.879102][T12511] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12511 comm=syz-executor.3 [ 186.892369][T12517] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 186.904654][T12513] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12513 comm=syz-executor.1 22:53:48 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="000226bd7000fedbdf25410000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:48 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="71756f74612c00a35c5e37ece04e206d531145b674157292002380445b2316653ddbfaaa55d92246c056c531ae9ee84e509ef01086be6402d9a2c301000000000000006182581f1e1aad4c51675af09b429dd5358788cdeb542786bfe038144504000f1ee4c8bec9b4fc4398f1ad4412456734a17b3829766c988d77bfd68e2f7835ee8fb85170205b9633741eac154608629cc8797636390fafcf55f7cd59376dc504a26d48b1ddf2a29f870ffd1185ec89c16298ca820279fb2876c85559b3b250118ccc2bd520d717bdd788356ca6b70245a1665e64d7fe2f08224f3c1da38e7624e2631051b9307b9eb73e17a8ab2a872c41026d779dad000093c67aecb55973b5a00493d75df375c532ec7c598d88960957a3cd5e15fd69c1294ffb49936c97ed8fddcf0b23a42eb49302aca87580e5b511c4941ae55f3f34f4a633cf64127e67b7b971a29b13782b4c204d79d780c9b0127362f634e4f3981a48749a31bad9d6d02fc433798d37661f7a8046d66dd762305f8c14df600b086086af8efc2f37e7942b97a19dc19385fbb7c78f7ce6b6b34fe99e669adcb0f000d003bc4cbd26618755ebb3e0cc550f183fc3ad0831e7a9336148bec6249eebdde43fbd442360b651654ee52bd13f412f788a4fa8f578a61bed2ddc39e40a7648cdad36043f84d67529d452b7fbcebaa8cd10fdcdde231c013abf2fe0ade5ae1c360632532c10d24289095a1562943524c406089c5f4542dfd592973b43f3a2ff4143d35d3e14fa42fd4514146520df83162de77bf0b9e78c3edeb56d49e2ebf75833a0f12bc1548717fb1262378d45c37bef3bed17ae8ce243556e1ea378472ae88a9ca69ee59eaa01d68b916214705b41ea2cfe778568b46110ebd6c8339f944fad22b0364122d4337e75aac9d0759dd2efcaa0f93027246d611b766cbabf7814a4cabd5e21045369c75d2c9f5c910a5dcbdc7e19a91bbd2477fd5fbd0aeefd131eedd5d8a0df4645c16a768607bf"], 0x1, 0x78b, &(0x7f0000000800)="$eJzs3c1rXFUbAPDnTvPRN+37JoUXtCIYEDRQOjE1tgouKi5EsVDQte04mYaaSaZkJqUJAS0quBFUXAi66dqPunPrx1Y3/g2CpaVqWqy40MidzDTTZpJM0mSmNb8f3OSce8/MOc+c+3Hu3MvcAHaswfRPJmJ/RLyXRPTX5icR0V1NdUUcXSp3Y2E+n05JLC6+9GtSLXN9YT4fDa9J7all7o+Ib9+OOJBZWW95dm4iVywWpmv54crkmeHy7NzB05O58cJ4YerwyOjooSNPHDm8dbH+/sPc3ivvP/foF0f/fPO+i+9+l8TR2Ftb1hjHVhmMwdpn0p1+hLd4dqsr67Ck0w1g05KlrTz2R3/sqqYAgH+z1yNiEQDYYRLHfwDYYerfA1xfmM/Xp85+I9FeV5+JiN1L8devby4t6apds9tdvQ7adz255cpIEhEDW1D/YER88tUrn6VTbNN1SIBm3jgfEScHBlfu/5MV9yxs1GMtlBm8LW//B+3zdTr+ebLZ+C9zc/wTTcY/vU223c1Yf/vPXN6CalaVjv+ebri37UZD/DUDu2q5/1bHfN3JqdPFQrpv+19EDEV3b5ofWaOOoWt/XVttWeP477cPXvs0rT/9v1wic7mr99bXjOUquTuJudHV8xEPdDWLP7nZ/8kq49/j67z33z9eejX9//xT73y8Wpk0/jTe+rQy/u21eCHikab9v3xHW7Lm/YnD1dVhuL5SNPHlTx/17Ss1X9bY/+mU1l8/F2iHtP/71og/PxoDSeP9muWN1/H9hf5vVlu2fvzN1/+e5OVquqc271yuUpkeiehJXlw5/9Dya+v5evk0/qGHm2//a63/6TnhyRbj77ryy+ebj397pfGPrb3+39b/G09cvDGxa7X6W+v/0WpqqDanlf1fqw28k88OAAAAAAAAAAAAAAAAAAAAAAAAAFqViYi9kWSyN9OZTDbbU32G9/+jL1MslSsHTpVmpsai+qzsgejO1H/qsr/h91BHar+HX88fui3/eETsi4gPe/9TzWfzpeJYp4MHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgJo9TZ//v7TsUm+nWwcAbJvdnW4AANB26xz/H3zh57fa1RQAoE2c/wPAzuP4DwA7z6aP/3MPbW1DAIC2cf4PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADANjt+7Fg6Lf6xMJ9P82NnZ2cmSmcPjhXKE9nJmXw2X5o+kx0vlcaLhWy+NLne+xVLpTOjMTVzbrhSKFeGy7NzJyZLM1OVE6cnc+OFE4XutkQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABtTnp2byBWLhWmJlYnM3dGMFhJxdzRD4h5P9C/P6fSeCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODe8E8AAAD//xJ5L6Q=") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:48 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 186.913364][T12517] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12517 comm=syz-executor.0 [ 186.959486][T12520] loop3: detected capacity change from 0 to 2048 [ 186.969452][T12522] loop1: detected capacity change from 0 to 2048 [ 186.977796][T12520] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 186.984981][T12524] loop0: detected capacity change from 0 to 2048 [ 186.987607][T12520] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.008933][T12522] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.018749][T12522] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.019523][T12524] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.039392][T12524] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.040137][T12520] EXT4-fs (loop3): failed to initialize system zone (-117) [ 187.054009][T12522] EXT4-fs (loop1): failed to initialize system zone (-117) [ 187.057623][T12520] EXT4-fs (loop3): mount failed [ 187.068875][T12524] EXT4-fs (loop0): failed to initialize system zone (-117) [ 187.069647][T12522] EXT4-fs (loop1): mount failed [ 187.077257][T12524] EXT4-fs (loop0): mount failed 22:53:48 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3e, &(0x7f0000001040)=0xfffffbfd, 0x4) [ 187.154417][T12524] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 187.158235][T12522] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 187.168132][T12524] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 187.171646][T12520] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 187.185172][T12524] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12524 comm=syz-executor.0 22:53:48 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3e, &(0x7f0000001040)=0xfffffbfd, 0x4) 22:53:48 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 187.210524][T12522] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 187.235592][T12520] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 187.237624][T12522] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12522 comm=syz-executor.1 22:53:48 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$eJzs3c1rXFUbAPDnTvPRN+37JoUXtCIYEDRQOjE1tgouKi5EsVDQte04mYaaSaZkJqUJAS0quBFUXAi66dqPunPrx1Y3/g2CpaVqWqy40MidzDTTZpJM0mSmNb8f3OSce8/MOc+c+3Hu3MvcAHaswfRPJmJ/RLyXRPTX5icR0V1NdUUcXSp3Y2E+n05JLC6+9GtSLXN9YT4fDa9J7all7o+Ib9+OOJBZWW95dm4iVywWpmv54crkmeHy7NzB05O58cJ4YerwyOjooSNPHDm8dbH+/sPc3ivvP/foF0f/fPO+i+9+l8TR2Ftb1hjHVhmMwdpn0p1+hLd4dqsr67Ck0w1g05KlrTz2R3/sqqYAgH+z1yNiEQDYYRLHfwDYYerfA1xfmM/Xp85+I9FeV5+JiN1L8devby4t6apds9tdvQ7adz255cpIEhEDW1D/YER88tUrn6VTbNN1SIBm3jgfEScHBlfu/5MV9yxs1GMtlBm8LW//B+3zdTr+ebLZ+C9zc/wTTcY/vU223c1Yf/vPXN6CalaVjv+ebri37UZD/DUDu2q5/1bHfN3JqdPFQrpv+19EDEV3b5ofWaOOoWt/XVttWeP477cPXvs0rT/9v1wic7mr99bXjOUquTuJudHV8xEPdDWLP7nZ/8kq49/j67z33z9eejX9//xT73y8Wpk0/jTe+rQy/u21eCHikab9v3xHW7Lm/YnD1dVhuL5SNPHlTx/17Ss1X9bY/+mU1l8/F2iHtP/71og/PxoDSeP9muWN1/H9hf5vVlu2fvzN1/+e5OVquqc271yuUpkeiehJXlw5/9Dya+v5evk0/qGHm2//a63/6TnhyRbj77ryy+ebj397pfGPrb3+39b/G09cvDGxa7X6W+v/0WpqqDanlf1fqw28k88OAAAAAAAAAAAAAAAAAAAAAAAAAFqViYi9kWSyN9OZTDbbU32G9/+jL1MslSsHTpVmpsai+qzsgejO1H/qsr/h91BHar+HX88fui3/eETsi4gPe/9TzWfzpeJYp4MHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgJo9TZ//v7TsUm+nWwcAbJvdnW4AANB26xz/H3zh57fa1RQAoE2c/wPAzuP4DwA7z6aP/3MPbW1DAIC2cf4PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADANjt+7Fg6Lf6xMJ9P82NnZ2cmSmcPjhXKE9nJmXw2X5o+kx0vlcaLhWy+NLne+xVLpTOjMTVzbrhSKFeGy7NzJyZLM1OVE6cnc+OFE4XutkQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABtTnp2byBWLhWmJlYnM3dGMFhJxdzRD4h5P9C/P6fSeCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODe8E8AAAD//xJ5L6Q=") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 187.246229][T12520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12520 comm=syz-executor.3 [ 187.299210][T12534] loop0: detected capacity change from 0 to 2048 22:53:48 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 187.311371][T12534] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.321174][T12534] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.340851][T12537] loop1: detected capacity change from 0 to 2048 [ 187.347574][T12534] EXT4-fs (loop0): failed to initialize system zone (-117) [ 187.353152][T12539] loop3: detected capacity change from 0 to 2048 [ 187.374443][T12539] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.378669][T12534] EXT4-fs (loop0): mount failed [ 187.384230][T12539] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.404781][T12537] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.409064][T12539] EXT4-fs (loop3): failed to initialize system zone (-117) 22:53:49 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 187.414538][T12537] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.423402][T12539] EXT4-fs (loop3): mount failed [ 187.434478][T12537] EXT4-fs (loop1): failed to initialize system zone (-117) [ 187.444746][T12537] EXT4-fs (loop1): mount failed 22:53:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:49 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 187.494958][T12544] loop0: detected capacity change from 0 to 2048 [ 187.514735][T12544] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.524694][T12544] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.544859][T12544] EXT4-fs (loop0): failed to initialize system zone (-117) [ 187.552348][T12544] EXT4-fs (loop0): mount failed [ 187.567134][T12549] loop1: detected capacity change from 0 to 2048 [ 187.567778][T12548] loop3: detected capacity change from 0 to 2048 [ 187.580826][T12549] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:53:49 