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"}, {&(0x7f0000001280)="38fcb34f4bc1eae139b84c78f9d5a58b9da9ec1d7fa58c1ec5df7abb4fb75cf03595d706a7de9110770ac8"}, {&(0x7f00000012c0)="5460452cc9f6d863fc9212d1dba8a8781d44dabd60274345e5a47ce6997f605630783a1225543b0f37c9dd05a58414a3e19786143882aaaacff5235a90a365807e7ce26d8f69193fe44fadfa40a4e0ca0927c32124798e4329a5b162b27151a138ea36f6ba7a2370aeb8dab378b65488be42a9d5cc6187601da6b054d852cf6aec7ab60b026afc349c9f582c343d43d6a504d3cdf11afb0b6942abda24e9895d3f076efdc8efc254dd09ec0afea93e3d7b832e2cac9bc83a8b4a229af1fc012ab8d498931ce1abc7ce2fa585c12acd569d1bf66f8aadd00eacc279"}, {&(0x7f00000013c0)="a27407ed685de4bb31a1edf5e8616ffdc980477d5b091dfc5f33cb3adb24da3f26ed967110cac65feed670e7882545f5d5053fa1ff822b4598036864a228478ca7b8a3a988feaf0503b7612e1a331ce4513dea21f16fad11910bb73952e7d593720eeda183e852580d0d6534f6ec2e9ad72ba44e9e5c7382e13d18b34805ebe4fc972ea693d744c6cf3fc0d8833e9a8fa3de629d49b7b12e6c229c173ce0b073e3093d5cf3c30e8a2429f552671428c64a416b25a2ca9941"}]}}], 0x1, 0x20000000) r9 = open(&(0x7f0000000140)='./bus\x00', 0x400145042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7800007, 0x12, r9, 0x0) r10 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r10, 0x81fd) socket$nl_generic(0x10, 0x3, 0x10) 11:59:27 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00'}, 0x10) socket$netlink(0x10, 0x3, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) [ 654.704575][T16724] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 654.741532][ T28] audit: type=1400 audit(1713268767.361:558): avc: denied { map } for pid=16762 comm="syz-executor.1" path="socket:[87757]" dev="sockfs" ino=87757 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 654.779990][T16767] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 11:59:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_mballoc_alloc\x00', r0}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018400110800395032303030"], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lchown(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001bc0)={{r5}, 0x0, &(0x7f0000000040)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents64(r4, 0x0, 0x0) 11:59:27 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x10) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/122, 0x7a}], 0x1, 0x12000000, 0x0) 11:59:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) readv(r2, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x8001, 0x84, 0x105}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$eJzs3M1vFGUYAPBndrcgn10RP0BUFI3Ej5YWVA5eNDHxoImJHvBYSyHIQg2tiZDGFkPwYqIk3I2JFxP/Ak+eiHoy8Yp3Q0IMF9DTmunOLtvtbtl2t7vF/f2SYefdfXfe55mZd+edGaYBDKz96T9JxPaIuB4RwxGRq69QjIgtlXp3bs1N/nNrbjKJcvn9v5P0a3H71txktWqSvW6rFArpgnKXksVFNJo5f+H0RKk0dS4rj86e+WR05vyFl0+dmTg5dXLq7PjRo0cOj7326vgrXckzjen23s+n9+15+8Mr704eu/LRrz9W4i2Xr147tCSP7hiKiLnaOmn0XHcb67sddfNJoY+BsCqbI6KQ7a3XYzjyl3bWPhuOt77oa3DAuiqXy+Xx1h8vlIH/sST6HQHQH9UDfXr+W516NPTYEG6+UTkBSvO+k02VTwpxMasz1HB+2037I+LYwr/fplM0XE8BAFgPP6fjn5eajP+KEY/U1duZ3RsqRsSDEbErIh6KiN0R8XBU6j4aEY+tsv39DeXl45/cjbVl1p50/Pd6dm9r6fivdhesmM9KOxbzH0pOnCpNHcrWycEY2pyWx5ouPYlYSF//+LpV+/Xjv3RK26+OBbM4bhQ2L/3O8YnZiY4Tz9y8GLG30Cz/JAp3s4g9EbF3jW2ceuGHfUvfydfm7p3/Crpwn6n8XcTzle2/EA35VyUr358cfSBKU4dGq3vFcr/9fvm9Vu13lH8XpNt/a9P9v5Z/Mam/XzuzbBGb7tXG5T+/bHlOs9b9f1PywZLGP5uYnT03FrEpeWf5+3UXuKvlav00/4MHmvf/XXF3TTweEelO/EREPBkRT2WxPx0Rz0TEgRXy/+XNZz9ee/7rK81/flXbf/Uz+dPXfmrVfnvb/0i1sBhUO79/7QbYyboDAACA+0UuIrZHkhupzedyIyOV/y+/O7bmStMzsy+emP707PHKMwLFGMpVr3QN110PHcuuDVfL41l5Pisfzq4bX81vWSyPTE6Xjvc7eRhw21r0/9Rf+X5HB6w7z2vB4NL/YXCtvf/75YD73T16ca5XcQC95ygOg6tZ/5/vQxxA7zn+w+Cq9f9v2qhc97hX48ObwP3H8R8Gl/4PA6mT5/o3xEx8H7FynWSjhLqqma86+XqhBxFGbmOsqB7OjOcj+hhGod2/ahHny/MdN9rvXyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDu+C8AAP//javoAw==") writev(r6, &(0x7f00000002c0)=[{&(0x7f0000000280)='2', 0x1}], 0x1) write$cgroup_devices(r1, &(0x7f0000000140)=ANY=[], 0xffdd) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000280), 0x1, 0x784, &(0x7f00000007c0)="$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") r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xffffffb2}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r9, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000024c0)={0x14, r10, 0x1}, 0x14}}, 0x0) sendmsg$WG_CMD_GET_DEVICE(r6, &(0x7f00000006c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r10, 0x100, 0x70bd25, 0x25dfdbff, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x40010) r11 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r11, 0x7, 0x0, 0x0, 0x0) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[], 0xffdd) 11:59:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r3, &(0x7f0000000980), 0x12) [ 654.806767][T16767] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 654.820382][ T60] usb 4-1: USB disconnect, device number 108 11:59:27 executing program 2: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b70400000000000085000000070000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:27 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:27 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r1}, 0x10) socket$netlink(0x10, 0x3, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) 11:59:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x2, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) 11:59:27 executing program 2: r0 = socket(0x840000000002, 0x3, 0xfa) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000008c0)={0x41}, 0x10) sendmsg$tipc(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r5) getsockopt$inet_mreqn(r0, 0x0, 0x19, 0x0, &(0x7f0000005480)) 11:59:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r2 = socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000800)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2040d0, &(0x7f0000000c40)={[{@jqfmt_vfsv0}, {@nojournal_checksum}, {@barrier}, {@barrier}, {@test_dummy_encryption}, {@nomblk_io_submit}]}, 0xfb, 0x49f, &(0x7f0000001440)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="02010002080000000000000000000000030006000000000002000000ac1414aa00ebb46b1600000000000000030005000000000002000000ac1414000000000000000000fd6d567b9f6d454ab46fd8e3fe68c621ebe3d73dae"], 0x40}, 0x1, 0x7}, 0x0) sendmsg$key(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020900020200740b0000c2f8aec500007c602e8f03f8c3cceb5d0000cfdb70d1d370a591778c7b0c6519ae1f03b65b3699ec7ee89eb2858d8fff9bd7129df050c5790617e076ae9b9ee2e95c74d5a9d4324c2968f83afcda57007ae4a06541051622362565291a5f01556f4b92009da48b5bd2318cdf3f5937125f397efa40d89c13316759685bea0f79dba2842b568910b69622a1d7a532a4c2c2f7476a82e61d70372c6f456bc1ecf511ee9cf6d83139616bb01450f327f13b28ec99d1350c9eec92a1c66abbec3e804c85a2a0b026085a8d64591b7ccbb62c6913f3feb53119702ff607d8b4f88f229f628e69c08de7780d4bbeb2"], 0x10}}, 0x0) [ 654.966757][T16792] syz-executor.2[16792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 654.966944][T16792] syz-executor.2[16792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 654.996551][T16798] loop1: detected capacity change from 0 to 512 11:59:27 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x10) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/122, 0x7a}], 0x1, 0x18000000, 0x0) 11:59:27 executing program 2: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b70400000000000085000000070000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 655.044220][T16798] EXT4-fs: Ignoring removed nomblk_io_submit option [ 655.052639][T16798] EXT4-fs (loop1): Test dummy encryption mode enabled 11:59:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r3, &(0x7f0000000980), 0x12) [ 655.086645][T16797] loop0: detected capacity change from 0 to 512 [ 655.100262][T16798] EXT4-fs error (device loop1): ext4_orphan_get:1396: inode #17: comm syz-executor.1: iget: bogus i_mode (0) [ 655.120028][T16798] EXT4-fs error (device loop1): ext4_orphan_get:1401: comm syz-executor.1: couldn't read orphan inode 17 (err -117) 11:59:27 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) [ 655.137732][T16797] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 655.174229][T16797] EXT4-fs (loop0): orphan cleanup on readonly fs 11:59:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r2}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r4, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r3, 0x0, 0x4004) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r7}, 0x10) r8 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r9, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r9, 0xa, 0x12) poll(&(0x7f0000000100)=[{r10}], 0x1, 0x603) dup2(r9, r10) fcntl$setown(r10, 0x8, r8) tkill(r8, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x20081e, &(0x7f0000000580), 0x1, 0x4fc, &(0x7f0000001400)="$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") lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') [ 655.185175][T16798] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 655.196198][T16797] EXT4-fs error (device loop0): ext4_read_block_bitmap_nowait:511: comm syz-executor.0: Block bitmap for bg 0 marked uninitialized [ 655.215684][T16797] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 655.227100][T16797] EXT4-fs (loop0): 1 orphan inode deleted 11:59:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r3, &(0x7f0000000980), 0x12) [ 655.234452][T16797] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 655.235534][T16798] EXT4-fs error (device loop1): ext4_validate_block_bitmap:429: comm syz-executor.1: bg 0: block 7: invalid block bitmap 11:59:27 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x2000480, &(0x7f0000000100), 0x5, 0x75b, &(0x7f0000000800)="$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") r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fallocate(r0, 0x4, 0x0, 0x1000f4) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = socket$can_raw(0x1d, 0x3, 0x1) r7 = syz_io_uring_complete(0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0}) mknodat$loop(r7, &(0x7f0000001700)='./file0\x00', 0x6000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000500)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r6, 0xd000943e, &(0x7f0000000700)={r8, r9, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r5, 0xc0709411, &(0x7f0000000240)={{r9, 0x8, 0x1, 0x4, 0x42, 0x1000, 0x1, 0x40, 0x2, 0x8, 0x80000000, 0xffff, 0x0, 0x2, 0x6}, 0x20, [0x0, 0x0, 0x0, 0x0]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x64, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB='dmask=00000000000000000000004,utf8,iocharset=default,iocharset=cp932,dmask=00000000000000000000002,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c6572726f72733d639f6e74696e75652c643d0000", @ANYRESHEX=0x0, @ANYBLOB=',errors=remount-ro,gid=', @ANYRESHEX=0x0, @ANYBLOB=',namecase=1,\x00'], 0x1, 0x1517, &(0x7f0000000340)="$eJzs3Au8TlW3MPAx5pyLTdKT5JY55lg8yWWSJLkk5JIkSZLklpAkSRKSW25JSJLckuSetHOLndzv93uSHEmShIQk8/upt9fp9PV5z3nf7/Ods8f/91vMsdczxjPnM/Z6nrXWb+/9bcchVetXq1SXmeGfgr/91wMAUgCgPwBcBQARAJTMVjLbhf2ZNPb4555E/Gs9MPVyz0BcTtL/9E36n75J/9M36X/6Jv1P36T/6Zv0P32T/guRnm2alvtq2dLv9o/f/3f/591y//+/Ifn8/x/rHzrSpP/pm/Q/fZP+p2/S//RN+p++Sf/TN+l/+ib9FyI9u9z3n/8bbL+/VJd7HpfYov9S3uX97hNCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIkV6cCRcZAPh9fLnnJYQQQgghhBBCiH+dkPFyz0AIIYQQQgghhBD/9yGA0WAgggyQEVIgE2SGKyALXAlZ4SpIwNWQDa6B7HAt5ICckAtyQx64DvKCBQIHDDHkg/yQhBAAboCCUAgKQxHwUBSKwY1QHG6CEnAzlITU+QC3QmkoA2WhHNwG5eF2qAAVoRLcAZWhClSFanAnVIe7oAbcDTXhHqgF90JtuA/qwP1QFx6AevAg1IeHoAE8DA2hETSGJtD0v5T/PHSFF6AbdIce0BN6wYvQG/pAX+gH/eElGAAvw0B4BQbBYBgCr8JQeA2GweswHN6AEfAmjIRRMBrGwFh4C8bB2zAe3oEJ8C5MhEkwGabAVJgG0+E9mAHvw0z4AFIRYBbMhjkwF+bBRzAfFkAafAwL4RNYBIthCSyFZbAcVsBKWAWrYQ2shXWwHjbARtgEm2ELbIVtsB12wM6Ku+BT2A2fwR74HPbCF//J/NPwx/xOCAioUKFBgxkwA6ZgCmbGzJgFs2BWzIoJTGA2zIbZMTvmwByYC3NhHsyDeTEvEhIyMubDfJjEJBbAAlgQC2JhLIwePRbDYlgcb8ISWAJLYkkshaWwNJbBMlgOy2F5LI8VsAJWunU2AFbGqlgV78Q78S6sgTWwJtbEWlgLa2NtrIN1sC7WxXpYD+tjfWyADbAhNsTG2BibYlNshs2wOTbHltgSW2ErbI2tsQ22wbbYFtthO2yP7bEDdsCO2BE7YWfsjM/j8/gCvoDdsbLqib2wF/bG3tgX+2E/fAkH4Mv4Mr6Cg3AwDsFX8VV8DYfhKRyOb+AIHIHl1SgcjWOQ1Vs4DsfheByPE3ACTsRJOAmn4FSchtNxOs7A9/HCEZaKH+KHOBtn41ych/NwPi7ANEzDhXgaF+FiXIJLcRkux2W4ElfhSlyDa3ENrsf1uBE34mbcjFtxK27H7bgTd+Kn+Cl+hp/hINyLe3Ef7sP9uB8P4AE8iAfxEB7afAUAHsEjeBSP4jE8jifwOJ7Ek3gKT+MZPINn8Syew2fzfF1vZ6HVg0BdYJRRGVQGlaJSVGaVWWVRWVRWlVUlVEJlU9lUdpVd5VA5VC6VS+VReVRelVeRIsUqVvlUPpVUSVVAFVAFVUFVWBVWXnlVTBVTxVVxVUKVUCXVLaqUulWVVmVUC19OlVPlVUtfQVVUlVQlVVlVUVVVNVVNVVfVVQ1VQ9VUNVUtVUvVVvepOqon9sUH1IXO1FeDsYEagg1VI9VYNVGv4SOqmRqGzVUL1VI9pt7A4dhaNfNt1JOqrRqN7dTTKb+/0XVUz6lOqrPqop5XXVVz3011VxOxp+qlpmBv1Uf1Vf3UDKyiPsBUrKpeUYPUYDVEvarm4mtqmHpdDVdvqBHqTTVSjVKj1Rg1Vr2lxqm31Xj1jpqg3lUT1SQ1WU1RU9U0NV29p2ao99VM9YFKVR+qWWq2mqPmqnnqIzVfLVBp6mO1UH2iFqnFaolaqpap5WqFWqlWqdVqjVqr1qn1aoPaqDapzWqL2qq2qe1qh9qpdqlP1W71mdqjPld71Rfqwvv3fvWlOqC+UgfV1+qQ+kYdVt+qI+o7dVR1V8fUcXVC/aBOqh/VKXVanVE/qbPqZ3VO/aLOq6BAo1Zaa6MjnUFn1Ck6k86sr9BZ9JU6q75KJ/TVOpu+RmfX1+ocOqfOpXPrPPo6nVdbTdpp1rHOp/PrpL5eF9A36IK6kC6si2ivi+pi+kZdXN+kS+ibdUl9iy6lb9WldRldVpfTt+ny+nZdQVfUlfQdurKuoqvqavpOXV3fpWvou3VNfY+upe/VtfV9uo6+X9fVD+h6+kFdXz+kG+iHdUPdSDfWTXRT/Yhuph/VzXUL3VI/plvpx3Vr/YRuo5/UbfVTup1+WrfXz+gO+lndUT+nO+nOuov+RZ/XQXfT3XUP3VP30i/q3rqP7qv76f76JT1Av6wH6lf0ID1YDxnwqh6qX9PD9Ot6uH5Dj9Bv6pF6lB6tx+ix+i09Tr+tx+t39AT9rp6oJ+nJOiNM1dN0379Vmqkvnf/OH/Kn6Av5A3999o16k96st+itepvernfonXqX3qV36916j96j9+q9ep/ep/fr/fqAPqAP6oP6kD6kD+vD+og+oo/qo/qYPq5/0j/ok/pHfUqf1qf1T/qsPqvP/e01AINGGW2MiUwGk9GkmEwms7nCZDFXmqzmKpMwV5ts5hqT3VxrcpicJpfJbfKY60xeYw0ZZ9jEJp/Jb5LmelPA3GAKmkKmsClivClqipkbTcIg/DP5fzG/pZN/O6ZNU9PUNDPNTHPT3LQ0LU0r08q0Nq1NG9PGtDVtTTvTzrQ37U0H08F0NB1NJ9PJdDFdTFfT1XRDMD1MD9PLvGh6mz6mr+ln+puXzAAzwAw0A80gM8gMMUPMUDPUDDPDzHAz3BgAGGlGmtFmtBlrxppxZpwZb8abCWaCmWgmmslmsplqpprpZrqZYWaYmWamSTWpZpaZZeaYOWaemWfmm/kmzaSZhWahWWQWm8VmqVlqlpvlZqVZaVab1WatWWvWm/VmkdlkNpktZovZZraZHWaH2WV2md1mt9lj9pi9Zq/ZZ/aZ/Wa/OWAOmIPmoDlkDpnD5rA5Yo6Yo+aoOWaOmRPmhDlpTppT5pQ5Y86Ys+asOWfOmfPm/IXTvkhFKjKRiTJEGaKUKCXKHGWOskRZoqxR1igRJaJsUbYoe3RtlCPKGeWKckd5ouuivJGNKHIRR3GUL8ofJaProwLRDVHBqFBUOCoS+ahoVCy6MSoe3RSViG6OSka3RKWiW6PSUZmobFQuui0qH90eVYgqRpWiO6LKUZWoalQtujOqHt0V1YjujmpG90S1onuj2tF9UZ3o/qhu9EBUL3owqh89FDWIHo4aRo2ixlGTqOm/tH4Ip3I+6rvZ7jYj9LS97Iu2t+1j+9p+tr99yQ6wL9uB9hU7yA62Q+yrdqh9zQ6zr9vh9g07wr5pR9pRdrQdY8fat+w4+7Ydb9+xE+y7dqKdZCfbKXaqnWan2/fsDPu+nWk/sKn2QzvLzrZz7Fw7z35k59sFNs1+bBfaT+wiu9gusUvtMrvcrrAr7Sq72q6xa+06u95usBvtJrvZbrFb7Ta73e6wO+0u+6ndbT+ze+zndq/9wu6zv3/sfWUP2q/tIfuNPWy/tUfsd/ao/d4es8ftCfuDPWl/tKfsaXvG/mTP2p/tOfuLPW/DhZP7Cx/vZMhQBspAKZRCmSkzZaEslJWyUoISlI2yUXbKTjkoB+WiXJSH8lBeyksXMDHlo3yUpCQVoAJUkApSYSpMnjwVo2JUnIpTCSpBJakklaJSVJpKU1kqS7fRbXQ73U4VqSLdQXdQFapC1agaVafqVINqUE2qSbWoFtWm2lSH6lBdqkv1qB7Vp/rUgBpQQ2pIjakxNaWm1IyaUXNqTi2pJbWiVtSaWlMbakNtqS21o3bUntpTB+pAHakjdaJO1IW6UFfqSt2oG/WgHtSLelFv6k19qS/1p/40gAbQQBpIg2gQDaEhNJSG0jAaRsPpDRpBb9JIGkWjaQyNpbdoHI2j8TSeJtAEmkgTaTJNpqk0labTdJpBM2gmzaRUSqVZNIvm0ByaR/NoPs2nNEqjhbSQFtEiWkJLaBktoxW0glbRKlpDa2gdraMNtIE20SbaQltoG22jHbSDdtEu2k27aQ/tob20l/bRPtpP++kAHaCDdJAO0SE6TIfpCB2ho3SUjtExOkEn6CSdpFN0is7QGTpLP9M5+oXOU6AUl8lldle4LO5Kl9Vd5f5jnMvldnncdS6vsy6Hy/mHmJxzBV0hV9gVcd4VdcXcjX+KS7syrqwr525z5d3trsKf4uqrtv32g+juHlfN3emqu7tcDXe3q+nucbXcva62e8jVcQ+7uq6Rq+eauPruIdfAPewaukausWviWrnHXWv3hGvjnnRt3VN/iue7BW6VW+3WuLVut/vMnXE/ucPuW3fW/ey6ue6uv3vJDXAvu4HuFTfIDf5TPMK96Ua6UW60G+PGurf+FE92U9xUN81Nd++5Ge79P8Xz3Ecu1aW5WW62m+Pm/hpfmFOa+9gtdJ+4RW6xW+KWumVuuVvhVv59rkvderfBbXS73Kdui9vqtrntbofb+Wt8YR173Odur/vCHXLfuP3uS3fAHXEH3de/xhfWd8R95466790xd9ydcD+4k+5Hd8qd/nX9F9b+g/vFnXfBASMr1mw44gyckVM4E2fmKzgLX8lZ+SpO8NWcja/h7Hwt5+CcnItzcx6+jvOyZWLHzDHn4/yc5Ou5AN/ABbkQF+Yi7LkoF+MbuTjfxCX4Zi7Jt3ApvpVLcxkuy+X4Ni7Pt3MFrsiV+A6uzFW4KlfjO7k638U1+G6uyfdwLb6Xa/N9XIfv57r8ANfjB7k+P8QN+GFuyI24MTfhpvwIN+NHuTm34Jb8GLfix7k1P8Ft+Eluy09xO36a2/Mz3IGf5Y78HHfiztyFn+eu/AJ34+7cg3tyL36Re3Mf7sv9uD+/xAP4ZR7Ir/AgHsxD+FUeyq/xMH6dh/MbPILf5JE8ikfzGB7Lb/E4fpvH8zs8gd/liTyJJ/MUnsrTeDq/xzP4fZ7JH3Aqf8izeDbP4bk8jz/i+byA0/hjXsif8CJezEt4KS/j5byCV/IqXs1reC2v4/W8gTfyJt7MW3grI2/nHbyTd/GnvJs/4z38Oe/lL3gf/xvv5y/5AH/FB/lrPsTf8GH+lo/wd3yUv+djfJxP8A98kn/kU3yaz/BPfJZ/5nP8C5/nwBBjrGIdmziKM8QZ45Q4U5w5viLOEl8ZZ42vihPx1XG2+Jo4e3xtnCPOGeeKc8d54uvivLGNKXYxx3GcL84fJ+Pr4wLxDXHBuFBcOC4S+7hoXCy+MS4e3xSXiG+OS8a3xKXiW+PScZn4oXvKxbfF5ePb4wpxxbhSfEdcOa4SV42rxXfG1eO74hrx3XHN+J64RHxvXDu+L64T3x/XhQfievGDcf34obhB/HDcMG4UN46bxE3jR+Jm8aNx87hF3DJ+LG4VPx63jp+I28RPxm3jpy65v0fcM+4Vvxi/GIdwt56TnJucl/woOT+5IJmW/Di5MPlJclFycXJJcmlyWXJ5ckVyZXJVcnVyTXJtcl1yfXJDcmMyhGoZwaNXXnvjI5/BZ/QpPpPP7K/wWfyVPqu/yif81T6bv8Zn99f6HD6nz+Vz+zz+Op/XW0/eefaxz+fz+6S/3hfwN/iCvpAv7It474v6Yr6Jb+qb+mb+Ud/ct/At/WP+Mf+4f9w/4Z/wT/q2/infzj/t2/tnfAf/rH/WP+c7+c6+i3/ed/Uv+G6+u+/he/hevpfv7Xv7vr6v7+/7+wF+gB/oB/pBfpAf4of4oX6oH+aH+eF+uB/hR/iRfqQf7Uf7sX6sH+fH+fF+vJ/gJ/iJfqKf7Cf7qX6qn+6n+xl+hp/pZ/rUgql+lp/l5/g5fp6f5+f7+T7Np/mFfqFf5Bf5JX6JX+aX+RV+hV/lV/k1fo1f59f5DX6D3+Q3+S1+i9/mt/kdfoff5Xf53X633+P3+L1+r9/n950Jfr8/4L/yB/3X/pD/xh/23/oj/jt/1H/vj/nj/oT/wZ/0P/pT/rQ/43/yZ/3P/pz/xZ/3wY9LvJ0Yn3gnMSHxbmJiYlJicmJKYmpiWmJ64r3EjMT7iZmJDxKpiQ8TsxKzE3MScxPzEh8l5icWJNISHycWJj5JLEosTixJLE0sSyxPhHDdljjkC/lDMlwfCoQbQsFQKBQORYIPRUOxcGMoHm4KJcLNoWS4JZQKt4bSoUwoGx4ODUOj0Dg0CU3DI6FZeDQ0Dy1Cy/BYaBUeD63DE6FNeDK0DU+FduHp0D48EzqEZ0PH8FzoFDqHLuH50DW8ELoFHXqEnqFXeDH0Dn1C39Av9A8vhQHh5TAwvBIGhcFhSHg1DA2vhWHh9TA8IIwIb4aRYVQYHcYUaDnr6Qsni2F8eCdMCO+GiWFSmBymhKlhWpge3gszwvthZvggpIYPw6wwO8wJc8O88FGYHxaEtPBxWBg+CYvC4rAkLA2QsjysCCvDqrA6rAlrw7qwPmwIG8OmsDlsCVvDtrA97Ag7w67wadgdPgt7wudhb/gi7Av/FvaHL8OB8FU4GL4Oh8I34XD4NhwJ34Wj4ftwLBwPJ8IP4WT4MZwKp8OZ8FM4G34O58IvPc7L76wJIYQQQvxD9CX29/xDpP7+r/rbV3oBwJVbcx/8jzXX5fht3EflaZUAgCe7d3zg961y5R49evztsYs0RPlnA0DiYn4GuBgvhpbwOLSBFlD8fzu/PqrzWb5E/eQtAJn/XU4KXIwv1r/pL+qPSr1k/dkABfNfzMkEF+OL9Uv8qXb0a/2czS5RP9OX4wCa/7u8LHAxvli/GDwKT0GbPzxSCCGEEEIIIYT4TR9Vtv2lrm8vXJ/nMRdzMsLF+FLX50IIIYQQQgghhLj8nunc5YlH2rRp0f4vBhX/epcM0ssgw/8f07gcg0seIP+ZAcDlXs7fBwjw6y2+v37M5X5nEkIIIYQQQvyrXTzpv9wzEUIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQggh0q//F39y7HKvUQghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhLjc/lcAAAD//1YAItA=") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r10 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r10, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r10, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r10, 0x1, 0x41, &(0x7f0000000300)=0x80000039bc, 0x4) sendto$inet6(r10, &(0x7f0000000000)="8d", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000040)=0xf5, 0x4) recvmmsg(r10, &(0x7f0000007340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/3, 0x3}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000005dc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0}}], 0x3, 0x12121, 0x0) io_setup(0x5ff, &(0x7f0000000040)=0x0) io_submit(r11, 0x2, &(0x7f0000001d00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3, r0, &(0x7f0000000000)="96", 0x63, 0x0, 0x0, 0x0, r1}, &(0x7f0000000740)={0x0, 0x0, 0x41, 0x0, 0x774, r1, 0x0}]) [ 655.297927][T16826] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.2'. 11:59:27 executing program 1: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r2 = socket(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b9b41476a821b2b1bcbd2eadbafa736396f4038931b08be42e314087e5461bee729a2e6bec331b526a6186c9d05e460339a3694c584668f6bffa4499869e19a6bcb42467fb324d8098052191b2057eeaacbfdf8cbfa4d280998ed31945f34df149144a6f6cd3fb256153e4f0dc8dbb6bd3d7646613d9973a4112e0d0334129495c8b360715882428d7a472d33b4494a1f13639a7703be0fece29c7a0628e5d9168236d71bdc8b6368844a33de097e606550c31b782efaf8c21f5", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000001c0)={'bridge0\x00', 0x0}) setsockopt$packet_int(r5, 0x107, 0x8, &(0x7f0000000000)=0xf45, 0x4) sendto$packet(r5, &(0x7f00000000c0)="3f030e000300120006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r9, 0x1, 0x0, 0x6, @multicast}, 0x14) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r10}, 0x10) syz_pidfd_open(r0, 0x0) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000000)='./file0\x00', 0x8000, &(0x7f0000000180)=ANY=[], 0x2, 0x270, &(0x7f00000003c0)="$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") syz_mount_image$fuse(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, 0x0) r11 = socket$xdp(0x2c, 0x3, 0x0) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000cab000)=0x7) setuid(r13) setsockopt$XDP_UMEM_REG(r11, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xa00038c0, 0x1000}, 0x20) [ 655.344115][T16830] loop4: detected capacity change from 0 to 2048 [ 655.360323][T15454] EXT4-fs (loop1): unmounting filesystem. [ 655.380962][T16797] EXT4-fs (loop0): warning: mounting fs with errors, running e2fsck is recommended 11:59:28 executing program 3: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:28 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) [ 655.396943][T16830] EXT4-fs error (device loop4): ext4_orphan_get:1422: comm syz-executor.4: bad orphan inode 8192 [ 655.399337][T16826] loop2: detected capacity change from 0 to 512 [ 655.421116][T13508] EXT4-fs (loop3): unmounting filesystem. [ 655.423122][T16830] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 655.463319][T15351] EXT4-fs (loop4): unmounting filesystem. [ 655.479319][T16797] EXT4-fs (loop0): re-mounted. Quota mode: none. 11:59:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:28 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) [ 655.495949][T16826] EXT4-fs warning (device loop2): ext4_enable_quotas:6987: Failed to enable quota tracking (type=0, err=-22, ino=3). Please run e2fsck to fix. 11:59:28 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:28 executing program 4: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b70400000000000085000000070000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r3, &(0x7f0000000980), 0x12) 11:59:28 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:28 executing program 2: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 655.546042][T16826] EXT4-fs (loop2): mount failed [ 655.569521][T16836] loop1: detected capacity change from 0 to 256 11:59:28 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) clock_getres(0x0, 0x0) 11:59:28 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 11:59:28 executing program 3: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x0, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x2, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) [ 655.630274][T15438] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 11:59:28 executing program 0: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:28 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r2}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r4, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r3, 0x0, 0x4004) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r7}, 0x10) r8 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r9, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r9, 0xa, 0x12) poll(&(0x7f0000000100)=[{r10}], 0x1, 0x603) dup2(r9, r10) fcntl$setown(r10, 0x8, r8) tkill(r8, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 11:59:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = open$dir(&(0x7f0000000340)='./file0\x00', 0x210040, 0x10) getdents64(r3, &(0x7f00000004c0)=""/217, 0xd9) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x6, 0x4, &(0x7f0000002180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xc0, &(0x7f00000020c0)=""/192}, 0x80) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r12}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'veth0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r8, r13, 0x25, 0x0, @val=@tcx={@prog_fd}}, 0x40) close_range(r7, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_da_reserve_space\x00', r4}, 0x10) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r14, &(0x7f0000000040), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:28 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:28 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r3, &(0x7f0000000980), 0x12) [ 655.745248][T16872] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. 