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$eJzs3c1rXFUbAPDnTvPRN+37JoUXtCIYEDRQOjE1tgouKi5EsVDQte04mYaaSaZkJqUJAS0quBFUXAi66dqPunPrx1Y3/g2CpaVqWqy40MidzDTTZpJM0mSmNb8f3OSce8/MOc+c+3Hu3MvcAHaswfRPJmJ/RLyXRPTX5icR0V1NdUUcXSp3Y2E+n05JLC6+9GtSLXN9YT4fDa9J7all7o+Ib9+OOJBZWW95dm4iVywWpmv54crkmeHy7NzB05O58cJ4YerwyOjooSNPHDm8dbH+/sPc3ivvP/foF0f/fPO+i+9+l8TR2Ftb1hjHVhmMwdpn0p1+hLd4dqsr67Ck0w1g05KlrTz2R3/sqqYAgH+z1yNiEQDYYRLHfwDYYerfA1xfmM/Xp85+I9FeV5+JiN1L8devby4t6apds9tdvQ7adz255cpIEhEDW1D/YER88tUrn6VTbNN1SIBm3jgfEScHBlfu/5MV9yxs1GMtlBm8LW//B+3zdTr+ebLZ+C9zc/wTTcY/vU223c1Yf/vPXN6CalaVjv+ebri37UZD/DUDu2q5/1bHfN3JqdPFQrpv+19EDEV3b5ofWaOOoWt/XVttWeP477cPXvs0rT/9v1wic7mr99bXjOUquTuJudHV8xEPdDWLP7nZ/8kq49/j67z33z9eejX9//xT73y8Wpk0/jTe+rQy/u21eCHikab9v3xHW7Lm/YnD1dVhuL5SNPHlTx/17Ss1X9bY/+mU1l8/F2iHtP/71og/PxoDSeP9muWN1/H9hf5vVlu2fvzN1/+e5OVquqc271yuUpkeiehJXlw5/9Dya+v5evk0/qGHm2//a63/6TnhyRbj77ryy+ebj397pfGPrb3+39b/G09cvDGxa7X6W+v/0WpqqDanlf1fqw28k88OAAAAAAAAAAAAAAAAAAAAAAAAAFqViYi9kWSyN9OZTDbbU32G9/+jL1MslSsHTpVmpsai+qzsgejO1H/qsr/h91BHar+HX88fui3/eETsi4gPe/9TzWfzpeJYp4MHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgJo9TZ//v7TsUm+nWwcAbJvdnW4AANB26xz/H3zh57fa1RQAoE2c/wPAzuP4DwA7z6aP/3MPbW1DAIC2cf4PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADANjt+7Fg6Lf6xMJ9P82NnZ2cmSmcPjhXKE9nJmXw2X5o+kx0vlcaLhWy+NLne+xVLpTOjMTVzbrhSKFeGy7NzJyZLM1OVE6cnc+OFE4XutkQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABtTnp2byBWLhWmJlYnM3dGMFhJxdzRD4h5P9C/P6fSeCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODe8E8AAAD//xJ5L6Q=") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 187.590684][T12549] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.604514][T12548] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.614372][T12548] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.626921][T12548] EXT4-fs (loop3): failed to initialize system zone (-117) [ 187.627939][T12549] EXT4-fs (loop1): failed to initialize system zone (-117) [ 187.634378][T12548] EXT4-fs (loop3): mount failed [ 187.645236][T12549] EXT4-fs (loop1): mount failed [ 187.658003][T12551] loop0: detected capacity change from 0 to 2048 [ 187.666090][T12551] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.675864][T12551] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 22:53:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="71756f74612c00a35c5e37ece04e206d531145b674157292002380445b2316653ddbfaaa55d92246c056c531ae9ee84e509ef01086be6402d9a2c301000000000000006182581f1e1aad4c51675af09b429dd5358788cdeb542786bfe038144504000f1ee4c8bec9b4fc4398f1ad4412456734a17b3829766c988d77bfd68e2f7835ee8fb85170205b9633741eac154608629cc8797636390fafcf55f7cd59376dc504a26d48b1ddf2a29f870ffd1185ec89c16298ca820279fb2876c85559b3b250118ccc2bd520d717bdd788356ca6b70245a1665e64d7fe2f08224f3c1da38e7624e2631051b9307b9eb73e17a8ab2a872c41026d779dad000093c67aecb55973b5a00493d75df375c532ec7c598d88960957a3cd5e15fd69c1294ffb49936c97ed8fddcf0b23a42eb49302aca87580e5b511c4941ae55f3f34f4a633cf64127e67b7b971a29b13782b4c204d79d780c9b0127362f634e4f3981a48749a31bad9d6d02fc433798d37661f7a8046d66dd762305f8c14df600b086086af8efc2f37e7942b97a19dc19385fbb7c78f7ce6b6b34fe99e669adcb0f000d003bc4cbd26618755ebb3e0cc550f183fc3ad0831e7a9336148bec6249eebdde43fbd442360b651654ee52bd13f412f788a4fa8f578a61bed2ddc39e40a7648cdad36043f84d67529d452b7fbcebaa8cd10fdcdde231c013abf2fe0ade5ae1c360632532c10d24289095a1562943524c406089c5f4542dfd592973b43f3a2ff4143d35d3e14fa42fd4514146520df83162de77bf0b9e78c3edeb56d49e2ebf75833a0f12bc1548717fb1262378d45c37bef3bed17ae8ce243556e1ea378472ae88a9ca69ee59eaa01d68b916214705b41ea2cfe778568b46110ebd6c8339f944fad22b0364122d4337e75aac9d0759dd2efcaa0f93027246d611b766cbabf7814a4cabd5e21045369c75d2c9f5c910a5dcbdc7e19a91bbd2477fd5fbd0aeefd131eedd5d8a0df4645c16a768607bf"], 0x1, 0x78b, &(0x7f0000000800)="$eJzs3c1rXFUbAPDnTvPRN+37JoUXtCIYEDRQOjE1tgouKi5EsVDQte04mYaaSaZkJqUJAS0quBFUXAi66dqPunPrx1Y3/g2CpaVqWqy40MidzDTTZpJM0mSmNb8f3OSce8/MOc+c+3Hu3MvcAHaswfRPJmJ/RLyXRPTX5icR0V1NdUUcXSp3Y2E+n05JLC6+9GtSLXN9YT4fDa9J7all7o+Ib9+OOJBZWW95dm4iVywWpmv54crkmeHy7NzB05O58cJ4YerwyOjooSNPHDm8dbH+/sPc3ivvP/foF0f/fPO+i+9+l8TR2Ftb1hjHVhmMwdpn0p1+hLd4dqsr67Ck0w1g05KlrTz2R3/sqqYAgH+z1yNiEQDYYRLHfwDYYerfA1xfmM/Xp85+I9FeV5+JiN1L8devby4t6apds9tdvQ7adz255cpIEhEDW1D/YER88tUrn6VTbNN1SIBm3jgfEScHBlfu/5MV9yxs1GMtlBm8LW//B+3zdTr+ebLZ+C9zc/wTTcY/vU223c1Yf/vPXN6CalaVjv+ebri37UZD/DUDu2q5/1bHfN3JqdPFQrpv+19EDEV3b5ofWaOOoWt/XVttWeP477cPXvs0rT/9v1wic7mr99bXjOUquTuJudHV8xEPdDWLP7nZ/8kq49/j67z33z9eejX9//xT73y8Wpk0/jTe+rQy/u21eCHikab9v3xHW7Lm/YnD1dVhuL5SNPHlTx/17Ss1X9bY/+mU1l8/F2iHtP/71og/PxoDSeP9muWN1/H9hf5vVlu2fvzN1/+e5OVquqc271yuUpkeiehJXlw5/9Dya+v5evk0/qGHm2//a63/6TnhyRbj77ryy+ebj397pfGPrb3+39b/G09cvDGxa7X6W+v/0WpqqDanlf1fqw28k88OAAAAAAAAAAAAAAAAAAAAAAAAAFqViYi9kWSyN9OZTDbbU32G9/+jL1MslSsHTpVmpsai+qzsgejO1H/qsr/h91BHar+HX88fui3/eETsi4gPe/9TzWfzpeJYp4MHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgJo9TZ//v7TsUm+nWwcAbJvdnW4AANB26xz/H3zh57fa1RQAoE2c/wPAzuP4DwA7z6aP/3MPbW1DAIC2cf4PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADANjt+7Fg6Lf6xMJ9P82NnZ2cmSmcPjhXKE9nJmXw2X5o+kx0vlcaLhWy+NLne+xVLpTOjMTVzbrhSKFeGy7NzJyZLM1OVE6cnc+OFE4XutkQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABtTnp2byBWLhWmJlYnM3dGMFhJxdzRD4h5P9C/P6fSeCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODe8E8AAAD//xJ5L6Q=") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:49 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 187.689700][T12551] EXT4-fs (loop0): failed to initialize system zone (-117) [ 187.697081][T12551] EXT4-fs (loop0): mount failed [ 187.730199][T12556] loop3: detected capacity change from 0 to 2048 22:53:49 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$eJzs3c1rXFUbAPDnTvPRN+37JoUXtCIYEDRQOjE1tgouKi5EsVDQte04mYaaSaZkJqUJAS0quBFUXAi66dqPunPrx1Y3/g2CpaVqWqy40MidzDTTZpJM0mSmNb8f3OSce8/MOc+c+3Hu3MvcAHaswfRPJmJ/RLyXRPTX5icR0V1NdUUcXSp3Y2E+n05JLC6+9GtSLXN9YT4fDa9J7all7o+Ib9+OOJBZWW95dm4iVywWpmv54crkmeHy7NzB05O58cJ4YerwyOjooSNPHDm8dbH+/sPc3ivvP/foF0f/fPO+i+9+l8TR2Ftb1hjHVhmMwdpn0p1+hLd4dqsr67Ck0w1g05KlrTz2R3/sqqYAgH+z1yNiEQDYYRLHfwDYYerfA1xfmM/Xp85+I9FeV5+JiN1L8devby4t6apds9tdvQ7adz255cpIEhEDW1D/YER88tUrn6VTbNN1SIBm3jgfEScHBlfu/5MV9yxs1GMtlBm8LW//B+3zdTr+ebLZ+C9zc/wTTcY/vU223c1Yf/vPXN6CalaVjv+ebri37UZD/DUDu2q5/1bHfN3JqdPFQrpv+19EDEV3b5ofWaOOoWt/XVttWeP477cPXvs0rT/9v1wic7mr99bXjOUquTuJudHV8xEPdDWLP7nZ/8kq49/j67z33z9eejX9//xT73y8Wpk0/jTe+rQy/u21eCHikab9v3xHW7Lm/YnD1dVhuL5SNPHlTx/17Ss1X9bY/+mU1l8/F2iHtP/71og/PxoDSeP9muWN1/H9hf5vVlu2fvzN1/+e5OVquqc271yuUpkeiehJXlw5/9Dya+v5evk0/qGHm2//a63/6TnhyRbj77ryy+ebj397pfGPrb3+39b/G09cvDGxa7X6W+v/0WpqqDanlf1fqw28k88OAAAAAAAAAAAAAAAAAAAAAAAAAFqViYi9kWSyN9OZTDbbU32G9/+jL1MslSsHTpVmpsai+qzsgejO1H/qsr/h91BHar+HX88fui3/eETsi4gPe/9TzWfzpeJYp4MHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgJo9TZ//v7TsUm+nWwcAbJvdnW4AANB26xz/H3zh57fa1RQAoE2c/wPAzuP4DwA7z6aP/3MPbW1DAIC2cf4PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADANjt+7Fg6Lf6xMJ9P82NnZ2cmSmcPjhXKE9nJmXw2X5o+kx0vlcaLhWy+NLne+xVLpTOjMTVzbrhSKFeGy7NzJyZLM1OVE6cnc+OFE4XutkQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABtTnp2byBWLhWmJlYnM3dGMFhJxdzRD4h5P9C/P6fSeCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODe8E8AAAD//xJ5L6Q=") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:49 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 187.740893][T12556] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.750683][T12556] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.781795][T12558] loop1: detected capacity change from 0 to 2048 [ 187.788906][T12556] EXT4-fs (loop3): failed to initialize system zone (-117) [ 187.800396][T12556] EXT4-fs (loop3): mount failed [ 187.807363][T12558] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.817146][T12558] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.829368][T12558] EXT4-fs (loop1): failed to initialize system zone (-117) [ 187.836061][T12562] loop4: detected capacity change from 0 to 2048 [ 187.839898][T12558] EXT4-fs (loop1): mount failed 22:53:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 187.849917][T12563] loop0: detected capacity change from 0 to 2048 [ 187.859238][T12562] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.869028][T12562] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.872847][T12563] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.889710][T12563] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 187.912707][T12563] EXT4-fs (loop0): failed to initialize system zone (-117) [ 187.920241][T12562] EXT4-fs (loop4): failed to initialize system zone (-117) [ 187.921876][T12566] loop3: detected capacity change from 0 to 2048 [ 187.927588][T12563] EXT4-fs (loop0): mount failed [ 187.938880][T12566] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.948715][T12566] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 22:53:49 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 187.959794][T12562] EXT4-fs (loop4): mount failed [ 187.967507][T12566] EXT4-fs (loop3): failed to initialize system zone (-117) [ 187.977618][T12566] EXT4-fs (loop3): mount failed [ 188.000585][T12571] loop1: detected capacity change from 0 to 2048 [ 188.008685][T12571] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 188.018629][T12571] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 188.044023][T12571] EXT4-fs (loop1): failed to initialize system zone (-117) 22:53:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x2000010, &(0x7f0000000640)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRESHEX, @ANYRES64], 0x1, 0x506, &(0x7f0000000b80)="$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") getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = dup2(r1, r0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) 22:53:49 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$eJzs3c1rXFUbAPDnTvPRN+37JoUXtCIYEDRQOjE1tgouKi5EsVDQte04mYaaSaZkJqUJAS0quBFUXAi66dqPunPrx1Y3/g2CpaVqWqy40MidzDTTZpJM0mSmNb8f3OSce8/MOc+c+3Hu3MvcAHaswfRPJmJ/RLyXRPTX5icR0V1NdUUcXSp3Y2E+n05JLC6+9GtSLXN9YT4fDa9J7all7o+Ib9+OOJBZWW95dm4iVywWpmv54crkmeHy7NzB05O58cJ4YerwyOjooSNPHDm8dbH+/sPc3ivvP/foF0f/fPO+i+9+l8TR2Ftb1hjHVhmMwdpn0p1+hLd4dqsr67Ck0w1g05KlrTz2R3/sqqYAgH+z1yNiEQDYYRLHfwDYYerfA1xfmM/Xp85+I9FeV5+JiN1L8devby4t6apds9tdvQ7adz255cpIEhEDW1D/YER88tUrn6VTbNN1SIBm3jgfEScHBlfu/5MV9yxs1GMtlBm8LW//B+3zdTr+ebLZ+C9zc/wTTcY/vU223c1Yf/vPXN6CalaVjv+ebri37UZD/DUDu2q5/1bHfN3JqdPFQrpv+19EDEV3b5ofWaOOoWt/XVttWeP477cPXvs0rT/9v1wic7mr99bXjOUquTuJudHV8xEPdDWLP7nZ/8kq49/j67z33z9eejX9//xT73y8Wpk0/jTe+rQy/u21eCHikab9v3xHW7Lm/YnD1dVhuL5SNPHlTx/17Ss1X9bY/+mU1l8/F2iHtP/71og/PxoDSeP9muWN1/H9hf5vVlu2fvzN1/+e5OVquqc271yuUpkeiehJXlw5/9Dya+v5evk0/qGHm2//a63/6TnhyRbj77ryy+ebj397pfGPrb3+39b/G09cvDGxa7X6W+v/0WpqqDanlf1fqw28k88OAAAAAAAAAAAAAAAAAAAAAAAAAFqViYi9kWSyN9OZTDbbU32G9/+jL1MslSsHTpVmpsai+qzsgejO1H/qsr/h91BHar+HX88fui3/eETsi4gPe/9TzWfzpeJYp4MHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgJo9TZ//v7TsUm+nWwcAbJvdnW4AANB26xz/H3zh57fa1RQAoE2c/wPAzuP4DwA7z6aP/3MPbW1DAIC2cf4PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADANjt+7Fg6Lf6xMJ9P82NnZ2cmSmcPjhXKE9nJmXw2X5o+kx0vlcaLhWy+NLne+xVLpTOjMTVzbrhSKFeGy7NzJyZLM1OVE6cnc+OFE4XutkQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABtTnp2byBWLhWmJlYnM3dGMFhJxdzRD4h5P9C/P6fSeCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODe8E8AAAD//xJ5L6Q=") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:49 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$eJzs3c1rXFUbAPDnTvPRN+37JoUXtCIYEDRQOjE1tgouKi5EsVDQte04mYaaSaZkJqUJAS0quBFUXAi66dqPunPrx1Y3/g2CpaVqWqy40MidzDTTZpJM0mSmNb8f3OSce8/MOc+c+3Hu3MvcAHaswfRPJmJ/RLyXRPTX5icR0V1NdUUcXSp3Y2E+n05JLC6+9GtSLXN9YT4fDa9J7all7o+Ib9+OOJBZWW95dm4iVywWpmv54crkmeHy7NzB05O58cJ4YerwyOjooSNPHDm8dbH+/sPc3ivvP/foF0f/fPO+i+9+l8TR2Ftb1hjHVhmMwdpn0p1+hLd4dqsr67Ck0w1g05KlrTz2R3/sqqYAgH+z1yNiEQDYYRLHfwDYYerfA1xfmM/Xp85+I9FeV5+JiN1L8devby4t6apds9tdvQ7adz255cpIEhEDW1D/YER88tUrn6VTbNN1SIBm3jgfEScHBlfu/5MV9yxs1GMtlBm8LW//B+3zdTr+ebLZ+C9zc/wTTcY/vU223c1Yf/vPXN6CalaVjv+ebri37UZD/DUDu2q5/1bHfN3JqdPFQrpv+19EDEV3b5ofWaOOoWt/XVttWeP477cPXvs0rT/9v1wic7mr99bXjOUquTuJudHV8xEPdDWLP7nZ/8kq49/j67z33z9eejX9//xT73y8Wpk0/jTe+rQy/u21eCHikab9v3xHW7Lm/YnD1dVhuL5SNPHlTx/17Ss1X9bY/+mU1l8/F2iHtP/71og/PxoDSeP9muWN1/H9hf5vVlu2fvzN1/+e5OVquqc271yuUpkeiehJXlw5/9Dya+v5evk0/qGHm2//a63/6TnhyRbj77ryy+ebj397pfGPrb3+39b/G09cvDGxa7X6W+v/0WpqqDanlf1fqw28k88OAAAAAAAAAAAAAAAAAAAAAAAAAFqViYi9kWSyN9OZTDbbU32G9/+jL1MslSsHTpVmpsai+qzsgejO1H/qsr/h91BHar+HX88fui3/eETsi4gPe/9TzWfzpeJYp4MHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgJo9TZ//v7TsUm+nWwcAbJvdnW4AANB26xz/H3zh57fa1RQAoE2c/wPAzuP4DwA7z6aP/3MPbW1DAIC2cf4PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADANjt+7Fg6Lf6xMJ9P82NnZ2cmSmcPjhXKE9nJmXw2X5o+kx0vlcaLhWy+NLne+xVLpTOjMTVzbrhSKFeGy7NzJyZLM1OVE6cnc+OFE4XutkQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABtTnp2byBWLhWmJlYnM3dGMFhJxdzRD4h5P9C/P6fSeCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODe8E8AAAD//xJ5L6Q=") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 188.075245][T12571] EXT4-fs (loop1): mount failed [ 188.106941][T12574] loop2: detected capacity change from 0 to 512 [ 188.125186][T12574] ext4: Unknown parameter 'ÿÿÿÿ0xffffffffffffffffÿÿÿÿ0xffffffffffffffffÿÿÿÿÿÿÿÿ' [ 188.148253][T12576] loop4: detected capacity change from 0 to 2048 22:53:49 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$eJzs3c1rXFUbAPDnTvPRN+37JoUXtCIYEDRQOjE1tgouKi5EsVDQte04mYaaSaZkJqUJAS0quBFUXAi66dqPunPrx1Y3/g2CpaVqWqy40MidzDTTZpJM0mSmNb8f3OSce8/MOc+c+3Hu3MvcAHaswfRPJmJ/RLyXRPTX5icR0V1NdUUcXSp3Y2E+n05JLC6+9GtSLXN9YT4fDa9J7all7o+Ib9+OOJBZWW95dm4iVywWpmv54crkmeHy7NzB05O58cJ4YerwyOjooSNPHDm8dbH+/sPc3ivvP/foF0f/fPO+i+9+l8TR2Ftb1hjHVhmMwdpn0p1+hLd4dqsr67Ck0w1g05KlrTz2R3/sqqYAgH+z1yNiEQDYYRLHfwDYYerfA1xfmM/Xp85+I9FeV5+JiN1L8devby4t6apds9tdvQ7adz255cpIEhEDW1D/YER88tUrn6VTbNN1SIBm3jgfEScHBlfu/5MV9yxs1GMtlBm8LW//B+3zdTr+ebLZ+C9zc/wTTcY/vU223c1Yf/vPXN6CalaVjv+ebri37UZD/DUDu2q5/1bHfN3JqdPFQrpv+19EDEV3b5ofWaOOoWt/XVttWeP477cPXvs0rT/9v1wic7mr99bXjOUquTuJudHV8xEPdDWLP7nZ/8kq49/j67z33z9eejX9//xT73y8Wpk0/jTe+rQy/u21eCHikab9v3xHW7Lm/YnD1dVhuL5SNPHlTx/17Ss1X9bY/+mU1l8/F2iHtP/71og/PxoDSeP9muWN1/H9hf5vVlu2fvzN1/+e5OVquqc271yuUpkeiehJXlw5/9Dya+v5evk0/qGHm2//a63/6TnhyRbj77ryy+ebj397pfGPrb3+39b/G09cvDGxa7X6W+v/0WpqqDanlf1fqw28k88OAAAAAAAAAAAAAAAAAAAAAAAAAFqViYi9kWSyN9OZTDbbU32G9/+jL1MslSsHTpVmpsai+qzsgejO1H/qsr/h91BHar+HX88fui3/eETsi4gPe/9TzWfzpeJYp4MHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgJo9TZ//v7TsUm+nWwcAbJvdnW4AANB26xz/H3zh57fa1RQAoE2c/wPAzuP4DwA7z6aP/3MPbW1DAIC2cf4PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADANjt+7Fg6Lf6xMJ9P82NnZ2cmSmcPjhXKE9nJmXw2X5o+kx0vlcaLhWy+NLne+xVLpTOjMTVzbrhSKFeGy7NzJyZLM1OVE6cnc+OFE4XutkQFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABtTnp2byBWLhWmJlYnM3dGMFhJxdzRD4h5P9C/P6fSeCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODe8E8AAAD//xJ5L6Q=") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 188.157857][T12578] loop0: detected capacity change from 0 to 2048 [ 188.165897][T12580] loop3: detected capacity change from 0 to 2048 [ 188.179115][T12578] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 188.188926][T12578] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 22:53:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x2000010, &(0x7f0000000640)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRESHEX, @ANYRES64], 0x1, 0x506, &(0x7f0000000b80)="$eJzs3dFrJHcdAPDvTLJt7i7tpiqiBWuxlVzR200a2waRWkH0qaDW9xiTTQjZZEN2Uy+haIp/gCCigk8++SL44KMgffAPEKGg76JFkXqnD4J6Izs78XLJbhK4JJPb/Xzgd/v7zczO9/ubY387MzuZCWBkPRsRr0XEWES8EBHVYnpalIVuY7+33N07by11SxJZ9sb7SSTFtIN1JZHGeETc6L0lJiLia1+O+GZyPG57d299sdlsbBftemdjq97e3bu1trG42lhtbM7Nzb48/8r8S/MzWeGh+vlkRLz6xfd++L2ffenVX3/6W39c+OvNb3fT+tyHe/MP9+M89bpeybfFge422r6IYCUYK/pTKTsRAADOpLuP/4GI+ES+/1+NsXxv7oixMjIDAAAAzkv2+cn4TxKRAQAAAEMrjYjJSNJacS3AZKTpY8W5gQ/F9bTZanc+tdLa2VzuzouYikq6stZszBTXCk9FJem2Z/P6/faLR9pzEfFURPygei1v15ZazeWSz30AAADAqLhx5Pj/n9U0r5+uz98JAAAAAFfX1MAGAAAAMCwc8gMAAMDwc/wPAAAAQ+0rr7/eLdnB86+X39zdWW+9eWu50V6vbews1ZZa21u11VZrNb9n38Zp62u2Wlufic2d2/VOo92pt3f3FjZaO5udhbUHHoENAAAAXKKnPv7OH5KI2P/stbxEcR9AYBSdcF/PP19mHsBFGys7AaA07uINo6tSdgJA6ZJT5rt4BwAAHn3THz3++//B8/+dG4Dh5lofABg94/F42SkAJakcuwLQL30wStKIeLJXHbgzMHBU+O1Zo2TZ0SnOLwIAwOWazEuS1orjgMlI01ot4on8sQCVZGWt2Zgpjg9+X6083m3P5u9MTr1mGAAAAAAAAAAAAAAAAAAAAAAAAADoybIkMgAAAGCoRaR/SfK7+UdMV5+fPHp+4LHkX9V4r2j85I0f3V7sdLZnu9P/Xs3nR0Tnx8X0FzOPBAAAAIAroHecXrzOlp0NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMPm7p23lg7KZcb92xciYqpf/PGYyF8nohIR1/+RxPih9yURMXYO8fffjoiP9IufxL0sy6aKLPrFv3bB8afyTdM/fhoRN84hPoyyd7rjz2v9Pn9pPJu/9v/8jRflYQ0e/9L/j39jA8afJ84Y4+l3f1EfGP/tiKfH+48/B/GTAfGfO7a2f2dZdjzGN76+tzcofvbTiOm+3z/JA7HqnY2tent379baxuJqY7WxOTc3+/L8K/Mvzc/UV9aajeLfvjG+/7Ff3Tup/9cHxJ86pf/PD1rpEf999/adD/aqlX7xbz7X9/t3IgbET4vvvk8W9e786YP6fq9+2DM//90zJ/V/eUD/T/v/v3nG/r/w1e/+6YyLAgCXoL27t77YbDa2T6hMnGGZR7Hym4kzL/zL93ubq/Sch6fS3Vu9PyX7Tm8DX4HEDlWyq5FGKZVShyUAAOAC3N/pLzsTAAAAAAAAAAAAAAAAAAAAGF2XcTuxozH3y+kqAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCJ/hcAAP//H4jgBQ==") getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = dup2(r1, r0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) [ 188.191957][T12576] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 188.209678][T12576] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 188.219628][T12580] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 188.230340][T12580] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 188.236185][T12582] loop1: detected capacity change from 0 to 2048 [ 188.253053][T12582] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 188.254148][T12578] EXT4-fs (loop0): failed to initialize system zone (-117) [ 188.262908][T12582] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 188.286105][T12578] EXT4-fs (loop0): mount failed [ 188.286757][T12580] EXT4-fs (loop3): failed to initialize system zone (-117) [ 188.294850][T12585] loop2: detected capacity change from 0 to 512 [ 188.298380][T12576] EXT4-fs (loop4): failed to initialize system zone (-117) [ 188.305883][T12585] ext4: Unknown parameter 'ÿÿÿÿ0xffffffffffffffffÿÿÿÿ0xffffffffffffffffÿÿÿÿÿÿÿÿ' [ 188.317175][T12582] EXT4-fs (loop1): failed to initialize system zone (-117) [ 188.323441][T12580] EXT4-fs (loop3): mount failed [ 188.333449][T12576] EXT4-fs (loop4): mount failed [ 188.334827][T12582] EXT4-fs (loop1): mount failed 22:53:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x2000010, &(0x7f0000000640)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRESHEX, @ANYRES64], 0x1, 