11:59:28 executing program 4: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r2 = socket(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b9b41476a821b2b1bcbd2eadbafa736396f4038931b08be42e314087e5461bee729a2e6bec331b526a6186c9d05e460339a3694c584668f6bffa4499869e19a6bcb42467fb324d8098052191b2057eeaacbfdf8cbfa4d280998ed31945f34df149144a6f6cd3fb256153e4f0dc8dbb6bd3d7646613d9973a4112e0d0334129495c8b360715882428d7a472d33b4494a1f13639a7703be0fece29c7a0628e5d9168236d71bdc8b6368844a33de097e606550c31b782efaf8c21f5", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000001c0)={'bridge0\x00', 0x0}) setsockopt$packet_int(r5, 0x107, 0x8, &(0x7f0000000000)=0xf45, 0x4) sendto$packet(r5, &(0x7f00000000c0)="3f030e000300120006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r9, 0x1, 0x0, 0x6, @multicast}, 0x14) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r10}, 0x10) syz_pidfd_open(r0, 0x0) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000000)='./file0\x00', 0x8000, &(0x7f0000000180)=ANY=[], 0x2, 0x270, &(0x7f00000003c0)="$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") syz_mount_image$fuse(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, 0x0) r11 = socket$xdp(0x2c, 0x3, 0x0) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000cab000)=0x7) setuid(r13) setsockopt$XDP_UMEM_REG(r11, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xa00038c0, 0x1000}, 0x20) 11:59:28 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r2 = socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000800)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2040d0, &(0x7f0000000c40)={[{@jqfmt_vfsv0}, {@nojournal_checksum}, {@barrier}, {@barrier}, {@test_dummy_encryption}, {@nomblk_io_submit}]}, 0xfb, 0x49f, &(0x7f0000001440)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="02010002080000000000000000000000030006000000000002000000ac1414aa00ebb46b1600000000000000030005000000000002000000ac1414000000000000000000fd6d567b9f6d454ab46fd8e3fe68c621ebe3d73dae"], 0x40}, 0x1, 0x7}, 0x0) sendmsg$key(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020900020200740b0000c2f8aec500007c602e8f03f8c3cceb5d0000cfdb70d1d370a591778c7b0c6519ae1f03b65b3699ec7ee89eb2858d8fff9bd7129df050c5790617e076ae9b9ee2e95c74d5a9d4324c2968f83afcda57007ae4a06541051622362565291a5f01556f4b92009da48b5bd2318cdf3f5937125f397efa40d89c13316759685bea0f79dba2842b568910b69622a1d7a532a4c2c2f7476a82e61d70372c6f456bc1ecf511ee9cf6d83139616bb01450f327f13b28ec99d1350c9eec92a1c66abbec3e804c85a2a0b026085a8d64591b7ccbb62c6913f3feb53119702ff607d8b4f88f229f628e69c08de7780d4bbeb2"], 0x10}}, 0x0) 11:59:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r2 = socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000800)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2040d0, &(0x7f0000000c40)={[{@jqfmt_vfsv0}, {@nojournal_checksum}, {@barrier}, {@barrier}, {@test_dummy_encryption}, {@nomblk_io_submit}]}, 0xfb, 0x49f, &(0x7f0000001440)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="02010002080000000000000000000000030006000000000002000000ac1414aa00ebb46b1600000000000000030005000000000002000000ac1414000000000000000000fd6d567b9f6d454ab46fd8e3fe68c621ebe3d73dae"], 0x40}, 0x1, 0x7}, 0x0) sendmsg$key(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020900020200740b0000c2f8aec500007c602e8f03f8c3cceb5d0000cfdb70d1d370a591778c7b0c6519ae1f03b65b3699ec7ee89eb2858d8fff9bd7129df050c5790617e076ae9b9ee2e95c74d5a9d4324c2968f83afcda57007ae4a06541051622362565291a5f01556f4b92009da48b5bd2318cdf3f5937125f397efa40d89c13316759685bea0f79dba2842b568910b69622a1d7a532a4c2c2f7476a82e61d70372c6f456bc1ecf511ee9cf6d83139616bb01450f327f13b28ec99d1350c9eec92a1c66abbec3e804c85a2a0b026085a8d64591b7ccbb62c6913f3feb53119702ff607d8b4f88f229f628e69c08de7780d4bbeb2"], 0x10}}, 0x0) [ 655.826650][T15359] EXT4-fs (loop0): unmounting filesystem. [ 655.856820][T16886] loop1: detected capacity change from 0 to 512 [ 655.871325][T16884] loop4: detected capacity change from 0 to 256 [ 655.883022][T16888] loop2: detected capacity change from 0 to 512 [ 655.891071][T16886] EXT4-fs: Ignoring removed nomblk_io_submit option [ 655.899096][T16886] EXT4-fs (loop1): Test dummy encryption mode enabled [ 655.909218][T16888] EXT4-fs: Ignoring removed nomblk_io_submit option [ 655.916705][T16888] EXT4-fs (loop2): Test dummy encryption mode enabled 11:59:28 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = open$dir(&(0x7f0000000340)='./file0\x00', 0x210040, 0x10) getdents64(r3, &(0x7f00000004c0)=""/217, 0xd9) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x6, 0x4, &(0x7f0000002180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xc0, &(0x7f00000020c0)=""/192}, 0x80) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r12}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'veth0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r8, r13, 0x25, 0x0, @val=@tcx={@prog_fd}}, 0x40) close_range(r7, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_da_reserve_space\x00', r4}, 0x10) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r14, &(0x7f0000000040), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:28 executing program 4: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) r3 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r3, 0x0, 0x0, 0x0) [ 655.926240][T16886] EXT4-fs error (device loop1): ext4_orphan_get:1396: inode #17: comm syz-executor.1: iget: bogus i_mode (0) [ 655.938770][T16886] EXT4-fs error (device loop1): ext4_orphan_get:1401: comm syz-executor.1: couldn't read orphan inode 17 (err -117) [ 655.952601][T15858] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 655.955950][T16888] EXT4-fs error (device loop2): ext4_orphan_get:1396: inode #17: comm syz-executor.2: iget: bogus i_mode (0) 11:59:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x2, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) [ 656.032236][T16886] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 656.050712][T16886] EXT4-fs error (device loop1): ext4_validate_block_bitmap:429: comm syz-executor.1: bg 0: block 7: invalid block bitmap [ 656.063295][T16888] EXT4-fs error (device loop2): ext4_orphan_get:1401: comm syz-executor.2: couldn't read orphan inode 17 (err -117) 11:59:28 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r2}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r4, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r3, 0x0, 0x4004) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r7}, 0x10) r8 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r9, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r9, 0xa, 0x12) poll(&(0x7f0000000100)=[{r10}], 0x1, 0x603) dup2(r9, r10) fcntl$setown(r10, 0x8, r8) tkill(r8, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 11:59:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) [ 656.081757][T16888] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 656.102056][T15454] EXT4-fs (loop1): unmounting filesystem. 11:59:28 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r3, &(0x7f0000000980), 0x12) 11:59:28 executing program 2: io_setup(0x7, &(0x7f0000000280)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r4}, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r5, 0x4c80, 0xffffffffffffffb6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r7 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xe2, 0x54, 0x46, 0x10, 0x23a7, 0xfedc, 0xe00b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x3, 0x42}}]}}]}}, 0x0) syz_usb_control_io(r7, &(0x7f00000004c0)={0x2c, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00031a0000001a03b8ff9998a3c8bb61a15ee63c82775354459a16a294827d8f"], 0x0, 0x0, 0x0}, 0x0) [ 656.150716][T16906] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. [ 656.163520][T16888] EXT4-fs error (device loop2): ext4_validate_block_bitmap:429: comm syz-executor.2: bg 0: block 7: invalid block bitmap 11:59:28 executing program 4: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x0, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:28 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r2 = socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000800)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2040d0, &(0x7f0000000c40)={[{@jqfmt_vfsv0}, {@nojournal_checksum}, {@barrier}, {@barrier}, {@test_dummy_encryption}, {@nomblk_io_submit}]}, 0xfb, 0x49f, &(0x7f0000001440)="$eJzs3E1oHFUcAPD/bJJW+5VY60dr1WgVix9Jm1bbg+AHCB5UBD3U45qmpXbbSBPBlGCjlHoRtCBeRfEiePbgyZOoJ8GLB71LoUgurZ5WZndm3Xzsh9tNNx+/H0znvcnbfe/NzJt5b15nA9iwhtN/kohtEfF7RAxGRGFxguHq6vr87Pjf87PjSZTLr/2VpB+La/Oz43nSJFtvrUb601XhYhLPLpPv1Mz508VSaeJcFh+dPvP26NTM+SdOnSmenDg5cXbs6NHDhw4eeWrsya7U87a0rHvem9y7+8U3Lr88fuzymz99k9QVur4e3TEQc3X7ZLGHu5tZz22vCyf9TZMWVrwwtG1zRKWhDlTa/2D0XdxR+9tgvPBBTwsHrKhyuVwea/znuTKwjiXR6xIAvZHf6K/NfzaejoG7Pw5e3a4+Vx0ApfW+ni3VQU9/baA6sGh8202zEXFs7p/P0yVW5DkEAMBC36f9n8er/Y6F/b9C3FmXbkc2NzSUzaXsjIjbI2JXRNwRUUl7V0Tc/T/zH14UX9r/KVzpqGJtSvt/T2dzW/mS5ZsnGerLYtsr9R9ITpwqTRzI9sn+GNicxg8u++1JVCaB4tePG+U/XNf/S5c0/7wvmJXjSv/mhZ85Xpwu3nDFM1ffj9jTv1z9swm8bA5rd0Ts6TCPU49+vXfhlr5aqHX9m2g+z9SW8hcRj1SP/1wsqn8uaT4/OXpLlCYOjOZnxVI//3Lp1Ub531D9uyA9/luWPf9r9R9K6udrp5Z8xaZWeVz648OGY5rhiGeig/N/U/L6gszfLU5PnzsYsSl5aen2ugfceTxPn9Z//77l2//O+G9P3BMR6Ul8b0TcFxH3Z8fugYh4MCL2Nan/j88/9FaT+vf0+Ed2hWrr+OfHoXoi1M6IVoG+0z981yjz9q5/hyuh/dmWdq5/7Raww30GAAAAa0ohIrZFUhiphQuFkZHq/+HfFVsKpcmp6cdOTL5z9nj1HYGhGCjkT7oGs3hkzz+HqvHK6Husso64kD0vPZQ9N/6079ZKfGR8snS815WHDW5rg/af+rOv16UDVlwX5tGANapZ+//yyE0sCHDTdX7/13OAta5FK/aDDbCOuYvDxrVc+7/Qg3IAN1/j+/+ErgGsc7VG/kkbiete91r88iaw9rjJw8bVuv2/slK/fwX0Tvtv8a+WQJIs2BJfRTT/VNL7MncQ+Gh1FKNxIAqrohgdB4qroxitAnlDnTl/ur/tX7WYKV8olkq/fXsjuff2ugQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANAt/wYAAP//73DflA==") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="02010002080000000000000000000000030006000000000002000000ac1414aa00ebb46b1600000000000000030005000000000002000000ac1414000000000000000000fd6d567b9f6d454ab46fd8e3fe68c621ebe3d73dae"], 0x40}, 0x1, 0x7}, 0x0) sendmsg$key(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020900020200740b0000c2f8aec500007c602e8f03f8c3cceb5d0000cfdb70d1d370a591778c7b0c6519ae1f03b65b3699ec7ee89eb2858d8fff9bd7129df050c5790617e076ae9b9ee2e95c74d5a9d4324c2968f83afcda57007ae4a06541051622362565291a5f01556f4b92009da48b5bd2318cdf3f5937125f397efa40d89c13316759685bea0f79dba2842b568910b69622a1d7a532a4c2c2f7476a82e61d70372c6f456bc1ecf511ee9cf6d83139616bb01450f327f13b28ec99d1350c9eec92a1c66abbec3e804c85a2a0b026085a8d64591b7ccbb62c6913f3feb53119702ff607d8b4f88f229f628e69c08de7780d4bbeb2"], 0x10}}, 0x0) 11:59:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = open$dir(&(0x7f0000000340)='./file0\x00', 0x210040, 0x10) getdents64(r3, &(0x7f00000004c0)=""/217, 0xd9) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x6, 0x4, &(0x7f0000002180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xc0, &(0x7f00000020c0)=""/192}, 0x80) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r12}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'veth0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r8, r13, 0x25, 0x0, @val=@tcx={@prog_fd}}, 0x40) close_range(r7, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_da_reserve_space\x00', r4}, 0x10) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r14, &(0x7f0000000040), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 656.210826][ T5262] EXT4-fs (loop2): unmounting filesystem. 11:59:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) [ 656.270744][T16899] bridge0: port 1(bridge_slave_0) entered blocking state [ 656.281194][T16899] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.302700][T16899] device bridge_slave_0 entered promiscuous mode [ 656.312758][T16923] loop1: detected capacity change from 0 to 512 11:59:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r2, &(0x7f0000000980), 0x12) [ 656.314307][T16899] bridge0: port 2(bridge_slave_1) entered blocking state [ 656.326721][T16899] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.335624][T16899] device bridge_slave_1 entered promiscuous mode [ 656.346447][T16923] EXT4-fs: Ignoring removed nomblk_io_submit option [ 656.357764][T16923] EXT4-fs (loop1): Test dummy encryption mode enabled 11:59:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r2 = socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000800)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2040d0, &(0x7f0000000c40)={[{@jqfmt_vfsv0}, {@nojournal_checksum}, {@barrier}, {@barrier}, {@test_dummy_encryption}, {@nomblk_io_submit}]}, 0xfb, 0x49f, &(0x7f0000001440)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="02010002080000000000000000000000030006000000000002000000ac1414aa00ebb46b1600000000000000030005000000000002000000ac1414000000000000000000fd6d567b9f6d454ab46fd8e3fe68c621ebe3d73dae"], 0x40}, 0x1, 0x7}, 0x0) sendmsg$key(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020900020200740b0000c2f8aec500007c602e8f03f8c3cceb5d0000cfdb70d1d370a591778c7b0c6519ae1f03b65b3699ec7ee89eb2858d8fff9bd7129df050c5790617e076ae9b9ee2e95c74d5a9d4324c2968f83afcda57007ae4a06541051622362565291a5f01556f4b92009da48b5bd2318cdf3f5937125f397efa40d89c13316759685bea0f79dba2842b568910b69622a1d7a532a4c2c2f7476a82e61d70372c6f456bc1ecf511ee9cf6d83139616bb01450f327f13b28ec99d1350c9eec92a1c66abbec3e804c85a2a0b026085a8d64591b7ccbb62c6913f3feb53119702ff607d8b4f88f229f628e69c08de7780d4bbeb2"], 0x10}}, 0x0) [ 656.370606][T16923] EXT4-fs error (device loop1): ext4_orphan_get:1396: inode #17: comm syz-executor.1: iget: bogus i_mode (0) [ 656.406115][T16923] EXT4-fs error (device loop1): ext4_orphan_get:1401: comm syz-executor.1: couldn't read orphan inode 17 (err -117) [ 656.425304][T16930] loop0: detected capacity change from 0 to 512 [ 656.430303][T16923] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 656.445048][T16930] EXT4-fs: Ignoring removed nomblk_io_submit option [ 656.462543][T16930] EXT4-fs (loop0): Test dummy encryption mode enabled 11:59:29 executing program 4: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) r3 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r3, 0x0, 0x0, 0x0) 11:59:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r2}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r4, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r3, 0x0, 0x4004) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r7}, 0x10) r8 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r9, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r9, 0xa, 0x12) poll(&(0x7f0000000100)=[{r10}], 0x1, 0x603) dup2(r9, r10) fcntl$setown(r10, 0x8, r8) tkill(r8, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') [ 656.472014][T16923] EXT4-fs error (device loop1): ext4_validate_block_bitmap:429: comm syz-executor.1: bg 0: block 7: invalid block bitmap 11:59:29 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x2000480, &(0x7f0000000100), 0x5, 0x75b, &(0x7f0000000800)="$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") r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fallocate(r0, 0x4, 0x0, 0x1000f4) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = socket$can_raw(0x1d, 0x3, 0x1) r7 = syz_io_uring_complete(0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0}) mknodat$loop(r7, &(0x7f0000001700)='./file0\x00', 0x6000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000500)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r6, 0xd000943e, &(0x7f0000000700)={r8, r9, "2fa9ded8a90da7abd76cf26df28a53ba5babf4f34cc7dfaac95e9567a07004fd899de74f3f0ecce50be89f58e4b160f6bb1f7224ea8d9c8de088c2496bb8684d533e9754c4b221f47a0638b5ea8ea78d1ffc6bd226bb73b16b97d87a08574e5e5872e66f1c2252e748f01bf86ed860ce2e0462922f351c047e7d1f608682644132e9f9ee90d466dedf9d22beb42e7dad8a82eb8479853fe0cbe44fb9ba42c255e81d0bb701ac7f599b9ab0c14550e6f167c3405fa7349c0f5f8ad673e0b2d75efa00389264f958377c8af6f1ad516363aa14be9e064fcfcd10783d60ee765544e293ae79ef8b2f55100a59a68764aae0895df23c13a2375e9e26ee8fd8f0b4e3", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r5, 0xc0709411, &(0x7f0000000240)={{r9, 0x8, 0x1, 0x4, 0x42, 0x1000, 0x1, 0x40, 0x2, 0x8, 0x80000000, 0xffff, 0x0, 0x2, 0x6}, 0x20, [0x0, 0x0, 0x0, 0x0]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x64, 0x0, 0x0) syz_mount_image$exfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB='dmask=00000000000000000000004,utf8,iocharset=default,iocharset=cp932,dmask=00000000000000000000002,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c6572726f72733d639f6e74696e75652c643d0000", @ANYRESHEX=0x0, @ANYBLOB=',errors=remount-ro,gid=', @ANYRESHEX=0x0, @ANYBLOB=',namecase=1,\x00'], 0x1, 0x1517, &(0x7f0000000340)="$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") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r10 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r10, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r10, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r10, 0x1, 0x41, &(0x7f0000000300)=0x80000039bc, 0x4) sendto$inet6(r10, &(0x7f0000000000)="8d", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000040)=0xf5, 0x4) recvmmsg(r10, &(0x7f0000007340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/3, 0x3}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000005dc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0}}], 0x3, 0x12121, 0x0) io_setup(0x5ff, &(0x7f0000000040)=0x0) io_submit(r11, 0x2, &(0x7f0000001d00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3, r0, &(0x7f0000000000)="96", 0x63, 0x0, 0x0, 0x0, r1}, &(0x7f0000000740)={0x0, 0x0, 0x41, 0x0, 0x774, r1, 0x0}]) [ 656.518397][T15454] EXT4-fs (loop1): unmounting filesystem. [ 656.518900][T16930] EXT4-fs error (device loop0): ext4_orphan_get:1396: inode #17: comm syz-executor.0: iget: bogus i_mode (0) [ 656.543569][ T629] usb 3-1: new high-speed USB device number 87 using dummy_hcd [ 656.554275][T16930] EXT4-fs error (device loop0): ext4_orphan_get:1401: comm syz-executor.0: couldn't read orphan inode 17 (err -117) [ 656.581028][T16930] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 656.598275][T16936] loop4: detected capacity change from 0 to 2048 [ 656.619519][T16930] EXT4-fs error (device loop0): ext4_validate_block_bitmap:429: comm syz-executor.0: bg 0: block 7: invalid block bitmap [ 656.626304][T16899] bridge0: port 2(bridge_slave_1) entered blocking state [ 656.646230][T16899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 656.655374][T16899] bridge0: port 1(bridge_slave_0) entered blocking state 11:59:29 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r1}, 0x10) socket$netlink(0x10, 0x3, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) [ 656.665304][T16899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 656.683512][T16938] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. [ 656.696319][T16936] EXT4-fs error (device loop4): ext4_orphan_get:1422: comm syz-executor.4: bad orphan inode 8192 11:59:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) readv(r2, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x8001, 0x84, 0x105}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") writev(r6, &(0x7f00000002c0)=[{&(0x7f0000000280)='2', 