0x506, &(0x7f0000000b80)="$eJzs3dFrJHcdAPDvTLJt7i7tpiqiBWuxlVzR200a2waRWkH0qaDW9xiTTQjZZEN2Uy+haIp/gCCigk8++SL44KMgffAPEKGg76JFkXqnD4J6Izs78XLJbhK4JJPb/Xzgd/v7zczO9/ubY387MzuZCWBkPRsRr0XEWES8EBHVYnpalIVuY7+33N07by11SxJZ9sb7SSTFtIN1JZHGeETc6L0lJiLia1+O+GZyPG57d299sdlsbBftemdjq97e3bu1trG42lhtbM7Nzb48/8r8S/MzWeGh+vlkRLz6xfd++L2ffenVX3/6W39c+OvNb3fT+tyHe/MP9+M89bpeybfFge422r6IYCUYK/pTKTsRAADOpLuP/4GI+ES+/1+NsXxv7oixMjIDAAAAzkv2+cn4TxKRAQAAAEMrjYjJSNJacS3AZKTpY8W5gQ/F9bTZanc+tdLa2VzuzouYikq6stZszBTXCk9FJem2Z/P6/faLR9pzEfFURPygei1v15ZazeWSz30AAADAqLhx5Pj/n9U0r5+uz98JAAAAAFfX1MAGAAAAMCwc8gMAAMDwc/wPAAAAQ+0rr7/eLdnB86+X39zdWW+9eWu50V6vbews1ZZa21u11VZrNb9n38Zp62u2Wlufic2d2/VOo92pt3f3FjZaO5udhbUHHoENAAAAXKKnPv7OH5KI2P/stbxEcR9AYBSdcF/PP19mHsBFGys7AaA07uINo6tSdgJA6ZJT5rt4BwAAHn3THz3++//B8/+dG4Dh5lofABg94/F42SkAJakcuwLQL30wStKIeLJXHbgzMHBU+O1Zo2TZ0SnOLwIAwOWazEuS1orjgMlI01ot4on8sQCVZGWt2Zgpjg9+X6083m3P5u9MTr1mGAAAAAAAAAAAAAAAAAAAAAAAAADoybIkMgAAAGCoRaR/SfK7+UdMV5+fPHp+4LHkX9V4r2j85I0f3V7sdLZnu9P/Xs3nR0Tnx8X0FzOPBAAAAIAroHecXrzOlp0NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMPm7p23lg7KZcb92xciYqpf/PGYyF8nohIR1/+RxPih9yURMXYO8fffjoiP9IufxL0sy6aKLPrFv3bB8afyTdM/fhoRN84hPoyyd7rjz2v9Pn9pPJu/9v/8jRflYQ0e/9L/j39jA8afJ84Y4+l3f1EfGP/tiKfH+48/B/GTAfGfO7a2f2dZdjzGN76+tzcofvbTiOm+3z/JA7HqnY2tent379baxuJqY7WxOTc3+/L8K/Mvzc/UV9aajeLfvjG+/7Ff3Tup/9cHxJ86pf/PD1rpEf999/adD/aqlX7xbz7X9/t3IgbET4vvvk8W9e786YP6fq9+2DM//90zJ/V/eUD/T/v/v3nG/r/w1e/+6YyLAgCXoL27t77YbDa2T6hMnGGZR7Hym4kzL/zL93ubq/Sch6fS3Vu9PyX7Tm8DX4HEDlWyq5FGKZVShyUAAOAC3N/pLzsTAAAAAAAAAAAAAAAAAAAAGF2XcTuxozH3y+kqAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCJ/hcAAP//H4jgBQ==") getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = dup2(r1, r0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) [ 188.360707][ T9205] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 188.395110][T12590] loop2: detected capacity change from 0 to 512 22:53:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:50 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="71756f74612c00a35c5e37ece04e206d531145b674157292002380445b2316653ddbfaaa55d92246c056c531ae9ee84e509ef01086be6402d9a2c301000000000000006182581f1e1aad4c51675af09b429dd5358788cdeb542786bfe038144504000f1ee4c8bec9b4fc4398f1ad4412456734a17b3829766c988d77bfd68e2f7835ee8fb85170205b9633741eac154608629cc8797636390fafcf55f7cd59376dc504a26d48b1ddf2a29f870ffd1185ec89c16298ca820279fb2876c85559b3b250118ccc2bd520d717bdd788356ca6b70245a1665e64d7fe2f08224f3c1da38e7624e2631051b9307b9eb73e17a8ab2a872c41026d779dad000093c67aecb55973b5a00493d75df375c532ec7c598d88960957a3cd5e15fd69c1294ffb49936c97ed8fddcf0b23a42eb49302aca87580e5b511c4941ae55f3f34f4a633cf64127e67b7b971a29b13782b4c204d79d780c9b0127362f634e4f3981a48749a31bad9d6d02fc433798d37661f7a8046d66dd762305f8c14df600b086086af8efc2f37e7942b97a19dc19385fbb7c78f7ce6b6b34fe99e669adcb0f000d003bc4cbd26618755ebb3e0cc550f183fc3ad0831e7a9336148bec6249eebdde43fbd442360b651654ee52bd13f412f788a4fa8f578a61bed2ddc39e40a7648cdad36043f84d67529d452b7fbcebaa8cd10fdcdde231c013abf2fe0ade5ae1c360632532c10d24289095a1562943524c406089c5f4542dfd592973b43f3a2ff4143d35d3e14fa42fd4514146520df83162de77bf0b9e78c3edeb56d49e2ebf75833a0f12bc1548717fb1262378d45c37bef3bed17ae8ce243556e1ea378472ae88a9ca69ee59eaa01d68b916214705b41ea2cfe778568b46110ebd6c8339f944fad22b0364122d4337e75aac9d0759dd2efcaa0f93027246d611b766cbabf7814a4cabd5e21045369c75d2c9f5c910a5dcbdc7e19a91bbd2477fd5fbd0aeefd131eedd5d8a0df4645c16a768607bf"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="000226bd7000fedbdf25410000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) [ 188.402580][T12590] ext4: Unknown parameter 'ÿÿÿÿ0xffffffffffffffffÿÿÿÿ0xffffffffffffffffÿÿÿÿÿÿÿÿ' 22:53:50 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:50 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x5, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1, 0x78b, &(0x7f0000000800)="$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") sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x9) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x1, 0x0, 0x0, @uid=r2}]}, 0x1c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001ac0)=ANY=[@ANYBLOB="15601000ffffffff7dabe0ffffffffff18320000040000000000000000000000182600000002b154691e2c72727463127bc06dc86ea997cdeaf8e142360453b0d39ac84a3490b7ef879c5bd4f146e45d878231506f9ce1b3271b0eca01665c0aa93a297afa092ccd54c4006b877524218b8d8e37b15f2c59ca63bff63a4ee4d7e14dc3ff13b47c2c46ff7b031db267dea0f9debf287f9a3ff081a9c5d5bd0d75fb5ca701fbb8b7e794f5cba043d0d80aee180ae327a82f9456ab6011eede8d5cd99dbd567e004dd16b1ed4d7b6d82d553bdeba01f691f469ecc6f7", @ANYRES32, @ANYBLOB="00000000010000008510000003000000184b0000f9ffffff0000000000000000bd7d200010000000"], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xf, 0x7, 0xfffffc04}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000280)="240000001a005f0014f9e407000904000a00000074000000000e000008001b0001000000", 0x24) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x78) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x38, r6, 0x1, 0x0, 0x0, {}, [{{@pci={{0xe}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r3, &(0x7f0000006200)={&(0x7f0000005fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000061c0)={&(0x7f0000006000)=ANY=[@ANYBLOB="b4010015", @ANYRES16=r6, @ANYBLOB="000226bd7000fedbdf25410000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000080}, 0x40010) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=@newsa={0x154, 0x10, 0x713, 0x70bd29, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@multicast1}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r9, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd571012c}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f0000001800)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x40, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6b}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}]]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000001c00)=@getae={0xf8, 0x1f, 0x300, 0x70bd2c, 0x25dfdbff, {{@in=@remote, 0x4d6, 0x2, 0x3c}, @in=@local, 0x400}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x9}, @policy={0xac, 0x7, {{@in6=@empty, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x5, 0x4e22, 0x0, 0x14, 0xa0, 0x20, 0x2b}, {0x1, 0x3, 0x4, 0x0, 0x7805, 0x100000001, 0x6, 0x6}, {0x200, 0x5, 0xb9, 0x3}, 0x80000001, 0x0, 0x2, 0x0, 0x3}}, @tmpl={0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8c0}, 0x50) sendmsg$nl_route(r1, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)=ANY=[@ANYBLOB="50000000160008002dbd7000fbdbdf250a38a300", @ANYRES32=0x0, @ANYBLOB="08000a0003000000080008004303000014000100fe8000000000000000000000000000b914000200200100"/56], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40080c4) r11 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001840), 0x240140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@private0, @in6}}, {{@in=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000480)=0xe8) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f0000000800)={{}, r10, 0x12, @inherit={0x48, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000000000000000000000500000000000000fffffff2f5bcb1cd2356ffffffffff080000000000000000000000000000000500000000000000070000000000000070870000000000006425403eb8ed5a57d46b1b6e16a7cc4dd09adf5a05c6fac58eb2fecc33087efac84922790c3de8bca35127b1594c40bb140d7500522d253dd33f98c8d44f254ecd447e5f8368b6cc68"]}, @subvolid=0x1f}) r12 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'sit0\x00'}) 22:53:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x2000010, &(0x7f0000000640)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRESHEX, @ANYRES64], 0x1, 0x506, &(0x7f0000000b80)="$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") getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r4 = dup2(r1, r0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000200)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) [ 188.469594][T12592] loop3: detected capacity change from 0 to 2048 [ 188.492099][T12592] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 188.501973][T12592] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 188.514816][T12595] loop0: detected capacity change from 0 to 2048 [ 188.522388][T12592] EXT4-fs (loop3): failed to initialize system zone (-117) [ 188.530987][T12598] loop1: detected capacity change from 0 to 2048 [ 188.535862][T12599] loop2: detected capacity change from 0 to 512 [ 188.541377][T12600] loop4: detected capacity change from 0 to 2048 [ 188.560586][T12592] EXT4-fs (loop3): mount failed [ 188.572000][T12595] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 188.572792][T12599] ext4: Unknown parameter 'ÿÿÿÿ0xffffffffffffffffÿÿÿÿ0xffffffffffffffffÿÿÿÿÿÿÿÿ' [ 188.581786][T12595] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 188.604284][ T9085] ================================================================== [ 188.612380][ T9085] BUG: KCSAN: data-race in touch_atime / touch_atime [ 188.619081][ T9085] [ 188.622792][ T9085] write to 0xffff8881305409b0 of 8 bytes by task 9183 on cpu 1: [ 188.630423][ T9085] touch_atime+0x1ed/0x340 [ 188.634886][ T9085] shmem_file_read_iter+0x4b3/0x550 [ 188.640088][ T9085] vfs_read+0x5ab/0x6a0 [ 188.643995][T12600] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 188.644237][ T9085] ksys_read+0xeb/0x1a0 [ 188.653987][T12600] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 188.658056][ T9085] __x64_sys_read+0x42/0x50 [ 188.672380][T12598] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 188.673350][ T9085] do_syscall_64+0xcd/0x1d0 [ 188.673374][ T9085] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 188.673391][ T9085] [ 188.673395][ T9085] read to 0xffff8881305409b0 of 8 bytes by task 9085 on cpu 0: [ 188.683113][T12598] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 188.687553][ T9085] touch_atime+0x19a/0x340 [ 188.700361][T12600] EXT4-fs (loop4): failed to initialize system zone (-117) [ 188.703235][ T9085] shmem_file_read_iter+0x4b3/0x550 [ 188.703260][ T9085] vfs_read+0x5ab/0x6a0 [ 188.703282][ T9085] ksys_read+0xeb/0x1a0 [ 188.716694][T12600] EXT4-fs (loop4): mount failed [ 188.718518][ T9085] __x64_sys_read+0x42/0x50 [ 188.718543][ T9085] do_syscall_64+0xcd/0x1d0 [ 188.727036][T12598] EXT4-fs (loop1): failed to initialize system zone (-117) [ 188.731321][ T9085] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 188.731349][ T9085] [ 188.731352][ T9085] value changed: 0x00000000086fdb98 -> 0x000000000908ab95 [ 188.731363][ T9085] [ 188.731365][ T9085] Reported by Kernel Concurrency Sanitizer on: [ 188.731370][ T9085] CPU: 0 PID: 9085 Comm: udevd Not tainted 6.8.0-rc7-syzkaller-00229-g10d48d70e82d #0 [ 188.731391][ T9085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 188.731401][ T9085] ================================================================== [ 188.738057][T12595] EXT4-fs (loop0): failed to initialize system zone (-117) 22:53:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000480006803c00040067636d286165732900000000000000000000000000000000000000000000000014002000b75e3500f2702f1281abb25ce0363b3ecf96f06f080006"], 0x5c}}, 0x0) [ 188.740740][T12598] EXT4-fs (loop1): mount failed [ 188.744609][T12595] EXT4-fs (loop0): mount failed 22:53:50 executing program 2: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./bus\x00', 0x0) mkdirat(r0, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = getpid() sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=@setlink={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13, r2}, @IFLA_IFNAME={0x14, 0x3, 'batadv_slave_0\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0xfffffffc}}]}]}]}, 0x50}}, 0x0) 22:53:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f00000010c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0x9}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, 0x0, 0x3e}, 0x20) 22:53:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f00000004c0)="3ce2de4d8d957a8de4e490b6cd14b988d4edef164bd3377aa381b5f50b7ca414516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe102e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e", 0xc5, 0x0, 0x0, 0x0) 22:53:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000001800)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/176, 0x1a, 0xb0, 0x1}, 0x20) 22:53:50 executing program 2: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./bus\x00', 0x0) mkdirat(r0, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = getpid() sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=@setlink={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13, r2}, @IFLA_IFNAME={0x14, 0x3, 'batadv_slave_0\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0xfffffffc}}]}]}]}, 0x50}}, 0x0) 22:53:50 executing program 4: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) [ 188.916075][T12608] net_ratelimit: 8 callbacks suppressed [ 188.916127][T12608] A link change request failed with some changes committed already. Interface batadv_slave_0 may have been left with an inconsistent configuration, please check. 22:53:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000001800)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/176, 0x1a, 0xb0, 0x1}, 0x20) 22:53:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f00000010c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0x9}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, 0x0, 0x3e}, 0x20) 22:53:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f00000010c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0x9}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, 0x0, 0x3e}, 0x20) 22:53:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000001800)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/176, 0x1a, 0xb0, 0x1}, 0x20) 22:53:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f00000004c0)="3ce2de4d8d957a8de4e490b6cd14b988d4edef164bd3377aa381b5f50b7ca414516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe102e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e", 0xc5, 0x0, 0x0, 0x0) 22:53:50 executing program 2: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./bus\x00', 0x0) mkdirat(r0, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = getpid() sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=@setlink={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13, r2}, @IFLA_IFNAME={0x14, 0x3, 'batadv_slave_0\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0xfffffffc}}]}]}]}, 0x50}}, 0x0) 22:53:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000001800)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/176, 0x1a, 0xb0, 0x1}, 0x20) 22:53:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f00000004c0)="3ce2de4d8d957a8de4e490b6cd14b988d4edef164bd3377aa381b5f50b7ca414516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe102e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e", 0xc5, 0x0, 0x0, 0x0) 22:53:50 executing program 4: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) [ 189.041434][T12617] A link change request failed with some changes committed already. Interface batadv_slave_0 may have been left with an inconsistent configuration, please check. 22:53:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f00000010c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0x9}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, 0x0, 0x3e}, 0x20) 22:53:50 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f00000004c0)="3ce2de4d8d957a8de4e490b6cd14b988d4edef164bd3377aa381b5f50b7ca414516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe102e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e", 0xc5, 0x0, 0x0, 0x0) 22:53:50 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 3: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 2: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./bus\x00', 0x0) mkdirat(r0, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = getpid() sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=@setlink={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13, r2}, @IFLA_IFNAME={0x14, 0x3, 'batadv_slave_0\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0xfffffffc}}]}]}]}, 0x50}}, 0x0) [ 189.099307][T12632] A link change request failed with some changes committed already. Interface batadv_slave_0 may have been left with an inconsistent configuration, please check. 22:53:50 executing program 4: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) [ 189.175858][T12650] A link change request failed with some changes committed already. Interface batadv_slave_0 may have been left with an inconsistent configuration, please check. 22:53:50 executing program 3: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 4: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 3: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 4: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f00000004c0)="3ce2de4d8d957a8de4e490b6cd14b988d4edef164bd3377aa381b5f50b7ca414516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe102e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e", 0xc5, 0x0, 0x0, 0x0) 22:53:50 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f00000004c0)="3ce2de4d8d957a8de4e490b6cd14b988d4edef164bd3377aa381b5f50b7ca414516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe102e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e", 0xc5, 0x0, 0x0, 0x0) 22:53:50 executing program 4: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@fwd={0x1}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x0, 0x1}, {}, {}, {}, {0x0, 0x3}]}, @enum]}, {0x0, [0x2e]}}, &(0x7f0000000440)=""/5, 0x67, 0x5, 0x1}, 0x20) 22:53:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f00000004c0)="3ce2de4d8d957a8de4e490b6cd14b988d4edef164bd3377aa381b5f50b7ca414516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe102e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e", 0xc5, 0x0, 0x0, 0x0) 22:53:50 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:51 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@fwd={0x1}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x0, 0x1}, {}, {}, {}, {0x0, 0x3}]}, @enum]}, {0x0, [0x2e]}}, &(0x7f0000000440)=""/5, 0x67, 0x5, 0x1}, 0x20) 22:53:51 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@fwd={0x1}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x0, 0x1}, {}, {}, {}, {0x0, 0x3}]}, @enum]}, {0x0, [0x2e]}}, &(0x7f0000000440)=""/5, 0x67, 0x5, 0x1}, 0x20) 22:53:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@fwd={0x1}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x0, 0x1}, {}, {}, {}, {0x0, 0x3}]}, @enum]}, {0x0, [0x2e]}}, &(0x7f0000000440)=""/5, 0x67, 0x5, 0x1}, 0x20) 22:53:51 executing program 