0x1}], 0x1) write$cgroup_devices(r1, &(0x7f0000000140)=ANY=[], 0xffdd) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000280), 0x1, 0x784, &(0x7f00000007c0)="$eJzs3c1rHOUfAPDvbJKmSfv7JYKg9RQQNFC6MTW2Ch4qHkSwUNCz7bLZhppNtmQ3pQkBW0TwIqh4EPTSsy/15tWXq/4XHqSlalqseJDI7Eu7bXbTTZvdDeTzgck+z8xsnue7z8wzz+wMOwHsWRPpn0zEoYj4KIkYq89PImKomhqMOFFb7/b6Wj6dktjYePOPpLrOrfW1fDS9J3WgnnkyIn58P+JwZnO55ZXV+VyxWFiq56cqC+enyiurR84t5OYKc4XFY9MzM0ePv3D82M7F+tcvqwevf/zas9+c+Oe9J65++FMSJ+JgfVlzHDtlIibqn8lQ+hHe49WdLqzPkn5XgIeS7poDtb08DsVYDFRTbYz0smYAQLe8GxEbAMAekzj+A8Ae0/ge4Nb6Wr4x9fcbid668UpE7K/F37i+WVsyWL9mt796HXT0VnLPlZEkIsZ3oPyJiPjiu7e/Sqfo0nVIgFYuXY6IM+MTm/v/ZNM9C9v13FYLN4arLxP3zdb/Qe98n45/Xmw1/svcGf9Ei/HPcIt992E8eP/PXNuBYtpKx38vN93bdrsp/rrxgXruf9Ux31By9lyxkPZt/4+IyRgaTvPT1VVb3wU1efPfm+3Kbx7//fnJO1+m5aevd9fIXBscvvc9s7lK7lHjbrhxOeKpwVbxJ3faP2kz/j3VYRmvv/TB5+2WpfGn8TamzfF318aViGdatv/dtky2vD9xqro5TDU2iha+/fWz0XblN7d/OqXlN84FeiFt/9Gt4x9Pmu/XLG+/jJ+vjP3QbtmD42+9/e9L3qqm99XnXcxVKkvTEfuSNzbPP3r3vY18Y/00/smnW+//W23/6TnhmQ7jH7z++9cPH393pfHPbqv9t5+4ent+oF35nbX/TDU1WZ/TSf/XaQUf5bMDAAAAAAAAAAAAAAAAAAAAAAAAgE5lIuJgJJnsnXQmk83WnuH9eIxmiqVy5fDZ0vLibFSflT0eQ5nGT12ONf0e6nT99/Ab+aP35Z+PiMci4tPhkWo+my8VZ/sdPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADUHWjz/P/Ub8P9rh0A0DX7+10BAKDnHP8BYO/Z3vF/pGv1AAB6x/k/AOw9HR//z3S3HgBA7zj/BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoMtOnTyZTht/r6/l0/zshZXl+dKFI7OF8nx2YTmfzZeWzmfnSqW5YiGbLy20/UeXai/FUun8TCwuX5yqFMqVqfLK6umF0vJi5fS5hdxc4XRhqGeRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDnyiur87lisbAksWViZHdUY9ckBmNXVEOia4nmXmKkfx0UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwC73XwAAAP//+Lkq2Q==") r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xffffffb2}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r9, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000024c0)={0x14, r10, 0x1}, 0x14}}, 0x0) sendmsg$WG_CMD_GET_DEVICE(r6, &(0x7f00000006c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r10, 0x100, 0x70bd25, 0x25dfdbff, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x40010) r11 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r11, 0x7, 0x0, 0x0, 0x0) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[], 0xffdd) [ 656.721302][T15359] EXT4-fs (loop0): unmounting filesystem. [ 656.722408][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 656.739224][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.746481][T16936] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 656.755487][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.780727][T15572] device bridge_slave_1 left promiscuous mode [ 656.789004][T15572] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.798988][ T629] usb 3-1: Using ep0 maxpacket: 16 [ 656.804956][T15572] device bridge_slave_0 left promiscuous mode [ 656.811944][T15572] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.822195][T15572] device veth1_macvtap left promiscuous mode 11:59:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x0, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) [ 656.828405][T15572] device veth0_vlan left promiscuous mode 11:59:29 executing program 1: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:29 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 11:59:29 executing program 1: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = socket(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b9b41476a821b2b1bcbd2eadbafa736396f4038931b08be42e314087e5461bee729a2e6bec331b526a6186c9d05e460339a3694c584668f6bffa4499869e19a6bcb42467fb324d8098052191b2057eeaacbfdf8cbfa4d280998ed31945f34df149144a6f6cd3fb256153e4f0dc8dbb6bd3d7646613d9973a4112e0d0334129495c8b360715882428d7a472d33b4494a1f13639a7703be0fece29c7a0628e5d9168236d71bdc8b6368844a33de097e606550c31b782efaf8c21f5", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:29 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 11:59:29 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) [ 656.991215][T15351] EXT4-fs (loop4): unmounting filesystem. [ 657.000289][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 657.015349][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 657.030500][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.037850][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 657.041220][T16946] loop0: detected capacity change from 0 to 512 [ 657.070202][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 11:59:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r2}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r4, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r3, 0x0, 0x4004) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r7}, 0x10) r8 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r9, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r9, 0xa, 0x12) poll(&(0x7f0000000100)=[{r10}], 0x1, 0x603) dup2(r9, r10) fcntl$setown(r10, 0x8, r8) tkill(r8, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') [ 657.087127][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 657.102939][T16946] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 657.103200][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.121275][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 657.129945][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 11:59:29 executing program 4: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 657.139813][ T629] usb 3-1: New USB device found, idVendor=23a7, idProduct=fedc, bcdDevice=e0.0b [ 657.157048][T16946] EXT4-fs (loop0): orphan cleanup on readonly fs [ 657.157960][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 11:59:29 executing program 4: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000001080)={0x200000, 0x200000}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r2, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x4, r3}, 0x10) [ 657.185412][ T629] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 657.197966][ T629] usb 3-1: Product: syz [ 657.207241][ T629] usb 3-1: Manufacturer: syz [ 657.213972][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 657.225948][ T629] usb 3-1: SerialNumber: syz 11:59:29 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) [ 657.236553][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 657.244445][T16946] EXT4-fs error (device loop0): ext4_read_block_bitmap_nowait:511: comm syz-executor.0: Block bitmap for bg 0 marked uninitialized [ 657.245921][ T629] usb 3-1: config 0 descriptor?? [ 657.266856][T16965] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. 11:59:29 executing program 4: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = socket(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b9b41476a821b2b1bcbd2eadbafa736396f4038931b08be42e314087e5461bee729a2e6bec331b526a6186c9d05e460339a3694c584668f6bffa4499869e19a6bcb42467fb324d8098052191b2057eeaacbfdf8cbfa4d280998ed31945f34df149144a6f6cd3fb256153e4f0dc8dbb6bd3d7646613d9973a4112e0d0334129495c8b360715882428d7a472d33b4494a1f13639a7703be0fece29c7a0628e5d9168236d71bdc8b6368844a33de097e606550c31b782efaf8c21f5", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) [ 657.299918][ T7551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 657.311530][T16946] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 657.315406][ T7551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 657.324173][T16946] EXT4-fs (loop0): 1 orphan inode deleted [ 657.339424][T16946] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. 11:59:30 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:30 executing program 1: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) r3 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r3, 0x0, 0x0, 0x0) [ 657.342163][ T7551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 657.356173][ T7551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 657.373687][ T8363] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 11:59:30 executing program 1: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:30 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000001080)={0x200000, 0x200000}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r2, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x4, r3}, 0x10) 11:59:30 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000640)=ANY=[@ANYBLOB="1201000000000010c41090ea40000000000109022400010000000009040000010301000009210000000122050009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000380)={0x24, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="002205"], 0x0}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000340)={0x2c, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x20, 0x1, 0x3, "97a796"}, 0x0}) close(0xffffffffffffffff) syz_usb_control_io(r0, 0x0, &(0x7f0000001100)={0x84, &(0x7f0000000040)=ANY=[@ANYBLOB="e5301e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) [ 657.402291][ T8363] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 657.426690][T16899] device veth0_vlan entered promiscuous mode 11:59:30 executing program 1: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = socket(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b9b41476a821b2b1bcbd2eadbafa736396f4038931b08be42e314087e5461bee729a2e6bec331b526a6186c9d05e460339a3694c584668f6bffa4499869e19a6bcb42467fb324d8098052191b2057eeaacbfdf8cbfa4d280998ed31945f34df149144a6f6cd3fb256153e4f0dc8dbb6bd3d7646613d9973a4112e0d0334129495c8b360715882428d7a472d33b4494a1f13639a7703be0fece29c7a0628e5d9168236d71bdc8b6368844a33de097e606550c31b782efaf8c21f5", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r2}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r4, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r3, 0x0, 0x4004) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r7}, 0x10) r8 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r9, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r9, 0xa, 0x12) poll(&(0x7f0000000100)=[{r10}], 0x1, 0x603) dup2(r9, r10) fcntl$setown(r10, 0x8, r8) tkill(r8, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') [ 657.456951][ T8363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 657.472475][ T8363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 657.486433][T16899] device veth1_macvtap entered promiscuous mode [ 657.515322][T16993] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. [ 657.521600][T16946] EXT4-fs (loop0): warning: mounting fs with errors, running e2fsck is recommended [ 657.540747][T16946] EXT4-fs (loop0): re-mounted. Quota mode: none. [ 657.548432][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 657.561317][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 657.576044][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 657.591740][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 657.600618][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 657.691714][T15359] EXT4-fs (loop0): unmounting filesystem. [ 657.809872][ T629] usb 3-1: MIDIStreaming interface descriptor not found [ 657.824295][ T629] usb 3-1: USB disconnect, device number 87 11:59:31 executing program 0: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) r3 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r3, 0x0, 0x0, 0x0) 11:59:31 executing program 2: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) clock_getres(0x0, 0x0) 11:59:31 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:31 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:31 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000001080)={0x200000, 0x200000}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r2, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x4, r3}, 0x10) 11:59:31 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 11:59:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r2}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r4, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r3, 0x0, 0x4004) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r7}, 0x10) r8 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r9, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r9, 0xa, 0x12) poll(&(0x7f0000000100)=[{r10}], 0x1, 0x603) dup2(r9, r10) fcntl$setown(r10, 0x8, r8) tkill(r8, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x20081e, &(0x7f0000000580), 0x1, 0x4fc, &(0x7f0000001400)="$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") lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 11:59:31 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x0, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:31 executing program 1: io_setup(0x7, &(0x7f0000000280)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r4}, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r5, 0x4c80, 0xffffffffffffffb6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r6}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r7 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xe2, 0x54, 0x46, 0x10, 0x23a7, 0xfedc, 0xe00b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x3, 0x42}}]}}]}}, 0x0) syz_usb_control_io(r7, &(0x7f00000004c0)={0x2c, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00031a0000001a03b8ff9998a3c8bb61a15ee63c82775354459a16a294827d8f"], 0x0, 0x0, 0x0}, 0x0) 11:59:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) clock_getres(0x0, 0x0) 11:59:31 executing program 0: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) r3 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r3, 0x0, 0x0, 0x0) 11:59:31 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:31 executing program 3: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 658.435291][T17011] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.2'. 11:59:31 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r2}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r4, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r3, 0x0, 0x4004) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r7}, 0x10) r8 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r9, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r9, 0xa, 0x12) poll(&(0x7f0000000100)=[{r10}], 0x1, 0x603) dup2(r9, r10) fcntl$setown(r10, 0x8, r8) tkill(r8, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x20081e, &(0x7f0000000580), 0x1, 0x4fc, &(0x7f0000001400)="$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") lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 11:59:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x2}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) [ 658.520314][T17025] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. [ 658.538201][T17011] loop2: detected capacity change from 0 to 512 [ 658.557394][T17011] EXT4-fs warning (device loop2): ext4_enable_quotas:6987: Failed to enable quota tracking (type=0, err=-22, ino=3). Please run e2fsck to fix. [ 658.574499][T17011] EXT4-fs (loop2): mount failed [ 658.591007][T17025] loop3: detected capacity change from 0 to 512 11:59:31 executing program 0: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = socket(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b9b41476a821b2b1bcbd2eadbafa736396f4038931b08be42e314087e5461bee729a2e6bec331b526a6186c9d05e460339a3694c584668f6bffa4499869e19a6bcb42467fb324d8098052191b2057eeaacbfdf8cbfa4d280998ed31945f34df149144a6f6cd3fb256153e4f0dc8dbb6bd3d7646613d9973a4112e0d0334129495c8b360715882428d7a472d33b4494a1f13639a7703be0fece29c7a0628e5d9168236d71bdc8b6368844a33de097e606550c31b782efaf8c21f5", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:31 executing program 0: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 658.603282][T17025] EXT4-fs warning (device loop3): ext4_enable_quotas:6987: Failed to enable quota tracking (type=0, err=-22, ino=3). Please run e2fsck to fix. [ 658.625328][T17025] EXT4-fs (loop3): mount failed 11:59:31 executing program 2: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:31 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:31 executing program 3: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x0, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:31 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:31 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r2}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r4, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r3, 0x0, 0x4004) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r7}, 0x10) r8 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r9, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r9, 0xa, 0x12) poll(&(0x7f0000000100)=[{r10}], 0x1, 0x603) dup2(r9, r10) fcntl$setown(r10, 0x8, r8) tkill(r8, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x20081e, &(0x7f0000000580), 0x1, 0x4fc, &(0x7f0000001400)="$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") lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 11:59:31 executing program 0: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:31 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:31 executing program 2: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 658.739767][ T60] usb 2-1: new high-speed USB device number 98 using dummy_hcd [ 658.812935][T17059] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. [ 658.881834][T17059] loop3: detected capacity change from 0 to 512 [ 658.891469][T17059] EXT4-fs warning (device loop3): ext4_enable_quotas:6987: Failed to enable quota tracking (type=0, err=-22, ino=3). Please run e2fsck to fix. [ 658.907724][T17059] EXT4-fs (loop3): mount failed [ 658.989802][ T60] usb 2-1: Using ep0 maxpacket: 16 [ 659.269948][ T60] usb 2-1: New USB device found, idVendor=23a7, idProduct=fedc, bcdDevice=e0.0b [ 659.281966][ T60] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 659.291462][ T60] usb 2-1: Product: syz [ 659.295424][ T60] usb 2-1: Manufacturer: syz [ 659.301087][ T60] usb 2-1: SerialNumber: syz [ 659.308901][ T60] usb 2-1: config 0 descriptor?? [ 659.829885][ T60] usb 2-1: MIDIStreaming interface descriptor not found [ 659.839229][ T60] usb 2-1: USB disconnect, device number 98 [ 659.848571][T15501] udevd[15501]: error opening ATTR{/sys/devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/sound/card0/controlC0/../uevent} for writing: No such file or directory 11:59:33 executing program 4: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:33 executing program 0: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = socket(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b9b41476a821b2b1bcbd2eadbafa736396f4038931b08be42e314087e5461bee729a2e6bec331b526a6186c9d05e460339a3694c584668f6bffa4499869e19a6bcb42467fb324d8098052191b2057eeaacbfdf8cbfa4d280998ed31945f34df149144a6f6cd3fb256153e4f0dc8dbb6bd3d7646613d9973a4112e0d0334129495c8b360715882428d7a472d33b4494a1f13639a7703be0fece29c7a0628e5d9168236d71bdc8b6368844a33de097e606550c31b782efaf8c21f5", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r2}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r4, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r3, 0x0, 0x4004) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r7}, 0x10) r8 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r9, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r9, 0xa, 0x12) poll(&(0x7f0000000100)=[{r10}], 0x1, 0x603) dup2(r9, r10) fcntl$setown(r10, 0x8, r8) tkill(r8, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x20081e, &(0x7f0000000580), 0x1, 0x4fc, &(0x7f0000001400)="$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") lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 11:59:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r1, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x0, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) 11:59:33 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:33 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:33 executing program 1: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x0, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r2 = getpid() r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r1}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r3, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r2, 0x0, 0x4004) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r6}, 0x10) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r7, 0xa, 0x12) poll(&(0x7f0000000100)=[{r8}], 0x1, 0x603) dup2(r7, r8) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') [ 660.483989][T17071] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.2'. 11:59:33 executing program 1: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = socket(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b9b41476a821b2b1bcbd2eadbafa736396f4038931b08be42e314087e5461bee729a2e6bec331b526a6186c9d05e460339a3694c584668f6bffa4499869e19a6bcb42467fb324d8098052191b2057eeaacbfdf8cbfa4d280998ed31945f34df149144a6f6cd3fb256153e4f0dc8dbb6bd3d7646613d9973a4112e0d0334129495c8b360715882428d7a472d33b4494a1f13639a7703be0fece29c7a0628e5d9168236d71bdc8b6368844a33de097e606550c31b782efaf8c21f5", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x0, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) 11:59:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) 11:59:33 executing program 1: io_setup(0x7, &(0x7f0000000280)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r4}, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r5, 0x4c80, 0xffffffffffffffb6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r7 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xe2, 0x54, 0x46, 0x10, 0x23a7, 0xfedc, 0xe00b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x3, 0x42}}]}}]}}, 0x0) syz_usb_control_io(r7, &(0x7f00000004c0)={0x2c, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00031a0000001a03b8ff9998a3c8bb61a15ee63c82775354459a16a294827d8f"], 0x0, 0x0, 0x0}, 0x0) 11:59:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r1, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) [ 660.551379][T17084] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. [ 660.576027][T17071] loop2: detected capacity change from 0 to 512 11:59:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x0, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) 11:59:33 executing program 0: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:33 executing program 0: r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000002c0)=ANY=[@ANYBLOB="1201040000002f2057155081ed29010203010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000c00)={0x84, &(0x7f00000007c0)={0x0, 0x8, 0x1, "ab"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000959800001801000020a07025000000fffe20202027ea000000000000bfa100000000000007010000f0ffffffb702000005000000b7030000000000008500000073000000957ef7364b7691b9f9de2e59f30933142ccee3113865fc315fb19ece5addc2e9b1bc4dd3c8f72619e99964501a9bcb7b6473ff88f34006150044c600cc5698912c34f9e9bd2b617e30b7b600040000bf55e5e9554fbb7a4700348ce443c18df784f5f9b06e77628004f5c01b105e5d04e3410f5b09e2d17f8de69197fc694eb9"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x8, 0x108}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000160000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r3}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7103}) syz_usb_control_io$printer(r0, &(0x7f00000001c0)={0x14, &(0x7f0000000cc0)=ANY=[@ANYBLOB="200c56000000560ff7962f5ab5c0c4964b3c68554b3689615af41a75c574f001cb6cb94b93ec8753e43d45b1d8bb8e39de9d24d7152a6ed28a4dc111b810d807211caccb331baa9d299ed18b915c00000000000000000000000074a4bfdf38cb18cd36a3ed5e341514bd54c2e90174244df2634132fe999274c1668b0daa213174d8051f7a562deee6ac8be11ad7895e538d"], &(0x7f0000000180)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1401}}}, &(0x7f0000000580)={0x34, &(0x7f0000000300)={0x0, 0xc, 0xc6, "dbb15a02c889462c799231af84bef5b522a2299668ae9e3a8574a29be6064af8a49817c333cb4c8f43884844d23493773808a5a410e61ecd8a9f17ad6d9b61ed058aa2336d079270915262324348ed4dfc80d4604ae71dd03454af617d806af323ec3c4f6880fdb96b0a37ce034a5b475ce7ca7bcaf6fbc22b97f890ceb21d0b56b8eefa4e649761ba769436ec62217f5be7a92840aad5220d6a999d7fecdf4305b654676fd894b2b9a906f12ece0c3a39057d3c71925d3ca9cfc067adb3bdf5c01c514aadd7"}, &(0x7f0000000240)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000280)={0x0, 0x8, 0x1, 0x81}, &(0x7f0000000400)={0x20, 0x0, 0x8d, {0x8b, "fa512f60516ff743b768a25776626a1cc6d5c23cf6b5e80bcc33eea9bd47192b2bf6a39acc009a98e914e275a2a2bd4ef43032ba7f311e7cb37a957ae4516bbf63ba085036b909ec9339e9a69095b7f88346c5d0233deb99227d24151c0c1ad8d39af577c96444773aad9bbbfe54634aa4eb114fcdc893869b302738d50662854e2a35cbf63f5a69881bea"}}, &(0x7f00000004c0)={0x20, 0x1, 0x1, 0x1}, &(0x7f0000000500)={0x20, 0x0, 0x1, 0x32}}) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1008002, &(0x7f00000004c0)={[{@grpquota}, {@delalloc}, {@resuid}, {@init_itable}, {@dioread_nolock}, {@jqfmt_vfsold}, {@nomblk_io_submit}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f00000005c0)="$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") quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3f}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000d80)=ANY=[@ANYRES8, @ANYRESHEX], 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d90000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) [ 660.638123][T17071] EXT4-fs warning (device loop2): ext4_enable_quotas:6987: Failed to enable quota tracking (type=0, err=-22, ino=3). Please run e2fsck to fix. [ 660.672225][T17071] EXT4-fs (loop2): mount failed 11:59:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) 11:59:33 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000001080)={0x200000, 0x200000}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x0, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) 11:59:33 executing program 4: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = socket(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b9b41476a821b2b1bcbd2eadbafa736396f4038931b08be42e314087e5461bee729a2e6bec331b526a6186c9d05e460339a3694c584668f6bffa4499869e19a6bcb42467fb324d8098052191b2057eeaacbfdf8cbfa4d280998ed31945f34df149144a6f6cd3fb256153e4f0dc8dbb6bd3d7646613d9973a4112e0d0334129495c8b360715882428d7a472d33b4494a1f13639a7703be0fece29c7a0628e5d9168236d71bdc8b6368844a33de097e606550c31b782efaf8c21f5", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x0, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) 11:59:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) clock_getres(0x0, 0x0) 11:59:33 executing program 2: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = socket(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b9b41476a821b2b1bcbd2eadbafa736396f4038931b08be42e314087e5461bee729a2e6bec331b526a6186c9d05e460339a3694c584668f6bffa4499869e19a6bcb42467fb324d8098052191b2057eeaacbfdf8cbfa4d280998ed31945f34df149144a6f6cd3fb256153e4f0dc8dbb6bd3d7646613d9973a4112e0d0334129495c8b360715882428d7a472d33b4494a1f13639a7703be0fece29c7a0628e5d9168236d71bdc8b6368844a33de097e606550c31b782efaf8c21f5", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:33 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:33 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) 11:59:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000001080)={0x200000, 0x200000}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r2, &(0x7f0000000980), 0x12) 11:59:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) clock_getres(0x0, 0x0) [ 660.929745][ T629] usb 2-1: new high-speed USB device number 99 using dummy_hcd 11:59:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x1, 0x1, 0x8e, 0xe7c9}, 0x48) r2 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000000000406c256d0000000000000109022400010000000009040000010300000009210000000122050009058103"], 0x0) syz_usb_control_io$hid(r2, 0x0, 0x0) syz_usb_control_io(r2, &(0x7f0000000540)={0x2c, &(0x7f0000000200)=ANY=[@ANYBLOB="000005"], 0x0, 0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io(r2, &(0x7f0000000300)={0x2c, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0003"], 0x0, 0x0, 0x0}, 0x0) 11:59:33 executing program 4: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = socket(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b9b41476a821b2b1bcbd2eadbafa736396f4038931b08be42e314087e5461bee729a2e6bec331b526a6186c9d05e460339a3694c584668f6bffa4499869e19a6bcb42467fb324d8098052191b2057eeaacbfdf8cbfa4d280998ed31945f34df149144a6f6cd3fb256153e4f0dc8dbb6bd3d7646613d9973a4112e0d0334129495c8b360715882428d7a472d33b4494a1f13639a7703be0fece29c7a0628e5d9168236d71bdc8b6368844a33de097e606550c31b782efaf8c21f5", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) [ 660.989927][ T327] usb 1-1: new high-speed USB device number 103 using dummy_hcd 11:59:33 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x0, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) 11:59:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:33 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) readv(r2, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x8001, 0x84, 0x105}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r5}, 0x38) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") [ 661.179728][ T629] usb 2-1: Using ep0 maxpacket: 16 [ 661.259881][ T327] usb 1-1: Using ep0 maxpacket: 32 [ 661.329725][ T7551] usb 3-1: new high-speed USB device number 88 using dummy_hcd [ 661.341449][T17158] loop4: detected capacity change from 0 to 512 [ 661.354434][T17158] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 661.367650][T17158] EXT4-fs (loop4): orphan cleanup on readonly fs 11:59:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ec0)={@ifindex, 0xffffffffffffffff, 0x2b, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000014c0)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000001480)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x18, 0x19, &(0x7f00000011c0)=ANY=[], &(0x7f00000012c0)='syzkaller\x00', 0x4, 0x88, &(0x7f0000001300)=""/136, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001500)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001540)=[{0x0, 0x1, 0xb, 0x5}, {0x5, 0x0, 0x6, 0xb}, {0x5, 0x3, 0x1, 0xb}, {0x2, 0x3, 0xb, 0x4}, {0x5, 0x1, 0xa, 0x3}], 0x10, 0x20}, 0x90) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001740)={&(0x7f0000001700)=ANY=[@ANYBLOB="1f000000", @ANYRES16=0x0, @ANYBLOB="000427bd7000fddbdf25140000000c009900ff0100007000000008001400", @ANYRES32=r2, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x4815) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0800000c009900f7ffffff7e00000010006e800400010004000100040001000a000a004570f1f07e460000"], 0x3c}}, 0x20008000) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup(r4) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = epoll_create1(0x0) epoll_pwait2(r6, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000240)={0x0, 0x3938700}, &(0x7f0000000280), 0x8) r7 = dup(r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000459bb2405804035000000000000109021b0001110000000904"], 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x107042, 0x0) fgetxattr(r7, &(0x7f0000000180)=@known='system.sockprotoname\x00', 0x0, 0x0) [ 661.376547][T17158] EXT4-fs error (device loop4): ext4_read_block_bitmap_nowait:511: comm syz-executor.4: Block bitmap for bg 0 marked uninitialized [ 661.395214][T17158] EXT4-fs error (device loop4) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 661.413570][T17158] EXT4-fs (loop4): 1 orphan inode deleted [ 661.420087][T17158] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. 11:59:34 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x10) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/122, 0x7a}], 0x1, 0x25000000, 0x0) [ 661.469880][ T629] usb 2-1: New USB device found, idVendor=23a7, idProduct=fedc, bcdDevice=e0.0b [ 661.487302][ T629] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 661.500428][ T629] usb 2-1: Product: syz [ 661.506496][ T629] usb 2-1: Manufacturer: syz [ 661.512028][ T629] usb 2-1: SerialNumber: syz [ 661.518719][ T629] usb 2-1: config 0 descriptor?? 11:59:34 executing program 4: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:34 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) [ 661.543586][T15351] EXT4-fs (loop4): unmounting filesystem. [ 661.559982][ T327] usb 1-1: New USB device found, idVendor=1557, idProduct=8150, bcdDevice=29.ed [ 661.576622][ T327] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 661.585445][ T327] usb 1-1: Product: syz [ 661.595367][ T327] usb 1-1: Manufacturer: syz [ 661.600593][ T327] usb 1-1: SerialNumber: syz [ 661.608252][ T327] usb 1-1: config 0 descriptor?? [ 661.709999][ T7551] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 661.728790][ T7551] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 661.739415][ T7551] usb 3-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 661.748400][ T7551] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 661.756949][ T7551] usb 3-1: config 0 descriptor?? [ 661.769786][ T8363] usb 4-1: new high-speed USB device number 109 using dummy_hcd [ 662.059933][ T629] usb 2-1: MIDIStreaming interface descriptor not found [ 662.073103][ T629] usb 2-1: USB disconnect, device number 99 [ 662.129841][ T8363] usb 4-1: config 17 has an invalid descriptor of length 0, skipping remainder of the config [ 662.145357][ T8363] usb 4-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 662.157465][ T8363] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 662.211114][ T8363] aiptek 4-1:17.0: interface has no int in endpoints, but must have minimum 1 [ 662.321140][ T327] rtl8150 1-1:0.0: eth1: rtl8150 is detected [ 662.523230][T17106] loop0: detected capacity change from 0 to 1024 [ 662.534936][T17106] EXT4-fs: Ignoring removed nomblk_io_submit option [ 662.543954][T17106] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 662.558583][T17106] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:59:35 executing program 1: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = dup(r0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r1, 0xffffffffffffffff, 0x4, r0}, 0x10) 11:59:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) 11:59:35 executing program 1: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = socket(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) [ 662.571487][T17106] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 662.593095][T17106] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 662.641850][T17106] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 662.655908][ T629] usb 1-1: USB disconnect, device number 103 [ 662.729771][ T7551] usb 3-1: string descriptor 0 read error: -71 [ 662.760874][ T7551] uclogic 0003:256C:006D.004F: failed retrieving string descriptor #200: -71 [ 662.771461][ T7551] uclogic 0003:256C:006D.004F: failed retrieving pen parameters: -71 [ 662.784953][ T7551] uclogic 0003:256C:006D.004F: failed probing pen v2 parameters: -71 [ 662.796153][ T7551] uclogic 0003:256C:006D.004F: failed probing parameters: -71 [ 662.807752][ T7551] uclogic: probe of 0003:256C:006D.004F failed with error -71 [ 662.818860][ T7551] usb 3-1: USB disconnect, device number 88 [ 662.920281][ T629] usb 4-1: USB disconnect, device number 109 11:59:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = dup(r0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r1, 0xffffffffffffffff, 0x4, r0}, 0x10) 11:59:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x0) (async) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001400), 0x505800, 0x0) dup2(r2, r1) (async) r3 = dup2(r2, r1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r3, &(0x7f0000000180)="9df79bc166f027db63eea7864247243867d3ee4174a6b1fa4fb285019d59cd7e59e5c5e71ac58aa4c845df1ffb3ec0661afb04590e699b886e053ee4feb552aaffb25a7e2c05b4ac00c18c1d29ea9963926d34ac772ee1395aa3ef148712f896879829c4345952b7667a54e22a9d587aad6ea9db5f4939fe30e2bdcd67afd8b65ab111e90fc2204e5e120788fba7d298674750b430420e2502e37a"}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x6, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='tlb_flush\x00', r5}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r3}, 0x10) sysinfo(&(0x7f0000000400)=""/4096) remap_file_pages(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x400000, 0x0) 11:59:35 executing program 1: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x0, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:35 executing program 3: io_setup(0x7, &(0x7f0000000280)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r4}, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r5, 0x4c80, 0xffffffffffffffb6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r6 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xe2, 0x54, 0x46, 0x10, 0x23a7, 0xfedc, 0xe00b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x3, 0x42}}]}}]}}, 0x0) syz_usb_control_io(r6, &(0x7f00000004c0)={0x2c, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00031a0000001a03b8ff9998a3c8bb61a15ee63c82775354459a16a294827d8f"], 0x0, 0x0, 0x0}, 0x0) 11:59:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x2, r5}) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) 11:59:35 executing program 1: io_setup(0x7, &(0x7f0000000280)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r4}, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r5, 0x4c80, 0xffffffffffffffb6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r7 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xe2, 0x54, 0x46, 0x10, 0x23a7, 0xfedc, 0xe00b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x3, 0x42}}]}}]}}, 0x0) syz_usb_control_io(r7, &(0x7f00000004c0)={0x2c, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00031a0000001a03b8ff9998a3c8bb61a15ee63c82775354459a16a294827d8f"], 0x0, 0x0, 0x0}, 0x0) [ 663.246698][T15359] EXT4-fs (loop0): unmounting filesystem. [ 663.262187][T17216] syz-executor.4[17216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 11:59:35 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x3, 0x8, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x2000) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000040)={0x1, 0x7, [@empty, @dev, @broadcast, @random="05d24a94c20c", @link_local, @multicast, @broadcast]}) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fallocate(r6, 0x50, 0xfffffffffffffff8, 0x7c) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) eventfd(0x0) eventfd(0x0) r7 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000000000406c256d0000000000000109022400010000000009040000010300000009210000000122050009058103"], 0x0) syz_usb_control_io$hid(r7, 0x0, 0x0) syz_usb_control_io(r7, &(0x7f0000000080)={0x2c, &(0x7f0000000380)={0x0, 0x0, 0x5, {0x5, 0x0, "a8ea58"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io(r7, &(0x7f0000001780)={0x2c, 0x0, &(0x7f00000014c0)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r8 = socket$vsock_stream(0x28, 0x1, 0x0) r9 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000140019010000", @ANYRES32=r8], 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) readv(r9, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x15) [ 663.262298][T17216] syz-executor.4[17216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.284930][T17217] syz-executor.4[17217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 11:59:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r2 = getpid() r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r1}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r3, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r2, 0x0, 0x4004) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r6}, 0x10) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff}) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r7, 0xa, 0x12) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 11:59:36 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x62, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:36 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:36 executing program 4: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:36 executing program 2: r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000002c0)=ANY=[@ANYBLOB="1201040000002f2057155081ed29010203010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000c00)={0x84, &(0x7f00000007c0)={0x0, 0x8, 0x1, "ab"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000959800001801000020a07025000000fffe20202027ea000000000000bfa100000000000007010000f0ffffffb702000005000000b7030000000000008500000073000000957ef7364b7691b9f9de2e59f30933142ccee3113865fc315fb19ece5addc2e9b1bc4dd3c8f72619e99964501a9bcb7b6473ff88f34006150044c600cc5698912c34f9e9bd2b617e30b7b600040000bf55e5e9554fbb7a4700348ce443c18df784f5f9b06e77628004f5c01b105e5d04e3410f5b09e2d17f8de69197fc694eb9"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x8, 0x108}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000160000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r3}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7103}) syz_usb_control_io$printer(r0, &(0x7f00000001c0)={0x14, &(0x7f0000000cc0)=ANY=[@ANYBLOB="200c56000000560ff7962f5ab5c0c4964b3c68554b3689615af41a75c574f001cb6cb94b93ec8753e43d45b1d8bb8e39de9d24d7152a6ed28a4dc111b810d807211caccb331baa9d299ed18b915c00000000000000000000000074a4bfdf38cb18cd36a3ed5e341514bd54c2e90174244df2634132fe999274c1668b0daa213174d8051f7a562deee6ac8be11ad7895e538d"], &(0x7f0000000180)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1401}}}, &(0x7f0000000580)={0x34, &(0x7f0000000300)={0x0, 0xc, 0xc6, "dbb15a02c889462c799231af84bef5b522a2299668ae9e3a8574a29be6064af8a49817c333cb4c8f43884844d23493773808a5a410e61ecd8a9f17ad6d9b61ed058aa2336d079270915262324348ed4dfc80d4604ae71dd03454af617d806af323ec3c4f6880fdb96b0a37ce034a5b475ce7ca7bcaf6fbc22b97f890ceb21d0b56b8eefa4e649761ba769436ec62217f5be7a92840aad5220d6a999d7fecdf4305b654676fd894b2b9a906f12ece0c3a39057d3c71925d3ca9cfc067adb3bdf5c01c514aadd7"}, &(0x7f0000000240)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000280)={0x0, 0x8, 0x1, 0x81}, &(0x7f0000000400)={0x20, 0x0, 0x8d, {0x8b, "fa512f60516ff743b768a25776626a1cc6d5c23cf6b5e80bcc33eea9bd47192b2bf6a39acc009a98e914e275a2a2bd4ef43032ba7f311e7cb37a957ae4516bbf63ba085036b909ec9339e9a69095b7f88346c5d0233deb99227d24151c0c1ad8d39af577c96444773aad9bbbfe54634aa4eb114fcdc893869b302738d50662854e2a35cbf63f5a69881bea"}}, &(0x7f00000004c0)={0x20, 0x1, 0x1, 0x1}, &(0x7f0000000500)={0x20, 0x0, 0x1, 0x32}}) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1008002, &(0x7f00000004c0)={[{@grpquota}, {@delalloc}, {@resuid}, {@init_itable}, {@dioread_nolock}, {@jqfmt_vfsold}, {@nomblk_io_submit}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f00000005c0)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000d80)=ANY=[@ANYRES8, @ANYRESHEX], 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d90000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) [ 663.306637][T17217] syz-executor.4[17217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.372271][T17228] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.4'. 