4: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:51 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}) r0 = socket(0x2, 0x1, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) semctl$GETZCNT(0x0, 0x4, 0x7, &(0x7f0000000400)=""/30) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x0, 0x5, &(0x7f0000000040)=""/4096) connect$unix(r0, &(0x7f0000001040)=@file={0x0, './file1/file0\x00'}, 0x10) r1 = geteuid() getgroups(0x3, &(0x7f0000001440)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r1, 0x0, 0x81, 0x402}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) r5 = getuid() chown(&(0x7f0000000000)='./file1/file0\x00', r5, 0xffffffffffffffff) getgroups(0x7, &(0x7f0000000040)=[r4, 0x0, 0xffffffffffffffff, r4, r2, r3, r3]) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2}], 0x4) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x1, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) 22:53:51 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x3ff}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x2, 0x2}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0)={0x42, 0x1}, 0x10) bind$tipc(r0, 0x0, 0x0) 22:53:51 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 22:53:51 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x3ff}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x2, 0x2}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0)={0x42, 0x1}, 0x10) bind$tipc(r0, 0x0, 0x0) 22:53:51 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x3ff}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x2, 0x2}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0)={0x42, 0x1}, 0x10) bind$tipc(r0, 0x0, 0x0) 22:53:51 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 189.672273][ T27] audit: type=1400 audit(1709938431.213:508): avc: denied { bind } for pid=12739 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 22:53:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x3ff}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x2, 0x2}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0)={0x42, 0x1}, 0x10) bind$tipc(r0, 0x0, 0x0) 22:53:51 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 22:53:51 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 22:53:51 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 22:53:51 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x3ff}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x2, 0x2}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0)={0x42, 0x1}, 0x10) bind$tipc(r0, 0x0, 0x0) 22:53:51 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 22:53:51 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180010fffffffffffffffe00950000000000000050e18ab6346944b0ae90000000000000000026"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x6}, 0x10) open_tree(r1, &(0x7f0000000180)='./bus\x00', 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000040)="1c0000001a005f0014f9f507000909008100000000ffffff80000000", 0x1c) getpeername$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000001c0)=0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x6, 0x0, 0x2a, @dev={0x12}, @mcast2={0xff, 0x3}, 0x2000, 0xba08}}) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x1a, r7, 0x1, 0x0, 0x6, @remote}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYRESHEX=r5, @ANYRES32=r7, @ANYBLOB="f1f701000f08000000084c798cf1b4df7aa6fd3a681db47af9e0b535abde7eaa"], 0x34}, 0x1, 0x0, 0x0, 0x84}, 0x4008094) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x70, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10040, 0x48102}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x19, 0x1e}}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8}]}, 0x70}}, 0x0) 22:53:51 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x3ff}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x2, 0x2}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0)={0x42, 0x1}, 0x10) bind$tipc(r0, 0x0, 0x0) 22:53:51 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 22:53:51 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 22:53:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x800, 0x0, 0x0, 0xce0250}, 0x9c) 22:53:51 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 22:53:51 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x3, 0x3ff}}, 0x10) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x2, 0x2}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0)={0x42, 0x1}, 0x10) bind$tipc(r0, 0x0, 0x0) 22:53:51 executing program 0: io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x5b16, &(0x7f0000000280), &(0x7f0000000000)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, r1, &(0x7f0000000040)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x48800}) io_uring_enter(r0, 0x547, 0x0, 0x0, 0x0, 0x0) [ 189.860979][ T27] audit: type=1400 audit(1709938431.413:509): avc: denied { shutdown } for pid=12777 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 22:53:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x800, 0x0, 0x0, 0xce0250}, 0x9c) 22:53:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x800, 0x0, 0x0, 0xce0250}, 0x9c) 22:53:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x800, 0x0, 0x0, 0xce0250}, 0x9c) 22:53:51 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 22:53:51 executing program 0: io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x5b16, &(0x7f0000000280), &(0x7f0000000000)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, r1, &(0x7f0000000040)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x48800}) io_uring_enter(r0, 0x547, 0x0, 0x0, 0x0, 0x0) 22:53:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x800, 0x0, 0x0, 0xce0250}, 0x9c) 22:53:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x800, 0x0, 0x0, 0xce0250}, 0x9c) 22:53:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x800, 0x0, 0x0, 0xce0250}, 0x9c) 22:53:51 executing program 1: iopl(0x3) setresuid(0x0, 0x0, 0xffffffffffffffff) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x327) 22:53:51 executing program 1: iopl(0x3) setresuid(0x0, 0x0, 0xffffffffffffffff) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x327) 22:53:51 executing program 1: iopl(0x3) setresuid(0x0, 0x0, 0xffffffffffffffff) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x327) 22:53:51 executing program 0: io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x5b16, &(0x7f0000000280), &(0x7f0000000000)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, r1, &(0x7f0000000040)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x48800}) io_uring_enter(r0, 0x547, 0x0, 0x0, 0x0, 0x0) 22:53:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x800, 0x0, 0x0, 0xce0250}, 0x9c) 22:53:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x800, 0x0, 0x0, 0xce0250}, 0x9c) 22:53:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x800, 0x0, 0x0, 0xce0250}, 0x9c) 22:53:51 executing program 1: iopl(0x3) setresuid(0x0, 0x0, 0xffffffffffffffff) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x327) 22:53:51 executing program 1: iopl(0x3) setresuid(0x0, 0x0, 0xffffffffffffffff) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x327) 22:53:51 executing program 1: iopl(0x3) setresuid(0x0, 0x0, 0xffffffffffffffff) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x327) 22:53:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x5c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xb1}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x5c}}, 0x0) 22:53:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000001640), 0x0, &(0x7f0000001740)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}, {@cachetag={'cachetag', 0x3d, 'syz1\x00'}}]}}) 22:53:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x5c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xb1}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x5c}}, 0x0) 22:53:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000001640), 0x0, &(0x7f0000001740)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}, {@cachetag={'cachetag', 0x3d, 'syz1\x00'}}]}}) 22:53:51 executing program 1: iopl(0x3) setresuid(0x0, 0x0, 0xffffffffffffffff) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x327) 22:53:51 executing program 0: io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r0 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x5b16, &(0x7f0000000280), &(0x7f0000000000)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, r1, &(0x7f0000000040)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x48800}) io_uring_enter(r0, 0x547, 0x0, 0x0, 0x0, 0x0) 22:53:51 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000580)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x68) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000c80)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)) syz_read_part_table(0x595, &(0x7f00000001c0)="$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") 22:53:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x5c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xb1}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x5c}}, 0x0) 22:53:51 executing program 1: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x6}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@getstats={0x1c, 0x5e, 0x301, 0x0, 0x0, {0x0, 0x2, 0x2}}, 0x1c}}, 0x0) 