11:59:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x0, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) 11:59:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = dup(r0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r1, 0xffffffffffffffff, 0x4, r0}, 0x10) 11:59:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x2, r5}) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) 11:59:36 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r2 = getpid() r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r1}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r3, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r2, 0x0, 0x4004) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r6}, 0x10) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff}) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x3e) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 11:59:36 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x62, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:36 executing program 4: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x0, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) [ 663.579834][ T6] usb 4-1: new high-speed USB device number 110 using dummy_hcd [ 663.600487][ T7551] usb 2-1: new high-speed USB device number 100 using dummy_hcd [ 663.611770][T17247] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.4'. 11:59:36 executing program 4: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x2, r5}) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2, r5}) [ 663.689917][ T629] usb 1-1: new high-speed USB device number 104 using dummy_hcd 11:59:36 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000002c0)=ANY=[@ANYBLOB="1201040000002f2057155081ed29010203010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000c00)={0x84, &(0x7f00000007c0)={0x0, 0x8, 0x1, "ab"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000959800001801000020a07025000000fffe20202027ea000000000000bfa100000000000007010000f0ffffffb702000005000000b7030000000000008500000073000000957ef7364b7691b9f9de2e59f30933142ccee3113865fc315fb19ece5addc2e9b1bc4dd3c8f72619e99964501a9bcb7b6473ff88f34006150044c600cc5698912c34f9e9bd2b617e30b7b600040000bf55e5e9554fbb7a4700348ce443c18df784f5f9b06e77628004f5c01b105e5d04e3410f5b09e2d17f8de69197fc694eb9"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x8, 0x108}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000160000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r3}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7103}) syz_usb_control_io$printer(r0, &(0x7f00000001c0)={0x14, &(0x7f0000000cc0)=ANY=[@ANYBLOB="200c56000000560ff7962f5ab5c0c4964b3c68554b3689615af41a75c574f001cb6cb94b93ec8753e43d45b1d8bb8e39de9d24d7152a6ed28a4dc111b810d807211caccb331baa9d299ed18b915c00000000000000000000000074a4bfdf38cb18cd36a3ed5e341514bd54c2e90174244df2634132fe999274c1668b0daa213174d8051f7a562deee6ac8be11ad7895e538d"], &(0x7f0000000180)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1401}}}, &(0x7f0000000580)={0x34, &(0x7f0000000300)={0x0, 0xc, 0xc6, "dbb15a02c889462c799231af84bef5b522a2299668ae9e3a8574a29be6064af8a49817c333cb4c8f43884844d23493773808a5a410e61ecd8a9f17ad6d9b61ed058aa2336d079270915262324348ed4dfc80d4604ae71dd03454af617d806af323ec3c4f6880fdb96b0a37ce034a5b475ce7ca7bcaf6fbc22b97f890ceb21d0b56b8eefa4e649761ba769436ec62217f5be7a92840aad5220d6a999d7fecdf4305b654676fd894b2b9a906f12ece0c3a39057d3c71925d3ca9cfc067adb3bdf5c01c514aadd7"}, &(0x7f0000000240)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000280)={0x0, 0x8, 0x1, 0x81}, &(0x7f0000000400)={0x20, 0x0, 0x8d, {0x8b, "fa512f60516ff743b768a25776626a1cc6d5c23cf6b5e80bcc33eea9bd47192b2bf6a39acc009a98e914e275a2a2bd4ef43032ba7f311e7cb37a957ae4516bbf63ba085036b909ec9339e9a69095b7f88346c5d0233deb99227d24151c0c1ad8d39af577c96444773aad9bbbfe54634aa4eb114fcdc893869b302738d50662854e2a35cbf63f5a69881bea"}}, &(0x7f00000004c0)={0x20, 0x1, 0x1, 0x1}, &(0x7f0000000500)={0x20, 0x0, 0x1, 0x32}}) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1008002, &(0x7f00000004c0)={[{@grpquota}, {@delalloc}, {@resuid}, {@init_itable}, {@dioread_nolock}, {@jqfmt_vfsold}, {@nomblk_io_submit}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f00000005c0)="$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") quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3f}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000d80)=ANY=[@ANYRES8, @ANYRESHEX], 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d90000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) [ 663.739781][ T324] usb 3-1: new high-speed USB device number 89 using dummy_hcd [ 663.850059][ T7551] usb 2-1: Using ep0 maxpacket: 16 [ 663.859778][ T6] usb 4-1: Using ep0 maxpacket: 16 [ 664.019831][ T324] usb 3-1: Using ep0 maxpacket: 32 [ 664.079845][ T629] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 664.095507][ T629] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 664.106645][ T629] usb 1-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 664.116449][ T629] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 664.124903][ T629] usb 1-1: config 0 descriptor?? [ 664.130045][ T7551] usb 2-1: New USB device found, idVendor=23a7, idProduct=fedc, bcdDevice=e0.0b [ 664.141027][ T7551] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 664.149930][ T6] usb 4-1: New USB device found, idVendor=23a7, idProduct=fedc, bcdDevice=e0.0b [ 664.152473][ T7551] usb 2-1: Product: syz [ 664.162233][ T6] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 664.167706][ T7551] usb 2-1: Manufacturer: syz [ 664.177831][ T6] usb 4-1: Product: syz [ 664.184877][ T7551] usb 2-1: SerialNumber: syz [ 664.189970][ T6] usb 4-1: Manufacturer: syz [ 664.200560][ T6] usb 4-1: SerialNumber: syz [ 664.203765][ T7551] usb 2-1: config 0 descriptor?? [ 664.205971][ T6] usb 4-1: config 0 descriptor?? [ 664.319874][ T324] usb 3-1: New USB device found, idVendor=1557, idProduct=8150, bcdDevice=29.ed [ 664.333932][ T324] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 664.346046][ T324] usb 3-1: Product: syz [ 664.352984][ T324] usb 3-1: Manufacturer: syz [ 664.358909][ T324] usb 3-1: SerialNumber: syz [ 664.365957][ T324] usb 3-1: config 0 descriptor?? [ 664.619961][ T629] hid (null): bogus close delimiter [ 664.729849][ T6] usb 4-1: MIDIStreaming interface descriptor not found [ 664.741982][ T6] usb 4-1: USB disconnect, device number 110 [ 665.030604][ T28] audit: type=1400 audit(1713268777.651:559): avc: denied { nlmsg_read } for pid=17223 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 665.039946][ T7551] usb 2-1: MIDIStreaming interface descriptor not found [ 665.078022][ T7551] usb 2-1: USB disconnect, device number 100 [ 665.111040][ T324] rtl8150 3-1:0.0: eth1: rtl8150 is detected 11:59:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r2 = getpid() r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r1}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r3, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r2, 0x0, 0x4004) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r6}, 0x10) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') [ 665.190155][ T629] uclogic 0003:256C:006D.0050: failed retrieving Huion firmware version: -71 [ 665.204079][ T629] uclogic 0003:256C:006D.0050: failed probing parameters: -71 [ 665.212737][ T629] uclogic: probe of 0003:256C:006D.0050 failed with error -71 [ 665.225066][ T629] usb 1-1: USB disconnect, device number 104 11:59:37 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x62, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:37 executing program 3: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x0, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) [ 665.250690][T17278] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. 11:59:37 executing program 3: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='ext4_evict_inode\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='ext4_evict_inode\x00', r1}, 0x10) unlink(&(0x7f0000000000)='./cgroup\x00') [ 665.315824][T17234] loop2: detected capacity change from 0 to 1024 [ 665.331621][T17234] EXT4-fs: Ignoring removed nomblk_io_submit option [ 665.348668][T17234] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE 11:59:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) readv(r2, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x8001, 0x84, 0x105}, 0x48) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$eJzs3M1vFGUYAPBndrcgn10RP0BUFI3Ej5YWVA5eNDHxoImJHvBYSyHIQg2tiZDGFkPwYqIk3I2JFxP/Ak+eiHoy8Yp3Q0IMF9DTmunOLtvtbtl2t7vF/f2SYefdfXfe55mZd+edGaYBDKz96T9JxPaIuB4RwxGRq69QjIgtlXp3bs1N/nNrbjKJcvn9v5P0a3H71txktWqSvW6rFArpgnKXksVFNJo5f+H0RKk0dS4rj86e+WR05vyFl0+dmTg5dXLq7PjRo0cOj7326vgrXckzjen23s+n9+15+8Mr704eu/LRrz9W4i2Xr147tCSP7hiKiLnaOmn0XHcb67sddfNJoY+BsCqbI6KQ7a3XYzjyl3bWPhuOt77oa3DAuiqXy+Xx1h8vlIH/sST6HQHQH9UDfXr+W516NPTYEG6+UTkBSvO+k02VTwpxMasz1HB+2037I+LYwr/fplM0XE8BAFgPP6fjn5eajP+KEY/U1duZ3RsqRsSDEbErIh6KiN0R8XBU6j4aEY+tsv39DeXl45/cjbVl1p50/Pd6dm9r6fivdhesmM9KOxbzH0pOnCpNHcrWycEY2pyWx5ouPYlYSF//+LpV+/Xjv3RK26+OBbM4bhQ2L/3O8YnZiY4Tz9y8GLG30Cz/JAp3s4g9EbF3jW2ceuGHfUvfydfm7p3/Crpwn6n8XcTzle2/EA35VyUr358cfSBKU4dGq3vFcr/9fvm9Vu13lH8XpNt/a9P9v5Z/Mam/XzuzbBGb7tXG5T+/bHlOs9b9f1PywZLGP5uYnT03FrEpeWf5+3UXuKvlav00/4MHmvf/XXF3TTweEelO/EREPBkRT2WxPx0Rz0TEgRXy/+XNZz9ee/7rK81/flXbf/Uz+dPXfmrVfnvb/0i1sBhUO79/7QbYyboDAACA+0UuIrZHkhupzedyIyOV/y+/O7bmStMzsy+emP707PHKMwLFGMpVr3QN110PHcuuDVfL41l5Pisfzq4bX81vWSyPTE6Xjvc7eRhw21r0/9Rf+X5HB6w7z2vB4NL/YXCtvf/75YD73T16ca5XcQC95ygOg6tZ/5/vQxxA7zn+w+Cq9f9v2qhc97hX48ObwP3H8R8Gl/4PA6mT5/o3xEx8H7FynWSjhLqqma86+XqhBxFGbmOsqB7OjOcj+hhGod2/ahHny/MdN9rvXyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDu+C8AAP//javoAw==") [ 665.364358][T17234] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 665.385790][T17234] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 665.402460][T17234] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 665.416480][T17234] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 665.426683][ T327] usb 3-1: USB disconnect, device number 89 [ 665.557881][T17307] loop3: detected capacity change from 0 to 512 [ 665.585737][T17307] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) 11:59:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r2 = getpid() r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r1}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r3, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r2, 0x0, 0x4004) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r6}, 0x10) gettid() mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') [ 665.601303][T17307] EXT4-fs (loop3): orphan cleanup on readonly fs [ 665.611194][T17307] EXT4-fs error (device loop3): ext4_read_block_bitmap_nowait:511: comm syz-executor.3: Block bitmap for bg 0 marked uninitialized [ 665.638536][T17310] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. 11:59:38 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x0, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) [ 665.642107][T17307] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 665.662791][T17307] EXT4-fs (loop3): 1 orphan inode deleted [ 665.670522][T17307] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. 11:59:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ec0)={@ifindex, 0xffffffffffffffff, 0x2b, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000014c0)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000001480)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x18, 0x19, &(0x7f00000011c0)=ANY=[], &(0x7f00000012c0)='syzkaller\x00', 0x4, 0x88, &(0x7f0000001300)=""/136, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001500)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001540)=[{0x0, 0x1, 0xb, 0x5}, {0x5, 0x3, 0x0, 0xb}, {0x5, 0x3, 0x1, 0xb}, {0x2, 0x3, 0xb, 0x4}, {0x5, 0x1, 0xa, 0x3}], 0x10, 0x20}, 0x90) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001740)={&(0x7f0000001700)=ANY=[@ANYBLOB="1f000000", @ANYRES16=0x0, @ANYBLOB="000427bd7000fddbdf25140000000c009900ff0100007000000008001400", @ANYRES32=r2, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x4815) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0800000c009900f7ffffff7e00000010006e800400010004000100040001000a000a004570f1f07e460000"], 0x3c}}, 0x20008000) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup(r4) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = epoll_create1(0x0) epoll_pwait2(r6, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000240)={0x0, 0x3938700}, &(0x7f0000000280), 0x8) r7 = dup(r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000459bb2405804035000000000000109021b0001110000000904"], 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x107042, 0x0) fgetxattr(r7, &(0x7f0000000180)=@known='system.sockprotoname\x00', 0x0, 0x0) 11:59:38 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x0, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) 11:59:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) readv(r2, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x8001, 0x84, 0x105}, 0x48) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") 11:59:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r2, &(0x7f0000000980), 0x12) [ 665.892552][T17323] loop0: detected capacity change from 0 to 512 [ 665.903792][T17323] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 665.906625][T16899] EXT4-fs (loop3): unmounting filesystem. 11:59:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020302500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faff2000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r0}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x9) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000001600)={'ip6_vti0\x00', &(0x7f0000001580)={'syztnl1\x00', 0x0, 0x4, 0x9, 0x5, 0x0, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x80, 0x10, 0x7}}) sendmsg$inet6(r1, &(0x7f0000001840)={&(0x7f0000000000)={0xa, 0x4e20, 0xffff, @private0, 0x8}, 0x1c, &(0x7f0000001500)=[{&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="a235b2910745375bff5c8783eaa8aa19695886e2b55d8542355b5ee96a2c864b290d3cea1610a3cc48e5fbd4e2b2ecb386b218cf8e4e9755372bac279c2bb5d8b8695196f1ac4b2213cf81f84dbff9c2e146a550dc93538fec2a649b23de53121f9f8ec52e5e78d2aef2ca98346a5a3b3b46844275f233acc9c7fa278bcdccc6dc62747ac587de387f1a1a1bd07bc0274b56b0d68e90264788", 0x99}, {&(0x7f0000000200)="a51337e6875196b42599592f4f22d0e502765f204000a7188ab7aff3c1be3c6b731c45d036b9a026ef51f9512ec5b1ff9c50eb2dc86d85c61fe8c75a7695c4e03d84cdfdc146090b9a7784dabc1529cd4357e914b4912376af739d", 0x5b}, {&(0x7f0000001380)="dfa90d9a0cc77ad9ca822916c255f18f062d3c154b3002d8af026c55dd9d6f4349c8335f9fed540031c676f608a0f67adaa106763fc9a2fd7e8d056a688366538b8bc76d8d7903fadf851c85ac5d7fa2e30332930bd1ce7903bf76486914ddc68fa6da5042b4d2b86734a2ca9f09d3dade5bbfeabd027aeb144c0083f13809dbbf288c1d81", 0x85}, {&(0x7f0000001440)="7ada9fd3250f9f2b784d0d", 0xb}, {&(0x7f0000001480)="54fc97fa0977fb34b9d49262e6376034c36413ac344cf7c2c9bd252c109220c9a1714be74b04ee9cce7e842f39f2b40e441a4b3e", 0x34}, {&(0x7f00000014c0)="dc7767156a0cd057239f3dcfee78a53d7522aea4abcd458b812db67fa8af6c8ffa09348b96217baf04a7ad04684c3d68db64d0625d", 0x35}], 0x7, &(0x7f0000001640)=[@dstopts_2292={{0x118, 0x29, 0x4, {0x87, 0x1f, '\x00', [@generic={0x1f, 0xf3, "689a54afac569cd7b29d369506878a54f2b837c4cbd40c2ca96d35894cddac2821ccd9bf69338a0fe97fb52f11aaddd640c03ee6e07fb39538e0b4e8f759b7d93110f48dd75982ad8f7df465b8b0622dad06810a0a05ada46971644a7a4e846aab0c589b1d92270dd56432c448874636e610b7d62b5da450391d04b0a2db79d1075499da082937295c3a4b531479c39d689da69388a654990e033accdf21dffa427b68b5ef3f88dce3ec2d58480a63a4406830377945c3d69d8e9816b899932eef55c95cc0314536ffa3718fa138d996348613b8957557debd903cca75278e6dd6d8de8d0d38d6b3187f699031aa586237563e"}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @hopopts={{0x48, 0x29, 0x36, {0x6c, 0x5, '\x00', [@jumbo, @pad1, @hao={0xc9, 0x10, @remote}, @enc_lim={0x4, 0x1, 0x46}, @jumbo={0xc2, 0x4, 0x3}, @pad1, @padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xffff6513}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r2}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x32, 0x2, 0x1, 0x54, 0x0, [@mcast1]}}}], 0x1e0}, 0x800) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x6, &(0x7f0000000140)={0x81, {{0x29, 0x0, 0x2000000, @empty, 0x105}}}, 0x88) syncfs(0xffffffffffffffff) [ 665.950543][T17323] EXT4-fs (loop0): orphan cleanup on readonly fs [ 665.961790][T17323] EXT4-fs error (device loop0): ext4_read_block_bitmap_nowait:511: comm syz-executor.0: Block bitmap for bg 0 marked uninitialized [ 665.981889][T17323] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6137: Corrupt filesystem 11:59:38 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) [ 665.998702][T17323] EXT4-fs (loop0): 1 orphan inode deleted [ 666.007287][T17323] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 666.020772][ T5262] EXT4-fs (loop2): unmounting filesystem. 11:59:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r2 = getpid() r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r1}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r3, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r2, 0x0, 0x4004) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r6}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 11:59:38 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x0, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:38 executing program 2: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:38 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r2, &(0x7f0000000980), 0x12) 11:59:38 executing program 3: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x15) r0 = dup(0xffffffffffffffff) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0xe, 0x6, 0x401, 0x0, 0x0, {0x1, 0x0, 0x81}}, 0x14}, 0x1, 0x0, 0x0, 0x4040884}, 0x20000000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002780), &(0x7f00000027c0)='./file0\x00', 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0], 0x0, 0x0, 0x0) 11:59:38 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) [ 666.070180][T17332] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.2'. [ 666.089801][ T6] usb 2-1: new high-speed USB device number 101 using dummy_hcd 11:59:38 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000009c0)="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", 0xa53}], 0x1}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCCBRK(r2, 0x540d) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000080)='test_pages_isolated\x00', r3}, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412) 11:59:38 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r2 = getpid() r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r1}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r3, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r2, 0x0, 0x4004) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') [ 666.170046][T17346] EXT4-fs warning (device sda1): ext4_group_extend:1862: can't shrink FS - resize aborted [ 666.479801][ T6] usb 2-1: config 17 has an invalid descriptor of length 0, skipping remainder of the config [ 666.496579][ T6] usb 2-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 666.509999][ T6] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 11:59:39 executing program 3: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) [ 666.560511][ T6] aiptek 2-1:17.0: interface has no int in endpoints, but must have minimum 1 11:59:39 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r3, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:39 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r3, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:39 executing program 2: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:39 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:39 executing program 2: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = syz_pidfd_open(0x0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="530000000700004600995e509ca397af0e"], 0x53) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x55, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x40f00}, 0x90) [ 666.663754][T15359] EXT4-fs (loop0): unmounting filesystem. [ 666.720691][T17356] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.0'. [ 666.733975][T17362] 9pnet: p9_errstr2errno: server reported unknown error ™^Pœ£—¯ 11:59:39 executing program 0: getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r2, &(0x7f0000000980), 0x12) 11:59:39 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r3, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:39 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r3, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:39 executing program 2: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:39 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:39 executing program 0: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x15) (async) r0 = dup(0xffffffffffffffff) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0xe, 0x6, 0x401, 0x0, 0x0, {0x1, 0x0, 0x81}}, 0x14}, 0x1, 0x0, 0x0, 0x4040884}, 0x20000000) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002780), &(0x7f00000027c0)='./file0\x00', 0x0, &(0x7f0000002800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0], 0x0, 0x0, 0x0) [ 666.761692][ T7551] usb 2-1: USB disconnect, device number 101 11:59:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r2 = getpid() r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r1}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r3, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r2, 0x0, 0x4004) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)={0x8, [0x8, 0x1a, 0xb1, 0x7, 0x29, 0x5, 0x1f, 0x100000000]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 11:59:39 executing program 4: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) syz_pidfd_open(r0, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:59:39 executing program 0: r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000002c0)=ANY=[@ANYBLOB="1201040000002f2057155081ed29010203010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000c00)={0x84, &(0x7f00000007c0)={0x0, 0x8, 0x1, "ab"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000959800001801000020a07025000000fffe20202027ea000000000000bfa100000000000007010000f0ffffffb702000005000000b7030000000000008500000073000000957ef7364b7691b9f9de2e59f30933142ccee3113865fc315fb19ece5addc2e9b1bc4dd3c8f72619e99964501a9bcb7b6473ff88f34006150044c600cc5698912c34f9e9bd2b617e30b7b600040000bf55e5e9554fbb7a4700348ce443c18df784f5f9b06e77628004f5c01b105e5d04e3410f5b09e2d17f8de69197fc694eb9"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x8, 0x108}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000160000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r3}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7103}) syz_usb_control_io$printer(r0, &(0x7f00000001c0)={0x14, &(0x7f0000000cc0)=ANY=[@ANYBLOB="200c56000000560ff7962f5ab5c0c4964b3c68554b3689615af41a75c574f001cb6cb94b93ec8753e43d45b1d8bb8e39de9d24d7152a6ed28a4dc111b810d807211caccb331baa9d299ed18b915c00000000000000000000000074a4bfdf38cb18cd36a3ed5e341514bd54c2e90174244df2634132fe999274c1668b0daa213174d8051f7a562deee6ac8be11ad7895e538d"], &(0x7f0000000180)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1401}}}, &(0x7f0000000580)={0x34, &(0x7f0000000300)={0x0, 0xc, 0xc6, "dbb15a02c889462c799231af84bef5b522a2299668ae9e3a8574a29be6064af8a49817c333cb4c8f43884844d23493773808a5a410e61ecd8a9f17ad6d9b61ed058aa2336d079270915262324348ed4dfc80d4604ae71dd03454af617d806af323ec3c4f6880fdb96b0a37ce034a5b475ce7ca7bcaf6fbc22b97f890ceb21d0b56b8eefa4e649761ba769436ec62217f5be7a92840aad5220d6a999d7fecdf4305b654676fd894b2b9a906f12ece0c3a39057d3c71925d3ca9cfc067adb3bdf5c01c514aadd7"}, &(0x7f0000000240)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000280)={0x0, 0x8, 0x1, 0x81}, &(0x7f0000000400)={0x20, 0x0, 0x8d, {0x8b, "fa512f60516ff743b768a25776626a1cc6d5c23cf6b5e80bcc33eea9bd47192b2bf6a39acc009a98e914e275a2a2bd4ef43032ba7f311e7cb37a957ae4516bbf63ba085036b909ec9339e9a69095b7f88346c5d0233deb99227d24151c0c1ad8d39af577c96444773aad9bbbfe54634aa4eb114fcdc893869b302738d50662854e2a35cbf63f5a69881bea"}}, &(0x7f00000004c0)={0x20, 0x1, 0x1, 0x1}, &(0x7f0000000500)={0x20, 0x0, 0x1, 0x32}}) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1008002, &(0x7f00000004c0)={[{@grpquota}, {@delalloc}, {@resuid}, {@init_itable}, {@dioread_nolock}, {@jqfmt_vfsold}, {@nomblk_io_submit}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f00000005c0)="$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") quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3f}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000d80)=ANY=[@ANYRES8, @ANYRESHEX], 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d90000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) [ 666.873124][T17386] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. [ 667.119866][ T8363] usb 1-1: new high-speed USB device number 105 using dummy_hcd 11:59:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r1, &(0x7f0000000980), 0x12) 11:59:39 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:39 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r3, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:39 executing program 3: getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:39 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:39 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x3, 0x8, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r1}, 0x10) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x2000) (async) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000040)={0x1, 0x7, [@empty, @dev, @broadcast, @random="05d24a94c20c", @link_local, @multicast, @broadcast]}) (async) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fallocate(r6, 0x50, 0xfffffffffffffff8, 0x7c) (async) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) (async) eventfd(0x0) (async) eventfd(0x0) r7 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000000000406c256d0000000000000109022400010000000009040000010300000009210000000122050009058103"], 0x0) syz_usb_control_io$hid(r7, 0x0, 0x0) (async) syz_usb_control_io(r7, &(0x7f0000000080)={0x2c, &(0x7f0000000380)={0x0, 0x0, 0x5, {0x5, 0x0, "a8ea58"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) (async) syz_usb_control_io(r7, &(0x7f0000001780)={0x2c, 0x0, &(0x7f00000014c0)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r8 = socket$vsock_stream(0x28, 0x1, 0x0) (async) r9 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000140019010000", @ANYRES32=r8], 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) (async) readv(r9, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x15) 11:59:39 executing program 2: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:39 executing program 4: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) syz_pidfd_open(r0, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:59:39 executing program 1: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ec0)={@ifindex, 0xffffffffffffffff, 0x2b, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000014c0)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000001480)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x18, 0x19, &(0x7f00000011c0)=ANY=[], &(0x7f00000012c0)='syzkaller\x00', 0x4, 0x88, &(0x7f0000001300)=""/136, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001500)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001540)=[{0x0, 0x1, 0xb, 0x5}, {0x5, 0x3, 0x0, 0xb}, {0x5, 0x3, 0x1, 0xb}, {0x2, 0x3, 0xb, 0x4}, {0x5, 0x1, 0xa, 0x3}], 0x10, 0x20}, 0x90) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001740)={&(0x7f0000001700)=ANY=[@ANYBLOB="1f000000", @ANYRES16=0x0, @ANYBLOB="000427bd7000fddbdf25140000000c009900ff0100007000000008001400", @ANYRES32=r2, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x4815) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0800000c009900f7ffffff7e00000010006e800400010004000100040001000a000a004570f1f07e460000"], 0x3c}}, 0x20008000) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup(r4) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = epoll_create1(0x0) epoll_pwait2(r6, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000240)={0x0, 0x3938700}, &(0x7f0000000280), 0x8) r7 = dup(r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000459bb2405804035000000000000109021b0001110000000904"], 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x107042, 0x0) fgetxattr(r7, &(0x7f0000000180)=@known='system.sockprotoname\x00', 0x0, 0x0) 11:59:40 executing program 4: io_setup(0x7, &(0x7f0000000280)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r4}, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r5, 0x4c80, 0xffffffffffffffb6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r6 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xe2, 0x54, 0x46, 0x10, 0x23a7, 0xfedc, 0xe00b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x3, 0x42}}]}}]}}, 0x0) syz_usb_control_io(r6, &(0x7f00000004c0)={0x2c, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00031a0000001a03b8ff9998a3c8bb61a15ee63c82775354459a16a294827d8f"], 0x0, 0x0, 0x0}, 0x0) 11:59:40 executing program 1: getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000180)={{}, 'syz0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000f2ff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) read(r0, &(0x7f0000000200)=""/200, 0xc8) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, 0x0) recvmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0xf00, 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x14) [ 667.369758][ T8363] usb 1-1: Using ep0 maxpacket: 32 11:59:40 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:40 executing program 3: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) syz_pidfd_open(r0, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:59:40 executing program 3: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:40 executing program 3: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:40 executing program 3: getpid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:40 executing program 3: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:40 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x4, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000054f89bd964604c81000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$evdev(&(0x7f0000000180), 0x1, 0x54000) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000f80)=""/4096) syz_clone(0x20021100, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) 11:59:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) readv(r1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") [ 667.649794][ T8363] usb 1-1: New USB device found, idVendor=1557, idProduct=8150, bcdDevice=29.ed [ 667.660832][ T8363] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 667.670129][ T8363] usb 1-1: Product: syz [ 667.675475][ T8363] usb 1-1: Manufacturer: syz [ 667.680277][ T8363] usb 1-1: SerialNumber: syz [ 667.692687][ T8363] usb 1-1: config 0 descriptor?? [ 667.729749][ T6] usb 3-1: new high-speed USB device number 90 using dummy_hcd [ 667.744243][T17447] loop3: detected capacity change from 0 to 512 [ 667.756114][T17447] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 667.771779][T17447] EXT4-fs (loop3): orphan cleanup on readonly fs [ 667.781839][T17447] EXT4-fs error (device loop3): ext4_read_block_bitmap_nowait:511: comm syz-executor.3: Block bitmap for bg 0 marked uninitialized [ 667.802993][T17447] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 667.814658][T17447] EXT4-fs (loop3): 1 orphan inode deleted [ 667.821310][T17447] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. 11:59:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) readv(r1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") [ 667.922102][T16899] EXT4-fs (loop3): unmounting filesystem. [ 668.044644][T17453] loop3: detected capacity change from 0 to 512 [ 668.054952][T17453] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 668.069441][T17453] EXT4-fs (loop3): orphan cleanup on readonly fs [ 668.080105][T17453] EXT4-fs error (device loop3): ext4_read_block_bitmap_nowait:511: comm syz-executor.3: Block bitmap for bg 0 marked uninitialized [ 668.097709][T17453] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 668.109566][T17453] EXT4-fs (loop3): 1 orphan inode deleted [ 668.117979][T17453] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. 11:59:40 executing program 3: getpid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) [ 668.159875][ T6] usb 3-1: config 17 has an invalid descriptor of length 0, skipping remainder of the config [ 668.177541][ T6] usb 3-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 668.188664][ T6] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 11:59:40 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x0, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:40 executing program 3: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 668.237851][T16899] EXT4-fs (loop3): unmounting filesystem. [ 668.250908][ T6] aiptek 3-1:17.0: interface has no int in endpoints, but must have minimum 1 11:59:40 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000080)='./bus\x00', 0x80d0, &(0x7f0000000200)={[{@dots}, {@nodots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0x7fff}}, {@dots}, {@nodots}, {@fat=@allow_utime}, {@nodots}, {@dots}, {@nodots}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x1}}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@fat=@tz_utc}, {@nodots}, {@fat=@nfs}, {@dots}, {@nodots}, {@fat=@check_strict}]}, 0xfd, 0x1bf, &(0x7f0000000640)="$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") rename(&(0x7f0000000500)='./file1\x00', &(0x7f00000008c0)='./file1\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='sys_enter\x00', r2}, 0x10) clock_getres(0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r3, 0x0, 0x17, &(0x7f0000000040)=0xe, 0x36) setsockopt$inet_int(r3, 0x0, 0x14, &(0x7f0000000180)=0x40000000, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmmsg(r3, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r4, 0x0, 0x31, &(0x7f0000000200), &(0x7f00000003c0)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x5e) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000340), 0x0, &(0x7f0000000000)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f0000000140)='./bus\x00') r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000180)=0x5, 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000091110007530a8c40523e694e6c81f347388ff24a9dbc6b192bf226c23ed0f498ef98297c62adf14cbf057a84a9b48970ff1f5835fa7f6eb68503adfb94c5ad872023787f1f1ed77c29724d148aac460cca285e6315482326e113fc3a4e52a20dcb8c7af69b7c288f55fc034c1fd9a6737dbf0060ccac5d344142a662a5273399516f09d4bb4d21af99be4fd60b4949e277d7fca5d3c20c757de5dd70c0b0d73bc62e7499cb944175703005a0419dc7d8e11dbf50e1bd23cda998f3c39019c307cf7e882132e5be5a65a0000000000000028540000000000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x40002, 0x8) [ 668.316925][T17464] loop3: detected capacity change from 0 to 256 [ 668.343464][T17464] overlayfs: failed to resolve './file1': -2 [ 668.391173][ T8363] rtl8150 1-1:0.0: eth1: rtl8150 is detected [ 668.452596][ T8363] usb 3-1: USB disconnect, device number 90 [ 668.594969][T17382] loop0: detected capacity change from 0 to 1024 [ 668.603192][T17382] EXT4-fs: Ignoring removed nomblk_io_submit option [ 668.613417][T17382] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 668.629536][T17382] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 668.644581][T17382] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 668.658421][T17382] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 668.668121][T17382] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 668.681627][ T60] usb 1-1: USB disconnect, device number 105 11:59:41 executing program 0: getpid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:41 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r3, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:41 executing program 2: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:41 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x0, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:41 executing program 3: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 669.267967][T15359] EXT4-fs (loop0): unmounting filesystem. 11:59:41 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r3, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) clock_getres(0x0, 0x0) 11:59:41 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r3, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:41 executing program 0: r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000002c0)=ANY=[@ANYBLOB="1201040000002f2057155081ed29010203010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000c00)={0x84, &(0x7f00000007c0)={0x0, 0x8, 0x1, "ab"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000959800001801000020a07025000000fffe20202027ea000000000000bfa100000000000007010000f0ffffffb702000005000000b7030000000000008500000073000000957ef7364b7691b9f9de2e59f30933142ccee3113865fc315fb19ece5addc2e9b1bc4dd3c8f72619e99964501a9bcb7b6473ff88f34006150044c600cc5698912c34f9e9bd2b617e30b7b600040000bf55e5e9554fbb7a4700348ce443c18df784f5f9b06e77628004f5c01b105e5d04e3410f5b09e2d17f8de69197fc694eb9"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x8, 0x108}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000160000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r3}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7103}) syz_usb_control_io$printer(r0, &(0x7f00000001c0)={0x14, &(0x7f0000000cc0)=ANY=[@ANYBLOB="200c56000000560ff7962f5ab5c0c4964b3c68554b3689615af41a75c574f001cb6cb94b93ec8753e43d45b1d8bb8e39de9d24d7152a6ed28a4dc111b810d807211caccb331baa9d299ed18b915c00000000000000000000000074a4bfdf38cb18cd36a3ed5e341514bd54c2e90174244df2634132fe999274c1668b0daa213174d8051f7a562deee6ac8be11ad7895e538d"], &(0x7f0000000180)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1401}}}, &(0x7f0000000580)={0x34, &(0x7f0000000300)={0x0, 0xc, 0xc6, "dbb15a02c889462c799231af84bef5b522a2299668ae9e3a8574a29be6064af8a49817c333cb4c8f43884844d23493773808a5a410e61ecd8a9f17ad6d9b61ed058aa2336d079270915262324348ed4dfc80d4604ae71dd03454af617d806af323ec3c4f6880fdb96b0a37ce034a5b475ce7ca7bcaf6fbc22b97f890ceb21d0b56b8eefa4e649761ba769436ec62217f5be7a92840aad5220d6a999d7fecdf4305b654676fd894b2b9a906f12ece0c3a39057d3c71925d3ca9cfc067adb3bdf5c01c514aadd7"}, &(0x7f0000000240)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000280)={0x0, 0x8, 0x1, 0x81}, &(0x7f0000000400)={0x20, 0x0, 0x8d, {0x8b, "fa512f60516ff743b768a25776626a1cc6d5c23cf6b5e80bcc33eea9bd47192b2bf6a39acc009a98e914e275a2a2bd4ef43032ba7f311e7cb37a957ae4516bbf63ba085036b909ec9339e9a69095b7f88346c5d0233deb99227d24151c0c1ad8d39af577c96444773aad9bbbfe54634aa4eb114fcdc893869b302738d50662854e2a35cbf63f5a69881bea"}}, &(0x7f00000004c0)={0x20, 0x1, 0x1, 0x1}, &(0x7f0000000500)={0x20, 0x0, 0x1, 0x32}}) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1008002, &(0x7f00000004c0)={[{@grpquota}, {@delalloc}, {@resuid}, {@init_itable}, {@dioread_nolock}, {@jqfmt_vfsold}, {@nomblk_io_submit}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f00000005c0)="$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") quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3f}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000d80)=ANY=[@ANYRES8, @ANYRESHEX], 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d90000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) 11:59:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xa, 0x8, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x40}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='ext4_es_insert_delayed_block\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000080)='ext4_es_insert_delayed_block\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) bpf$MAP_CREATE(0x104000000000000, &(0x7f0000000140)=@base={0x5, 0x4, 0x6c03, 0x41}, 0x48) write$cgroup_type(r5, &(0x7f0000000180), 0x2009) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r8}, 0x10) ioctl$TUNSETOFFLOAD(r6, 0x40086607, 0x20001412) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r9 = eventfd(0x0) r10 = eventfd(0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="01000000000000000000030000005800018044000400200001000a0000000000000000005f3a00000000000000000000004100000000200002000a00000000000000fe8000000000000000000000000000bb000000000d0001007564703a73"], 0x6c}}, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='sched_switch\x00', r13}, 0x10) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000140)={r9, 0x0, 0x2, r10}) [ 669.471609][T17515] tipc: Started in network mode [ 669.477152][T17515] tipc: Node identity , cluster identity 4711 [ 669.484002][T17515] tipc: Failed to set node id, please configure manually [ 669.492529][T17515] tipc: Enabling of bearer rejected, failed to enable media [ 669.639771][ T6] usb 1-1: new high-speed USB device number 106 using dummy_hcd [ 669.909809][ T6] usb 1-1: Using ep0 maxpacket: 32 [ 670.229830][ T6] usb 1-1: New USB device found, idVendor=1557, idProduct=8150, bcdDevice=29.ed [ 670.240468][ T6] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 670.248762][ T6] usb 1-1: Product: syz [ 670.253159][ T6] usb 1-1: Manufacturer: syz [ 670.258747][ T6] usb 1-1: SerialNumber: syz [ 670.269199][ T6] usb 1-1: config 0 descriptor?? 