22:53:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000001640), 0x0, &(0x7f0000001740)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}, {@cachetag={'cachetag', 0x3d, 'syz1\x00'}}]}}) 22:53:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x5c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xb1}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x5c}}, 0x0) 22:53:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x8, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000000)={r0, &(0x7f0000000100), 0x0}, 0x20) 22:53:51 executing program 1: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x6}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@getstats={0x1c, 0x5e, 0x301, 0x0, 0x0, {0x0, 0x2, 0x2}}, 0x1c}}, 0x0) 22:53:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000001640), 0x0, &(0x7f0000001740)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}, {@cachetag={'cachetag', 0x3d, 'syz1\x00'}}]}}) 22:53:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x8, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000000)={r0, &(0x7f0000000100), 0x0}, 0x20) 22:53:51 executing program 1: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x6}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@getstats={0x1c, 0x5e, 0x301, 0x0, 0x0, {0x0, 0x2, 0x2}}, 0x1c}}, 0x0) 22:53:51 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)="082a26303de936bdbb55b08af0153b0e4063c7a7dc", 0x15}}, 0x0) 22:53:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 22:53:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x8, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000000)={r0, &(0x7f0000000100), 0x0}, 0x20) [ 190.302071][T12841] loop4: detected capacity change from 0 to 2048 22:53:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 22:53:51 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)="082a26303de936bdbb55b08af0153b0e4063c7a7dc", 0x15}}, 0x0) 22:53:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x8, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000000)={r0, &(0x7f0000000100), 0x0}, 0x20) 22:53:51 executing program 1: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x6}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@getstats={0x1c, 0x5e, 0x301, 0x0, 0x0, {0x0, 0x2, 0x2}}, 0x1c}}, 0x0) [ 190.354353][T12858] ieee802154 phy0 wpan0: encryption failed: -22 [ 190.362363][ T27] audit: type=1400 audit(1709938431.904:510): avc: denied { write } for pid=12855 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 22:53:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 22:53:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 22:53:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000280)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x3d}, @mpls={[], @ipv4=@tcp={{0x6, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x84, 0x0, @empty=0x3fffffff, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xb, 0x0, 0x0, 0x0, 0x3f00, {[@window={0xf, 0x3}, @timestamp={0x8, 0xa}, @generic={0x0, 0x8, "d58838848b91"}]}}}}}}, 0x4e) 22:53:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 22:53:52 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)="082a26303de936bdbb55b08af0153b0e4063c7a7dc", 0x15}}, 0x0) [ 190.420058][T12841] Alternate GPT is invalid, using primary GPT. [ 190.426517][T12841] loop4: p2 p3 p7 [ 190.438522][T12870] ieee802154 phy0 wpan0: encryption failed: -22 22:53:52 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)="082a26303de936bdbb55b08af0153b0e4063c7a7dc", 0x15}}, 0x0) 22:53:52 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x208e24b) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r1}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000300)=@xdp={0x2c, 0x9, r4, 0x9}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000580)="7ab4d854e447a4630c77f16f4ea0951ccefa096b562e8d61530d3034d51f0a9be1faa8f08f7e00218cf719b93895b0a82fd642748625884842021931ea15873464d53f0d23", 0x45}, {&(0x7f0000000980)="f20aa3dc736c9f52d6866771b259845a077a0c02b8f23af9ec6b1c99bcebf18cf4ef84f505dbc866b16a13f5b222de583cd6805a61f6a3084f28df45eb566ba468fc86c0985687672a6bcf6fe6accdb1b7bd0465c49ca7c19464d3f5048079b289fb40ca8e7cd18742ae577028fb72e199fb77267a897d6630500b0c2a56f9ea461c85016398790c142790b5ee3b661704dc075477cb16e156ab87c9d89c53b29916718960e01abef2684b9c8b747af53b4a352f1f69805c580c421a3a97ab", 0xbf}, {&(0x7f0000000400)="8e2b308d6cd949d26e103388f826f7d345b0591b9d4c390b9cce0e6f5964ede34213e01d3d7522b7d478c746a9eeec2bee7ea8b371d02e", 0x37}, {&(0x7f0000000a40)="70a8587b93b6a72e4bd19c68d5ad48a605aaedbe58d0b45b78dd89450ae00ca0d3771b4b658115ea26b2575620b5aaf700b0b3f0aeb9d9b6f31424f126151839977cf8bae1acc00ba206cbb5a279cffc333425f1039a8e1bf86baf20822eabe7ac167a45", 0x64}], 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x80}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000b40)="e359d2a066028a46163c4c0a4ea13e3cdaeb127ccbfcf860878e53fd92824e05260c4cc732e90e783e00b38a46fa17161cae022cedaa0efa354a3f03fb0efa573f134c63cf60d96f5896b5eb0a304e3951c9a5397501d23fe8c772124ca3bd53c868899f5f1fc43bbcfadeaa212a3b308be186f3ffebf418fca677028898bd85a6e99f5e41307082bfce4060d622c886583d9a609e693bf7be7c9810495485ce02f82e15a5d52e", 0xa7}, {&(0x7f0000000c00)="c7983000eb367c4b2c24e2560fba3cf6c186f8e34c867052ff4c69b3b212ca2ac9d059c5d95259d1360a208758afdcf15bdc40d8247344160b3dcb8c9ec932e4b63967313eee3a49323c8022118995c84a1d761c652cff0a2f5e1550c022d3cf3340f93cbc65526a23ab3cb9b4235d88c6adea696030a425889df145f233abbcbe736713dfa6116926865ede2829afcc2be318b3d460e98bbe35b5e5d006cd7bfa981e995a3363dce25ad228c4c6529baa960847a570f025426d801fefbf6bd6461bc5bd74eb6d8bcdfa48b79b58f16429297cbd", 0xd4}, {&(0x7f0000000d00)="d3878b9dedaa4ce8b002f0e012ddc866b38a72d55d7cd603d5b866122e79e93b03349b11515ae9b198328b256d46ace41b32c6919e8f10f53ddf6a9efbb68daf4b485f5907471254cb11b9f2a703ceb41c3aab63e4f8744f720db19ff3b2fa53fd84aeb923565151e75fe6fc5d7009ada7990214d833f237691e131c4d85aad473d51ca7d263818a8469a602d221e8bc66c7165f6f5de687df8c5158b731baa5580a3152629a65b4aa4ccd4a1bfe1fcbbaf6a25a217c5fc36a9a724b25fd1dcb249350ada1566b7269abce3c308b4ddb5965a9ded3dc98e596a91f732d40", 0xde}, {&(0x7f00000004c0)="7c485c5c6edb039fa5f8374684805b03a20d697880774dbfd4d99d13c39af7b95300e35730d958a4ee702393d4afbfe0007535ace7e0", 0x36}], 0x4, &(0x7f0000000e40)=[{0x80, 0x104, 0xf878, "b9c0c2976067cbb2e13daa9ce49042b123aa7f2fe2c00e156dba91e656d94c0bd3e70194da2b426e363f484b4d1f44b9cccd9a51b02daab8537a7cdcd366b8438fd2e4d467790a37ed5e2218f41a15cde9f8a83a822c7202dcbc3ed74221b0c6ff014e14088301f60197b772b7"}, {0xa8, 0x104, 0x7, "3bbbb331c91281281050b0e61632098a8cdc622bb9ab11765710878da66e8f4336d6f8c12ff9ebaf4479a301a489133867fe611373bf2aeb34bd8721eaa15c8b580ab87af99ff5af6719d7a35b309393a8b0e2b9021180cb63c94c9061987729a5e4a094525bac2b340b323bec7cbad5031e40b1de0c80dfa683880723f7f4bd3a7e15b55b06b2b55b91c0d296580ecdf9be"}], 0x128}}, {{&(0x7f0000000f80)=@pptp={0x18, 0x2, {0x1, @remote}}, 0x80, &(0x7f0000001340)=[{&(0x7f0000001000)="f44ebdc98ca3fc18f73f703da3cd2d99e267034982afcab034fd64be27eb0a16f6c2dc36f59a08f4bbbcadac2f78935d42c650d958aa6a8efcf6e5124e50b50e6b89707372decbae00751d15802e108e34a34edd675217eda66aa04aca95334d3f60f0bfbac9e16a8906fd098e1d0caf76671616c287d09b1e024fd9c92c5c88108a1b4e10fc635eb6f683ea17773cebd0d90c9a62eb2319628dc04f2934e8ab3d1b08e6d640b56f9e638af40c8a19f1202018ea57857c8ef46a305a8ceb38ebb2e2341c9c773576af9797ab60b742e39b86fbb5cfbb6f95ce7e7e60ea9a86fa976eee533477f3495151c437af45cf17a0", 0xf1}, {&(0x7f0000001100)="379f974c04b033ffd7959b0476066946f07278be160f87108ebd2d5b9302b8364903f1bbecd1dc84003ec5e7ece24b5a795b076f9fa520f793d6abea166bf8881ed6302fa8b9bb88164b5446749c99ffa62d18234fbf8d467a1903974b15265404b48fef597fa5ffd68e447e49c68aa5b6b45debd5a7fe7a760d04698c88ab3edffe83ad382358ad36", 0x89}, {&(0x7f00000011c0)="2af243ea7c7bca606d02d7b753d4644ae732a2106926c94c565e310516897a19a80eb04fbb13b1221ab1a1c8d32b2be943f58ec07275b8017a00edd94c9fc5d4a551ea2a6b7f96cd3eda8162641777154ede9bdf2e13ce45fe3c3d053aa4ed19", 0x60}, {&(0x7f0000001240)="f4a17f00e939d02208742302845baae1ad7d20acb0d0733c66943a9edacf1a20947ee606b124a80c64926a3e4ce72f087ac7bcd5420ba6711f87b76211fc285514e27437fcee28bd593ed642e4279ec057db58028bf7a6c918ec51112900ccc7ff3ad331c2ef7a4f1497e44512525d1d3174c59e2f7319c9ca17d20af8e508dfb2f700cd872ecabc48cd042826e54c0f0c54806592e8396625668023fb2c69bea1d8e7f33e6ae6cf8725ca9619277bcb9c95e70ac6", 0xb5}, {&(0x7f0000001300)="250708e2d0d357a615ee35d4cac27374b2342618ae", 0x15}], 0x5, &(0x7f00000013c0)=ANY=[@ANYBLOB="7000000000000000070100000157000006786a4a33b4488954e0410877097bf7594f3b3bbc67acb23c1ab4cf8eb44a8fc1a0879f6a2dacdc9172843c8127547d778fbdf2e8f818dfc4986376fa204c3c5cce3f9f6491b8ee328f4a135a6749f0ad2cbefbe804781afb75fb1b54020000"], 0x70}}, {{&(0x7f0000001440)=@nfc_llcp={0x27, 0x0, 0x0, 0x4, 0x5, 0x6, "89a8f4c4d0d95315f1f5cfcea254ddbbde785dbb68b251f456fe9ed2203672237a27aa32e8bb19bca30ea3ed84b43ffb2a5887442e9efa9e3f28b5e8bbba58", 0x9}, 0x80, &(0x7f0000001a80)=[{&(0x7f00000014c0)="685cf004380831f9fc116a3a6624f1dc7709179cf7256ee6d37a100ab5c07a71caad0b5985e4998f3f0ba02de6f9abaac97e252e4967734b4178a46175479ca2cc00bed6fe8b357179637005f3f57194470c011865602440b4cdba792e7fa6e4287d9d88b6a645071ef40c87ba427a97d2a5dec8e36e863ddef79137cca237b32b91e6b21418c2f377", 