11:59:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000005000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000280)='sys_enter\x00', r0}, 0x10) setreuid(0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x6, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 11:59:43 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x0, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:43 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r3, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) 11:59:43 executing program 2: io_setup(0x7, &(0x7f0000000280)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r4}, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r5, 0x4c80, 0xffffffffffffffb6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r6 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xe2, 0x54, 0x46, 0x10, 0x23a7, 0xfedc, 0xe00b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x3, 0x42}}]}}]}}, 0x0) syz_usb_control_io(r6, &(0x7f00000004c0)={0x2c, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00031a0000001a03b8ff9998a3c8bb61a15ee63c82775354459a16a294827d8f"], 0x0, 0x0, 0x0}, 0x0) 11:59:43 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:43 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r1, &(0x7f0000000980), 0x12) 11:59:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x2, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2}) 11:59:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r2 = getpid() r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r1}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r3, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r2, 0x0, 0x4004) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r5}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 11:59:43 executing program 3: keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x1}) r0 = request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x3, r0, 0x0, 0x0) request_key(&(0x7f00000003c0)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, r0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x6c}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2c}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x3}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x6}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x801) r2 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000004000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r3, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000000600)={0x50, 0x0, r4, {0x7, 0x1f}}, 0x50) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x44401, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) write$FUSE_INIT(r6, &(0x7f00000002c0)={0x50, 0x0, r4, {0x7, 0x27, 0x8001, 0x2000868, 0x3, 0x1f, 0x9, 0xb51c}}, 0x50) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}) write$FUSE_INIT(r5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000950000010000000093a38e0bde41a838508f90"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='contention_end\x00', r7}, 0x10) dup3(r2, r3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_SET(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="58000558", @ANYRES16=r10, @ANYBLOB="010000000000000000000f0000001c0007800c0004000000000000000000080003000000000000000000"], 0x30}}, 0x0) r11 = dup(r8) write$FUSE_BMAP(r11, &(0x7f0000000100)={0x18, 0xffffffffffffffda, r4, {0x1000000}}, 0x18) 11:59:43 executing program 4: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r1, 0x0, 0x0, 0x0) 11:59:43 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:43 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) [ 670.624298][T17544] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.4'. 11:59:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r1, &(0x7f0000000980), 0x12) 11:59:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xa9, &(0x7f0000000180)=""/169}, 0x80) r2 = getpid() r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='net_dev_start_xmit\x00', r1}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1100}, [{0x78, 0x1, [@m_police={0x74, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0xffffffffffffffb0}, @TCA_POLICE_RESULT={0x8}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r3, 0x0, 0x2, &(0x7f00000000c0)='\x00'}, 0x11) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r2, 0x0, 0x4004) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000018000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='sys_enter\x00', r5}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 11:59:43 executing program 4: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r1, 0x0, 0x0, 0x0) 11:59:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x2, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x2}) 11:59:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/fscreate\x00') writev(r0, &(0x7f00000002c0)=[{&(0x7f0000001680)='d', 0x1}], 0x1) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fe4, 0x1}, 0x48) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffeca50000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000380)='kmem_cache_free\x00', r3}, 0x10) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c"], 0x15) r4 = dup(r2) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r4, &(0x7f0000000a40)={0xb8, 0x0, 0x0, [{{}, {0x0, 0x0, 0xa, 0x0, '.^!(/$$[%/'}}]}, 0xb8) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}]}}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x12, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, &(0x7f0000000080)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) 11:59:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000240)="0f44df3e650feb93300066b9e60800000f320f0172f5dbe0640fad3aba4200b86600ef643e291f660f388280d60066b9400101c066b8426f000066ba000000000f30", 0x42}], 0x1, 0x0, 0x0, 0x0) lseek(r2, 0x9fb, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 670.744107][T17561] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. 11:59:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) 11:59:43 executing program 1: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) [ 670.829726][ T629] usb 3-1: new high-speed USB device number 91 using dummy_hcd [ 670.981152][ T6] rtl8150 1-1:0.0: eth1: rtl8150 is detected [ 671.089764][ T629] usb 3-1: Using ep0 maxpacket: 16 [ 671.185296][T17513] loop0: detected capacity change from 0 to 1024 [ 671.196165][T17513] EXT4-fs: Ignoring removed nomblk_io_submit option [ 671.206439][T17513] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 671.220217][T17513] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 671.232191][T17513] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 671.247889][T17513] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 671.259013][T17513] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 671.270374][ T60] usb 1-1: USB disconnect, device number 106 [ 671.419908][ T629] usb 3-1: New USB device found, idVendor=23a7, idProduct=fedc, bcdDevice=e0.0b [ 671.433375][ T629] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 671.444016][ T629] usb 3-1: Product: syz [ 671.448969][ T629] usb 3-1: Manufacturer: syz [ 671.455255][ T629] usb 3-1: SerialNumber: syz [ 671.462585][ T629] usb 3-1: config 0 descriptor?? 11:59:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r1) write$selinux_attr(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) r5 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000140)={r4, 0x0, 0x2, r5}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000100)={r4, 0x0, 0x0, r5}) 11:59:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:44 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x62, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:44 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/fscreate\x00') writev(r0, &(0x7f00000002c0)=[{&(0x7f0000001680)='d', 0x1}], 0x1) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fe4, 0x1}, 0x48) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffeca50000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000380)='kmem_cache_free\x00', r3}, 0x10) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c"], 0x15) r4 = dup(r2) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r4, &(0x7f0000000a40)={0xb8, 0x0, 0x0, [{{}, {0x0, 0x0, 0xa, 0x0, '.^!(/$$[%/'}}]}, 0xb8) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}]}}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x12, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, &(0x7f0000000080)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) 11:59:44 executing program 3: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) 11:59:44 executing program 1: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 671.867786][T15359] EXT4-fs (loop0): unmounting filesystem. [ 671.950071][ T629] usb 3-1: MIDIStreaming interface descriptor not found [ 671.978555][ T629] usb 3-1: USB disconnect, device number 91 11:59:45 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x7, 0x40) signalfd4(r0, &(0x7f0000000080)={[0xffff]}, 0x8, 0xc0000) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="1201800032090000001010140008000000410902240001000000000931cc00010386a600092100000001220300090581030000000000"], 0x0) syz_usb_control_io$hid(r2, 0x0, 0x0) syz_usb_control_io(r2, &(0x7f00000004c0)={0x2c, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00.'], 0x0, 0x0, 0x0, 0x0}, 0x0) 11:59:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000000)='GPL\x00', 0xffff, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) removexattr(0x0, 0x0) 11:59:45 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x62, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:45 executing program 1: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000002280)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) read$FUSE(r1, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0x0, r2, {0x7, 0x9, 0x0, 0x8695c3813aa3cd9d}}, 0x50) read$FUSE(r1, &(0x7f0000006580)={0x2020, 0x0, 0x0}, 0x2020) truncate(&(0x7f0000000080)='./file0\x00', 0x3) write$FUSE_INIT(r1, &(0x7f0000006500)={0x50, 0x0, r3}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0xffffffffffffff95) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) dup(r4) write$selinux_attr(r5, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = eventfd(0x0) r8 = eventfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe9b) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f0000000140)={r7, 0x0, 0x2, r8}) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f0000000100)={r7, 0x0, 0x2, r8}) 11:59:45 executing program 0: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x0, 0x0, 0x0) 11:59:45 executing program 3: r0 = getpid() (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) (async, rerun: 32) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8071, 0xffffffffffffffff, 0xadea000) (rerun: 32) r2 = socket(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xfffd}, {0x6, 0x3}, {0xfff2, 0xe}}}, 0x24}}, 0x0) (async) open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b9b41476a821b2b1bcbd2eadbafa736396f4038931b08be42e314087e5461bee729a2e6bec331b526a6186c9d05e460339a3694c584668f6bffa4499869e19a6bcb42467fb324d8098052191b2057eeaacbfdf8cbfa4d280998ed31945f34df149144a6f6cd3fb256153e4f0dc8dbb6bd3d7646613d9973a4112e0d0334129495c8b360715882428d7a472d33b4494a1f13639a7703be0fece29c7a0628e5d9168236d71bdc8b6368844a33de097e606550c31b782efaf8c21f5", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r7}, 0x10) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa) (async) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000001c0)={'bridge0\x00', 0x0}) (async) setsockopt$packet_int(r5, 0x107, 0x8, &(0x7f0000000000)=0xf45, 0x4) sendto$packet(r5, &(0x7f00000000c0)="3f030e000300120006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r9, 0x1, 0x0, 0x6, @multicast}, 0x14) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r10}, 0x10) syz_pidfd_open(r0, 0x0) (async, rerun: 32) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000000)='./file0\x00', 0x8000, &(0x7f0000000180)=ANY=[], 0x2, 0x270, &(0x7f00000003c0)="$eJzs3D9rG2cYAPBHlezKhiIPBdNS6JUunYTt0t2m2FAqaGkRpaVDTS3TonMNFhikwX+mfomEfINkzBrIELJkyBcIgeAEssRbCAEF+2THNrJPSbAV4t9vuZfT89zzvK8OnQTi/euLlebSamt5d3cnyuVClGZjNl5ETMRHUYzMVgAAH5Ln3W4862aG3QsAcDE8/wHg8hnw+f9zdti8qLYAgHPk9z8AXD6//v7Hj3O12vwvSVKOWPl/vb5e3z+O9QKW499IoxFTUYmXEd1D2Xjhh9r8VLLn8UTUVzZ7+Zvr9ezfg3MH+dNRiYl++YX56SRzPH8kxnv5D8ajETNRiU/715/pmz8a33x9pH41KnH/71iNNJZiL/d1/sZ0knz/Uy2JUhzJ/3g/bt9Y36XzfQkAAAAAAAAAAAAAAAAAAAAAgLdWTQ713b+nWj3t9Sx/7vT9gcrH9wc6uT9PKT4vDXfuAAAAAAAAAAAAAAAAAAAA8L5otTvNxTRtrJ01+O/u9dt5Me2de1u/5cV0moVe3fyi5z345KtHV06P2S7kr08hp0Sxd403bOzWlyfO/Fkc4DqFrQFKlHurn99GMafVOzv/fPZta/K7/jHFGMJ7OnLWrfW0EtE3a/udq98Y6m18MOvc4Mmrs4s3Nx4+GfTKF/cZBAAAAAAAAAAAAAAAAAAAZFrtTrM87CYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYMha7U5zMU0bo9HuXIs0bawdnDlzsDBAzOFg2HMEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBXAQAA//9kuJIF") (rerun: 32) syz_mount_image$fuse(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0xfd, 0x0, 0x0) (async, rerun: 64) r11 = socket$xdp(0x2c, 0x3, 0x0) (rerun: 64) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000cab000)=0x7) setuid(r13) (async, rerun: 32) setsockopt$XDP_UMEM_REG(r11, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xa00038c0, 0x1000}, 0x20) (rerun: 32) 11:59:45 executing program 1: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080), 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:45 executing program 0: io_setup(0x7, &(0x7f0000000280)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r3}, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r4, 0x4c80, 0xffffffffffffffb6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r5 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xe2, 0x54, 0x46, 0x10, 0x23a7, 0xfedc, 0xe00b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x3, 0x42}}]}}]}}, 0x0) syz_usb_control_io(r5, &(0x7f00000004c0)={0x2c, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00031a0000001a03b8ff9998a3c8bb61a15ee63c82775354459a16a294827d8f"], 0x0, 0x0, 0x0}, 0x0) 11:59:45 executing program 1: io_setup(0x7, &(0x7f0000000280)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r3}, 0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r4 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xe2, 0x54, 0x46, 0x10, 0x23a7, 0xfedc, 0xe00b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x3, 0x42}}]}}]}}, 0x0) syz_usb_control_io(r4, &(0x7f00000004c0)={0x2c, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00031a0000001a03b8ff9998a3c8bb61a15ee63c82775354459a16a294827d8f"], 0x0, 0x0, 0x0}, 0x0) [ 672.604318][T17648] loop3: detected capacity change from 0 to 256 [ 672.655706][T17648] loop3: detected capacity change from 0 to 256 [ 672.690008][T17648] loop3: detected capacity change from 0 to 256 [ 672.706224][T17648] loop3: detected capacity change from 0 to 256 [ 672.724202][T17648] loop3: detected capacity change from 0 to 256 [ 672.745030][T17648] loop3: detected capacity change from 0 to 256 11:59:45 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x0, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) [ 672.763573][T17648] loop3: detected capacity change from 0 to 256 [ 672.783820][T17648] loop3: detected capacity change from 0 to 256 [ 672.803901][T17648] loop3: detected capacity change from 0 to 256 11:59:45 executing program 3: io_setup(0x7, &(0x7f0000000280)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r4}, 0x10) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r5, 0x4c80, 0xffffffffffffffb6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r6 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xe2, 0x54, 0x46, 0x10, 0x23a7, 0xfedc, 0xe00b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x3, 0x42}}]}}]}}, 0x0) syz_usb_control_io(r6, &(0x7f00000004c0)={0x2c, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00031a0000001a03b8ff9998a3c8bb61a15ee63c82775354459a16a294827d8f"], 0x0, 0x0, 0x0}, 0x0) [ 672.859760][ T7551] usb 1-1: new high-speed USB device number 107 using dummy_hcd [ 672.872194][ T8363] usb 2-1: new high-speed USB device number 102 using dummy_hcd [ 673.119776][ T7551] usb 1-1: Using ep0 maxpacket: 16 [ 673.125798][ T8363] usb 2-1: Using ep0 maxpacket: 16 [ 673.169821][ T327] usb 4-1: new high-speed USB device number 111 using dummy_hcd 11:59:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xa, 0x8, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x40}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='ext4_es_insert_delayed_block\x00', r3}, 0x10) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000080)='ext4_es_insert_delayed_block\x00', r4}, 0x10) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) bpf$MAP_CREATE(0x104000000000000, &(0x7f0000000140)=@base={0x5, 0x4, 0x6c03, 0x41}, 0x48) (async) write$cgroup_type(r5, &(0x7f0000000180), 0x2009) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r8}, 0x10) (async) ioctl$TUNSETOFFLOAD(r6, 0x40086607, 0x20001412) (async) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) (async) r9 = eventfd(0x0) r10 = eventfd(0x0) (async) r11 = socket$nl_generic(0x10, 0x3, 0x10) (async) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="01000000000000000000030000005800018044000400200001000a0000000000000000005f3a00000000000000000000004100000000200002000a00000000000000fe8000000000000000000000000000bb000000000d0001007564703a73"], 0x6c}}, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='sched_switch\x00', r13}, 0x10) (async) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000140)={r9, 0x0, 0x2, r10}) [ 673.409971][ T7551] usb 1-1: New USB device found, idVendor=23a7, idProduct=fedc, bcdDevice=e0.0b [ 673.421430][ T8363] usb 2-1: New USB device found, idVendor=23a7, idProduct=fedc, bcdDevice=e0.0b [ 673.430528][ T7551] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 673.438434][ T8363] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 673.449788][ T327] usb 4-1: Using ep0 maxpacket: 16 [ 673.451625][ T7551] usb 1-1: Product: syz [ 673.459959][ T8363] usb 2-1: Product: syz [ 673.466325][ T8363] usb 2-1: Manufacturer: syz [ 673.471986][ T8363] usb 2-1: SerialNumber: syz [ 673.477737][ T7551] usb 1-1: Manufacturer: syz [ 673.483613][ T7551] usb 1-1: SerialNumber: syz [ 673.493208][ T8363] usb 2-1: config 0 descriptor?? 11:59:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x8, 0x7}, 0x48) r0 = socket(0x1e, 0x4, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x4}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x101d0}], 0x1}}], 0x400000000000181, 0x9200000000000000) dup3(r1, r0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020752d00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095", @ANYRESHEX=r1, @ANYRES16=r1, @ANYRESOCT], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x28}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r4}, 0x10) setresgid(0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r6, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff"], 0x15) r7 = dup(r6) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000008c0)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r7}}) write$FUSE_BMAP(r7, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r7, &(0x7f0000000640)=ANY=[@ANYBLOB="6801"], 0x168) write$FUSE_BMAP(r7, &(0x7f00000000c0)={0x18}, 0x18) write$FUSE_INIT(r7, &(0x7f0000000580)={0x50}, 0x50) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000400), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r7}}) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r8}, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x10) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000000)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r2}, 0x10) [ 673.504461][ T7551] usb 1-1: config 0 descriptor?? [ 673.582385][T17668] syz-executor.2[17668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.582439][T17668] syz-executor.2[17668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.603058][T17668] overlayfs: failed to resolve '/': -2 [ 673.819867][ T327] usb 4-1: New USB device found, idVendor=23a7, idProduct=fedc, bcdDevice=e0.0b [ 673.829801][ T327] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 673.838187][ T327] usb 4-1: Product: syz [ 673.842445][ T327] usb 4-1: Manufacturer: syz [ 673.846987][ T327] usb 4-1: SerialNumber: syz [ 673.852990][ T327] usb 4-1: config 0 descriptor?? [ 673.999849][ T8363] usb 2-1: MIDIStreaming interface descriptor not found [ 674.017174][ T8363] usb 2-1: USB disconnect, device number 102 11:59:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) [ 674.309961][ T7551] usb 1-1: MIDIStreaming interface descriptor not found [ 674.322368][ T7551] usb 1-1: USB disconnect, device number 107 11:59:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000080)=0x5, 0x4) getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) r4 = open(&(0x7f0000000040)='./bus\x00', 0x145142, 0x0) ftruncate(r4, 0x2007ffc) sendfile(r4, r4, 0x0, 0x800000009) ioctl$FS_IOC_FSSETXATTR(r4, 0x6609, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000695408c4ab29a40fd9920018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$inet6(0xa, 0x80003, 0x6b) socket$igmp(0x2, 0x3, 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2$9p(&(0x7f0000000380), 0x0) dup(r6) socket$igmp(0x2, 0x3, 0x2) socket$nl_route(0x10, 0x3, 0x0) r7 = timerfd_create(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f00000001c0), 0xfe, 0x54c, &(0x7f0000000400)="$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") r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r8, &(0x7f0000000340)=ANY=[@ANYRES64=r7], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r8, 0x0) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r9, 0x541c, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) 11:59:47 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000009c0)="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", 0xa53}], 0x1}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='ext4_ext_rm_leaf\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='ext4_ext_rm_leaf\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000400)='./file1/file0\x00', 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=@framed={{}, [@printk={@p, {}, {}, {}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x5}, {}, {0x85, 0x0, 0x0, 0x72}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) setxattr$security_ima(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000040), &(0x7f0000000240)=@v2={0x5, 0x3, 0x15, 0x1, 0xa1, "ffc393f758ce4932ccf02d35761fe050d382a24131b59fd834bc28fbf24554a6ab33ff90115412ba2332129bb5120fd6ce3785abca92a4e25e2e41058f91a21a75ac3eae576e9c8c95a0be66b1ff4bfe8ea5d55e0b10c6551addcd41019d3941c87f9ddcb9a00081d66f1ed7e197322d8c340201d6f4e84f2365249f36a9636aff2064988487f57904f9d3357cfed6948b5d41c4ad9da607d4076c63b6b5b59188"}, 0xaa, 0x2) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r9}, 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}, {}, {0x85, 0x0, 0x0, 0xb6}}]}, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='sys_enter\x00', r10}, 0x10) [ 674.502537][T17676] loop2: detected capacity change from 0 to 1024 [ 674.522296][T17676] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 11:59:47 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = dup(r0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r1, 0xffffffffffffffff, 0x4, r0}, 0x10) 11:59:47 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f00000000c0)={0x16}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000000c0), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000009c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = dup2(r3, r2) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) r7 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) r9 = dup3(r8, r7, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f00000005c0)={0x54, 0x0, &(0x7f0000000680)=[@clear_death, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r4}, 0x10) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 11:59:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000300)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) pause() munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={0x0}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000035c0)={0x0, 0x0, &(0x7f0000003580)={&(0x7f0000000580)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@private, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@mcast2, 0x0, 0x6c}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) [ 674.609875][ T327] usb 4-1: MIDIStreaming interface descriptor not found [ 674.624424][ T327] usb 4-1: USB disconnect, device number 111 [ 674.638887][T16080] udevd[16080]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/sound/card2/controlC2/../uevent} for writing: No such file or directory [ 674.719395][ T28] audit: type=1400 audit(1713268787.331:560): avc: denied { create } for pid=17686 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 674.740077][ T28] audit: type=1400 audit(1713268787.341:561): avc: denied { write } for pid=17686 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 674.760856][ T28] audit: type=1400 audit(1713268787.341:562): avc: denied { nlmsg_write } for pid=17686 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 11:59:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") [ 674.912870][T17691] loop0: detected capacity change from 0 to 512 [ 674.922284][T17691] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 674.936279][T17691] EXT4-fs (loop0): orphan cleanup on readonly fs [ 674.943607][T17691] EXT4-fs error (device loop0): ext4_read_block_bitmap_nowait:511: comm syz-executor.0: Block bitmap for bg 0 marked uninitialized 11:59:47 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) [ 674.961818][T17691] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 674.972497][T17691] EXT4-fs (loop0): 1 orphan inode deleted [ 674.982162][T17691] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. 