0x89}, {&(0x7f0000001580)}, {&(0x7f00000015c0)="f7b0c8b4d59db767b1c6e0a5cfcafb7ab8c04231c217a88d76c5e3775c4ded7fa4d03c44d79e75fdcbf6482b8335c36f157b7e72c7192273b3fc9538cc7289d4e5a58344de7f880d92e87fcfeb21376acb7930905bb11ab210ea562bc74fb2219cede5aae216658c93c87713b3ca8981", 0x70}, {&(0x7f0000001640)="e7ab02211e4a0e3b6a072e232cb0a8cb0617473905ca188d6367d3f1ef3768dc7e734faeb1624a038636c5aca2aa970554f806b0404f699f8aad8453f1233193a61064b19bf29c5e9d6eb1974a7b3b4b6cfe35e84a0a4ae7e1f4f91b3bcc3243f4dccccc4d1001c4e0de605768cca770a03c5820bb64f7a64e2fb8bbd9872ce9736d108320faf0d29045e976ae580ee83c81547c2b0d37f1bd8e7792c5ad1264984289e84729514e800ffd76d70b2b457fb2e96c25050683d55f5465cd433c33b23ef7eab25a9a35e88f15edb2a1a5c592cd2e621321dfba9021d1eaa3d05ba09f98e119d7d9e8", 0xe7}, {&(0x7f0000000600)="37c72967feff0a32ad83f17cabe8ed23a5748274a7f361176cbe595063a2cb29a5bf595084bec4a3897a7fd9b3c18c5f5d2cc2ffd0df3e2a926ee338b3d4a61f0be195ddbb1d1c799da736f690e9fd2475ed618b66515e6046c337d43b7ea8bc540ebb4e1336cbaf42deaeac5cd6c5c1608e0e5392d842926d1bbcc41b549ca16e6be5e9d78bc9d8765b0b58b02faada890a21e6f2d5b908afa3613309581b95cc5b87d94502e8fea282fd846bf6c686b77dbebb5a264e9da69431f9c8b1203d345cba424a9b1b3f8891073b35d809c28994497de9f328ed39274b1c963d4f789608905e29ef47ca00eb62f37e8e80d79e2512c44064eb13d897a021c5894333e0d96cba4c293c081d438b42c7cec6acd01a277dd2c0555fc86162533742d611d5e2678b6c61473e372127288e30ff", 0x12f}, {&(0x7f0000001840)="6a16b4191b59d6af109402e24bc9a3b1ca763441e254990f763d5048cb9eba8ea978e6b180e9aa2fc121da3af9b66022443a10241852b0ebcaff8c698a50998f2600ed14d4d5cff785dec5fd2e7b6fec8dffe83212688314bdbeb2a001ccb882bfc85676ac0e0d4c78cd944fb7204cbbb04dd7978a4f71113474c5d356004c4f327246d6f02535fae1cdd060a9bde8c7def3e58d3eb71e99ef89cc73e5d4527ebc6f935ea34ec556ff198627", 0xac}, {&(0x7f0000001900)="36656f862cb5b8ec47cebfb8f0f3cbd29405a0e9bd7eb96dec134caf3e7499e20864771d01f9fa06c6258386f19f7be0a9a519597028ec863e77e70bd5a108ff15b7691af261f0ed8a30800ef48c42c2e56d0833708fbc479d5d57", 0x5b}, {&(0x7f0000001980)="53ed31f1548d62712942133164112df083bb613f4208faeef4b93152ff2597711ced3a9da6efbebdab2e29e2aa8eff3fff39358299a0dd6755856329c2e93ec42486821f3bed9fb67a9b62c5b441d81e0e35000d5fe98c026d0822ad9ed78a79eaa5666ef78f80deab0d177e265086cc63093adf55c1590b3142d228a0331f24baa21778d732a02675e4fa9d6b484f395c7e74263b1fa88d0f965dc482f8b0ac98a9f89ec851283b5f6be2d09cc0bd1e4e3f585bdb5ce8b81c0a4aa71483f0c42f497a515aaea40c91ef389c55ab5dead070a7cac5062c548bd24858939e42b6bbd07c4b1485", 0xe6}], 0x8, &(0x7f0000001b00)=[{0xc0, 0x102, 0x7, "ef40743bd853c5a793df246f28969add7a3963bb4ad5bf2f9b00d94ba55249b3b7a8d14b1dcb5090b1d8f94227b934db9e749fc33c3990d470da902cd2a7f5f6fd263a383ba79e57171cd2da1cd63d89ae19a1303c9144cd2d2aae4c5865d1f098d35408f98c29abf6c7978da2c1c0ff7642a1cce09b7d7f60fde7a22933784ede55a90f6988dbcf3959614a3d2c864e75ef79d9acbc1d0dd1b40abd6fbd4ac81766ec0775f56d6ad963"}], 0xc0}}], 0x4, 0x20040000) r5 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r5, &(0x7f0000000080)={0x11, 0x3, r6, 0x1, 0x0, 0x6, @remote}, 0x14) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r8 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r7) r9 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000540)={'sit0\x00', 0x0}) socketpair(0x1a, 0x3, 0x9, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r11, 0x29, 0x44, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) ioctl$sock_inet6_SIOCSIFDSTADDR(r9, 0x8918, &(0x7f0000000080)={@private1, 0x0, r10}) sendmsg$nl_route_sched(r11, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30000804}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@newqdisc={0x5c, 0x24, 0x0, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, r10, {0x9, 0xa}, {0x8, 0xffff}, {0xc, 0xb}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}, @TCA_RATE={0x6, 0x5, {0x6, 0x81}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xfffffffc}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x39}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x9}, @TCA_RATE={0x6, 0x5, {0x9, 0x5}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0xfffffff9}]}, 0x5c}, 0x1, 0x0, 0x0, 0x9}, 0x805) ioctl$sock_inet6_SIOCSIFADDR(r9, 0x8916, &(0x7f0000000340)={@remote, 0x2d, r10}) syz_genetlink_get_family_id$tipc(&(0x7f0000000440), r7) r12 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r14}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x7, {0xfffffffd}}]}]}, @IFLA_MTU={0x8}]}, 0x3c}}, 0x0) sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY(r7, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb0, r8, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x2c, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r10}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r14}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x20}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}]}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x14, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}]}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x28, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private1}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000004c0)={&(0x7f0000000240)={0x250, 0x0, 0x1, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x4c004}, 0x44080) ftruncate(r0, 0x4) 22:53:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 22:53:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 22:53:52 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000580)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x68) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000c80)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)) syz_read_part_table(0x595, &(0x7f00000001c0)="$eJzs0r1LY2kUB+A3F2bT7BAZBqZwC8FgFRVioUVSiMSQxoi4YmEtWGghWFhIJFr78Q8ofoHYiH1KMYIoxEpSivWCYpMqy653G6uVRWWH52ku7znn3sPL7wb+16LwR7vdToQQ2sm3v/37SWG01DU+PDEZQiLMhBAKv/36dycRT/zz1bP4XI7PpWS2sXc18nTScd19W08fRHG/FoWwGkKYvz9M/de78fM7zV+k1tYXixvL+bm74srDwGxvoXOzsLA9uJ+rTP3ITcc/Vi36mP3pxtDRTbv8uPO170u90cpexnOZxPvs53O9zn/3e7VZbY31HC/1Z741zytbce7P8gcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAN7Zaf4itba+WNxYzs/dFVceBmZ7C52bhYXtwf1cZepHbjp6matFH7M/3Rg6ummXH3e+9n2p/9LKXsZzmcT77Odzvc5/93u1WW2N9Rwv9We+Nc8rW3Huz/IHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP6lwmipa3x4YjKERJgJIYxEHYd/1dvJl34injuLn+W4XkpmG3tXI08nHdfdt/X0wXhcr0UhrIYQ5u8PUx9+Gd7szwAAAP//rRGGgA==") 22:53:52 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000580)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x68) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000c80)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)) syz_read_part_table(0x595, &(0x7f00000001c0)="$eJzs0r1LY2kUB+A3F2bT7BAZBqZwC8FgFRVioUVSiMSQxoi4YmEtWGghWFhIJFr78Q8ofoHYiH1KMYIoxEpSivWCYpMqy653G6uVRWWH52ku7znn3sPL7wb+16LwR7vdToQQ2sm3v/37SWG01DU+PDEZQiLMhBAKv/36dycRT/zz1bP4XI7PpWS2sXc18nTScd19W08fRHG/FoWwGkKYvz9M/de78fM7zV+k1tYXixvL+bm74srDwGxvoXOzsLA9uJ+rTP3ITcc/Vi36mP3pxtDRTbv8uPO170u90cpexnOZxPvs53O9zn/3e7VZbY31HC/1Z741zytbce7P8gcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAN7Zaf4itba+WNxYzs/dFVceBmZ7C52bhYXtwf1cZepHbjp6matFH7M/3Rg6ummXH3e+9n2p/9LKXsZzmcT77Odzvc5/93u1WW2N9Rwv9We+Nc8rW3Huz/IHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP6lwmipa3x4YjKERJgJIYxEHYd/1dvJl34injuLn+W4XkpmG3tXI08nHdfdt/X0wXhcr0UhrIYQ5u8PUx9+Gd7szwAAAP//rRGGgA==") [ 190.479886][T12880] ieee802154 phy0 wpan0: encryption failed: -22 [ 190.502488][T12882] ieee802154 phy0 wpan0: encryption failed: -22 [ 190.512585][ T2775] Alternate GPT is invalid, using primary GPT. [ 190.518941][ T2775] loop4: p2 p3 p7 22:53:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000280)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x3d}, @mpls={[], @ipv4=@tcp={{0x6, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x84, 0x0, @empty=0x3fffffff, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xb, 0x0, 0x0, 0x0, 0x3f00, {[@window={0xf, 0x3}, @timestamp={0x8, 0xa}, @generic={0x0, 0x8, "d58838848b91"}]}}}}}}, 0x4e) 22:53:52 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x208e24b) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r1}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000300)=@xdp={0x2c, 0x9, r4, 0x9}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000580)="7ab4d854e447a4630c77f16f4ea0951ccefa096b562e8d61530d3034d51f0a9be1faa8f08f7e00218cf719b93895b0a82fd642748625884842021931ea15873464d53f0d23", 0x45}, {&(0x7f0000000980)="f20aa3dc736c9f52d6866771b259845a077a0c02b8f23af9ec6b1c99bcebf18cf4ef84f505dbc866b16a13f5b222de583cd6805a61f6a3084f28df45eb566ba468fc86c0985687672a6bcf6fe6accdb1b7bd0465c49ca7c19464d3f5048079b289fb40ca8e7cd18742ae577028fb72e199fb77267a897d6630500b0c2a56f9ea461c85016398790c142790b5ee3b661704dc075477cb16e156ab87c9d89c53b29916718960e01abef2684b9c8b747af53b4a352f1f69805c580c421a3a97ab", 0xbf}, {&(0x7f0000000400)="8e2b308d6cd949d26e103388f826f7d345b0591b9d4c390b9cce0e6f5964ede34213e01d3d7522b7d478c746a9eeec2bee7ea8b371d02e", 0x37}, {&(0x7f0000000a40)="70a8587b93b6a72e4bd19c68d5ad48a605aaedbe58d0b45b78dd89450ae00ca0d3771b4b658115ea26b2575620b5aaf700b0b3f0aeb9d9b6f31424f126151839977cf8bae1acc00ba206cbb5a279cffc333425f1039a8e1bf86baf20822eabe7ac167a45", 0x64}], 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x80}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000b40)="e359d2a066028a46163c4c0a4ea13e3cdaeb1