11:59:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cf84ded40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c86e00f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec231fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895012f1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c3405000000000000003871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d37261774cc5a3bf6b466cb72812da518ff602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d50a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a31b16ac5fb73fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953f88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a5fe1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9d66ebbc8bab4ea81232fbef665f6212f875b2a00000000000000aceb111b66a500ca52fd8f848088c67ee65dfdcc4c580e9bc18c1699dca07d019bf1bf9dd3da480d6c155d7e60674ce88ab5ae07a9d16e22792d99986b531ab4e592ab5925da779e700cf20309a2137877690dc5c07956fc82d7b3bb46d3138041af18508938c9be4e5d0a98073463a5cff6c146d020743da474cb81677a6f389f0e00c33b70b7f8bab95435c27167f365a29fb09cbf35bf192f6a65616fa2ad9a6c7ca3a3ecd96aaecd993e8badb40e7eb8a22b0015e70c885cd519e28448168c6d914265998bff74ea1b0e651a6cae9419096248a0e41573827ad60fafce6e6540734c1f23f75337d836c31497e8112969a039d65aa297e2b046b5f4d11116a89f9f65693d4dc3e70fbfe0b2044fdb3f87e887d1daae8e38a0c19f668f776e19a02bb2449ee4384f6536879c85d7e41bc0276ee2b125d41ff358323311703ec01d64a573bdeb75bdcc87d01de38365ab9222713d2d1640a742d62fefb5403b2ed9969c32a0841e8c36b0107bb888eb14ac62e6d4bdfaeb9ee7436b97bf3825a19d6c8997ce285edf1d277ed703f560460417bfe702af833e83c5b987befb6d1fcf765ab7ea537d9dafb622a1ba8686cb9b1c63b84470364942e90d1cf856cead864f5e38c83b9ed86cc5725a20299ce512b1650bb1f12ad0c6"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup(r4) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000500)='./bus\x00', 0x1c916, &(0x7f0000000340), 0x1b, 0x4cb, &(0x7f0000000c40)="$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") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, 0x0}], 0xffff, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x4000}) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.events\x00', 0x275a, 0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4020aeb2, &(0x7f00000004c0)={0x0, r7}) syz_clone(0x85203080, 0x0, 0x0, 0x0, 0x0, 0x0) [ 675.045158][T15359] EXT4-fs (loop0): unmounting filesystem. 11:59:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup(r4) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000500)='./bus\x00', 0x1c916, &(0x7f0000000340), 0x1b, 0x4cb, &(0x7f0000000c40)="$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") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, 0x0}], 0xffff, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x4000}) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.events\x00', 0x275a, 0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4020aeb2, &(0x7f00000004c0)={0x0, r7}) syz_clone(0x85203080, 0x0, 0x0, 0x0, 0x0, 0x0) [ 675.118354][T17696] loop0: detected capacity change from 0 to 512 [ 675.145935][T17696] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 675.174566][T17696] EXT4-fs (loop0): failed to initialize system zone (-117) [ 675.183182][T17696] EXT4-fs (loop0): mount failed 11:59:47 executing program 2: r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000002c0)=ANY=[@ANYBLOB="1201040000002f2057155081ed29010203010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000c00)={0x84, &(0x7f00000007c0)={0x0, 0x8, 0x1, "ab"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000959800001801000020a07025000000fffe20202027ea000000000000bfa100000000000007010000f0ffffffb702000005000000b7030000000000008500000073000000957ef7364b7691b9f9de2e59f30933142ccee3113865fc315fb19ece5addc2e9b1bc4dd3c8f72619e99964501a9bcb7b6473ff88f34006150044c600cc5698912c34f9e9bd2b617e30b7b600040000bf55e5e9554fbb7a4700348ce443c18df784f5f9b06e77628004f5c01b105e5d04e3410f5b09e2d17f8de69197fc694eb9"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x8, 0x108}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000160000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r3}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7103}) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1008002, &(0x7f00000004c0)={[{@grpquota}, {@delalloc}, {@resuid}, {@init_itable}, {@dioread_nolock}, {@jqfmt_vfsold}, {@nomblk_io_submit}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f00000005c0)="$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") syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000d80)=ANY=[@ANYRES8, @ANYRESHEX], 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d90000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) [ 675.216368][T17701] loop3: detected capacity change from 0 to 512 [ 675.226156][T17701] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 675.250633][T17701] EXT4-fs (loop3): failed to initialize system zone (-117) [ 675.260672][T17701] EXT4-fs (loop3): mount failed [ 675.301650][ T5262] EXT4-fs (loop2): unmounting filesystem. 11:59:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) 11:59:48 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") 11:59:48 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = dup(r0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r1, 0xffffffffffffffff, 0x4, r0}, 0x10) 11:59:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r2, &(0x7f0000000980), 0x12) [ 675.564135][T17718] loop4: detected capacity change from 0 to 512 11:59:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) [ 675.616929][T17718] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 675.629855][ T7551] usb 3-1: new high-speed USB device number 92 using dummy_hcd 11:59:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") [ 675.666888][T17718] EXT4-fs (loop4): orphan cleanup on readonly fs [ 675.693406][T17718] EXT4-fs error (device loop4): ext4_read_block_bitmap_nowait:511: comm syz-executor.4: Block bitmap for bg 0 marked uninitialized [ 675.715862][T17718] EXT4-fs error (device loop4) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 675.719932][T17727] loop1: detected capacity change from 0 to 512 [ 675.740485][T17718] EXT4-fs (loop4): 1 orphan inode deleted [ 675.746608][T17718] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 675.786968][T17727] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 675.811309][T17727] EXT4-fs (loop1): orphan cleanup on readonly fs [ 675.818771][T17727] EXT4-fs error (device loop1): ext4_read_block_bitmap_nowait:511: comm syz-executor.1: Block bitmap for bg 0 marked uninitialized 11:59:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x0, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) [ 675.841382][T17727] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 675.855831][T17727] EXT4-fs (loop1): 1 orphan inode deleted [ 675.866860][T17727] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 675.878057][T15351] EXT4-fs (loop4): unmounting filesystem. [ 675.885123][ T7551] usb 3-1: Using ep0 maxpacket: 32 11:59:48 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) 11:59:48 executing program 4: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) [ 675.972970][T15454] EXT4-fs (loop1): unmounting filesystem. 11:59:48 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:48 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") 11:59:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$eJzs3M1vFGUYAPBndrcgn10RP0BUFI3Ej5YWVA5eNDHxoImJHvBYSyHIQg2tiZDGFkPwYqIk3I2JFxP/Ak+eiHoy8Yp3Q0IMF9DTmunOLtvtbtl2t7vF/f2SYefdfXfe55mZd+edGaYBDKz96T9JxPaIuB4RwxGRq69QjIgtlXp3bs1N/nNrbjKJcvn9v5P0a3H71txktWqSvW6rFArpgnKXksVFNJo5f+H0RKk0dS4rj86e+WR05vyFl0+dmTg5dXLq7PjRo0cOj7326vgrXckzjen23s+n9+15+8Mr704eu/LRrz9W4i2Xr147tCSP7hiKiLnaOmn0XHcb67sddfNJoY+BsCqbI6KQ7a3XYzjyl3bWPhuOt77oa3DAuiqXy+Xx1h8vlIH/sST6HQHQH9UDfXr+W516NPTYEG6+UTkBSvO+k02VTwpxMasz1HB+2037I+LYwr/fplM0XE8BAFgPP6fjn5eajP+KEY/U1duZ3RsqRsSDEbErIh6KiN0R8XBU6j4aEY+tsv39DeXl45/cjbVl1p50/Pd6dm9r6fivdhesmM9KOxbzH0pOnCpNHcrWycEY2pyWx5ouPYlYSF//+LpV+/Xjv3RK26+OBbM4bhQ2L/3O8YnZiY4Tz9y8GLG30Cz/JAp3s4g9EbF3jW2ceuGHfUvfydfm7p3/Crpwn6n8XcTzle2/EA35VyUr358cfSBKU4dGq3vFcr/9fvm9Vu13lH8XpNt/a9P9v5Z/Mam/XzuzbBGb7tXG5T+/bHlOs9b9f1PywZLGP5uYnT03FrEpeWf5+3UXuKvlav00/4MHmvf/XXF3TTweEelO/EREPBkRT2WxPx0Rz0TEgRXy/+XNZz9ee/7rK81/flXbf/Uz+dPXfmrVfnvb/0i1sBhUO79/7QbYyboDAACA+0UuIrZHkhupzedyIyOV/y+/O7bmStMzsy+emP707PHKMwLFGMpVr3QN110PHcuuDVfL41l5Pisfzq4bX81vWSyPTE6Xjvc7eRhw21r0/9Rf+X5HB6w7z2vB4NL/YXCtvf/75YD73T16ca5XcQC95ygOg6tZ/5/vQxxA7zn+w+Cq9f9v2qhc97hX48ObwP3H8R8Gl/4PA6mT5/o3xEx8H7FynWSjhLqqma86+XqhBxFGbmOsqB7OjOcj+hhGod2/ahHny/MdN9rvXyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDu+C8AAP//javoAw==") [ 676.101636][T17743] loop4: detected capacity change from 0 to 512 [ 676.121315][T17743] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 676.134131][T17745] loop1: detected capacity change from 0 to 512 [ 676.145196][T17743] EXT4-fs (loop4): orphan cleanup on readonly fs [ 676.156045][T17743] EXT4-fs error (device loop4): ext4_read_block_bitmap_nowait:511: comm syz-executor.4: Block bitmap for bg 0 marked uninitialized [ 676.169845][ T7551] usb 3-1: New USB device found, idVendor=1557, idProduct=8150, bcdDevice=29.ed [ 676.194798][T17745] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 676.194825][T17743] EXT4-fs error (device loop4) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 676.195021][T17743] EXT4-fs (loop4): 1 orphan inode deleted [ 676.230335][T17745] EXT4-fs (loop1): orphan cleanup on readonly fs [ 676.238587][T17745] EXT4-fs error (device loop1): ext4_read_block_bitmap_nowait:511: comm syz-executor.1: Block bitmap for bg 0 marked uninitialized [ 676.245509][ T7551] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 676.255879][T17743] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 676.279769][T17745] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 676.293061][T17745] EXT4-fs (loop1): 1 orphan inode deleted 11:59:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x0, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) [ 676.293371][ T7551] usb 3-1: Product: syz [ 676.299269][T17745] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 676.314842][ T7551] usb 3-1: Manufacturer: syz [ 676.326508][ T7551] usb 3-1: SerialNumber: syz [ 676.341806][ T7551] usb 3-1: config 0 descriptor?? 11:59:49 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:49 executing program 0: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:49 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) [ 676.364804][T15351] EXT4-fs (loop4): unmounting filesystem. 11:59:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:49 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2dc5c07001a000100000000897b2a1d84f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f069d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d3f00d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbe1f000000000000007e15f9b683e63cfff7c638bca835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c25bb2183634a33b18c4b459f9aea5ab222d7060000000000665106000000a803d1b56126efec0225a5433883b0d17cb21dbfd886caf2624e7f00da0ef9893ef57c79a182dceca9c46a9f8b001e53b29c0c698ed30d8942e94ac057bde74e42021d895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b52c8422295fde5626cd43fb43fb3acf9b2e840713cba86d43a570ee3589b7e9000000000000000000000000000000dc85131317c56465978d957d000000000000000000000000000000000000000000000000000000000000000000301171e8e3a2d0c842c20fd293c073b93f7662fad1f4ae3e1fe359aa29a4b8965229fa06b0fb2e23d2644cfbdbd6929aa42151ea48334743ad0c378641e74d55d6cd7b098599190100000055ec9c0c26b71588d6fc97e3098fb0e778be446659cf665e7f848d85de70c3c426a539a9a0e92e7bbf77528053dcb3b791b8e3faae507a3b721b670b06b78bb09e82ecc85a4bbc596d8ce02a2cbede5573f8bdc84d61c5634fffa50e74ec0f2da4f3d82c2d2b5a20ec152df14481c3bb59a23e014d07fc070d87f58118f468bf80283e0ce7efda7906f9c53319aef22e01a9ba5649fc10fb5b8132dcf42c47a4b79efb9f720ebd2dcc1634f870cee6201bc0ad9e17c4633a17de505bed8fded3053cb455636132bdae3239b9c8b437256ac21a49c4f03b268c47e9becbaff440728429f9e0b0222485188b745b3c871d01d27eb4e5e00bcd79b95601098e044345a8aaa12fda56277aef89192b9af038ab8808a2adf0c3a15ec863e5f352c7967607cede40848eae2704701b7af0a0b30e9e5b76f45500000000000000", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") mkdir(&(0x7f00000003c0)='./file0\x00', 0x40) r1 = open(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, 0x0, 0x0) sendmmsg$unix(r6, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0x5, 0x200003f000000, 0x20000000}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x44001, &(0x7f0000000400)={0xa, 0x4e22, 0x7, @remote, 0x99}, 0x1c) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000001280)="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", 0xfa1}, {&(0x7f0000000480)="4d72afd2bb2eb0d847e8e3a7148339ad9a60ea1290d56acea4d7901ebbc407b52e1bd640fac4016f", 0x28}, {&(0x7f00000004c0)="ce2d1e468bd3055c952aea7c15b6dd87ff2ed853d88f8a29b3eb", 0x1a}, {&(0x7f0000000500)="1477836b4da67054fdad43be8b813801364fa71265ba4942", 0x18}, {&(0x7f0000000580)="fdd2d433d986be987c91cdec86e34015a837f0f4ee6d466de204968e34b63a9d15afc2296f02e4833d2c4d899cc163616fe5f2588f2a89ae4bd6db0ff1e8008c063c5d88", 0x44}], 0x5, &(0x7f0000000b40)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r4, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r4, r3, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r6]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee01, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [r3, r0, 0xffffffffffffffff, 0xffffffffffffffff, r5]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x110, 0x80}}], 0x1, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x104) write$P9_RREADDIR(r7, &(0x7f0000000500), 0xbf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getpeername$unix(r8, 0x0, &(0x7f0000000040)=0x19) connect$unix(0xffffffffffffffff, &(0x7f0000000400)=@file={0x0, './file2\x00'}, 0x6e) sendfile(r7, r7, &(0x7f0000000240)=0xc0000, 0x7f06) 11:59:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) [ 676.428809][T15454] EXT4-fs (loop1): unmounting filesystem. [ 676.505949][T17757] loop0: detected capacity change from 0 to 8192 11:59:49 executing program 3: r0 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) syz_pidfd_open(r0, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:59:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup(r4) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000500)='./bus\x00', 0x1c916, &(0x7f0000000340), 0x1b, 0x4cb, &(0x7f0000000c40)="$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") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, 0x0}], 0xffff, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x4000}) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.events\x00', 0x275a, 0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4020aeb2, &(0x7f00000004c0)={0x0, r7}) syz_clone(0x85203080, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:49 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") 11:59:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(r1) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f000014e000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/157, 0x9d, 0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, 0x0}], 0xffff, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x4000}) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0x5450, 0x0) [ 676.596111][T17767] loop4: detected capacity change from 0 to 512 [ 676.611373][T17767] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 676.627781][T17767] EXT4-fs (loop4): orphan cleanup on readonly fs [ 676.640748][T17767] EXT4-fs error (device loop4): ext4_read_block_bitmap_nowait:511: comm syz-executor.4: Block bitmap for bg 0 marked uninitialized [ 676.641736][T17763] loop1: detected capacity change from 0 to 512 [ 676.660927][T17767] EXT4-fs error (device loop4) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 676.676655][T17767] EXT4-fs (loop4): 1 orphan inode deleted [ 676.684338][T17763] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended 11:59:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000080)=0x5, 0x4) (async) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000080)=0x5, 0x4) getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) open(&(0x7f0000000040)='./bus\x00', 0x145142, 0x0) (async) r4 = open(&(0x7f0000000040)='./bus\x00', 0x145142, 0x0) ftruncate(r4, 0x2007ffc) (async) ftruncate(r4, 0x2007ffc) sendfile(r4, r4, 0x0, 0x800000009) (async) sendfile(r4, r4, 0x0, 0x800000009) ioctl$FS_IOC_FSSETXATTR(r4, 0x6609, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000695408c4ab29a40fd9920018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$inet6(0xa, 0x80003, 0x6b) (async) socket$inet6(0xa, 0x80003, 0x6b) socket$igmp(0x2, 0x3, 0x2) (async) socket$igmp(0x2, 0x3, 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2$9p(&(0x7f0000000380), 0x0) dup(r6) socket$igmp(0x2, 0x3, 0x2) socket$nl_route(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) r7 = timerfd_create(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f00000001c0), 0xfe, 0x54c, &(0x7f0000000400)="$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") (async) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f00000001c0), 0xfe, 0x54c, &(0x7f0000000400)="$eJzs3d9rW1UcAPDvTdv91nUwhvoghT04mUvX1h8TfJiPosOBvs/Q3pXRZBlNOtY6cHtwL77IEEQciH+A7z4O/wH/ioEOhoyiD75EbnrTZWvSZm22Zubzgduec+9Nzz0593t6Tk5CAhhaE9mPQsSrEfFtEnG47dho5Acn1s5bfXh9NtuSaDQ++yuJJN/XOj/Jfx/MM69ExG9fR5wsbCy3tryyUCqX08U8P1mvXJmsLa+culQpzafz6eXpmZkz78xMv//eu32r65vn//nh07sfnfnm+Or3v9w/cjuJs3EoP9Zejx240Z6ZiIn8ORmLs0+cONWHwgZJstsXwLaM5HE+FlkfcDhG8qgH/v++iogGMKQS8Q9DqjUOaM3t+zQPfmE8+HBtArSx/qNrr43Evubc6MBq8tjMKJvvjveh/KyMX/+8czvbon+vQwBs6cbNiDg9Orqx/0vy/m/7TvdwzpNl6P/g+bmbjX/e6jT+KayPf6LD+Odgh9jdjq3jv3C/D8V0lY3/Pug4/l1ftBofyXMvNcd8Y8nFS+U069tejogTMbY3y2+2nnNm9V6j27H28V+2ZeW3xoL5ddwf3fv4Y+ZK9dJO6tzuwc2I1zqOf5P19k86tH/2fJzvsYxj6Z3Xux3buv7PVuPniDc6tv+jFa1k8/XJyeb9MNm6Kzb6+9ax37uVv9v1z9r/wOb1H0/a12trT1/GT/v+Tbsd2+79vyf5vJnek++7VqrXF6ci9iSfbNw//eixrXzr/Kz+J45v3v91uv/3R8QXPdb/1tFbXU8dhPafe6r2f/rEvY+//LFb+b21/9vN1Il8Ty/9X68XuJPnDgAAAAAAAAZNISIORVIorqcLhWJx7f0dR+NAoVyt1U9erC5dnovmZ2XHY6zQWuk+3PZ+iKn8/bCt/PQT+ZmIOBIR343sb+aLs9Xy3G5XHgAAAAAAAAAAAAAAAAAAAAbEwS6f/8/8MbLbVwc8c77yG4bXlvHfj296AgaS//8wvMQ/DC/xD8NL/MPwEv8wvMQ/DC/xD8NL/AMAAAAAAAAAAAAAAAAAAAAAAAAAAEBfnT93Ltsaqw+vz2b5uavLSwvVq6fm0tpCsbI0W5ytLl4pzler8+W0OFutbPX3ytXqlanpWLo2WU9r9cna8sqFSnXpcv3CpUppPr2Qjj2XWgEAAAAAAAAAAAAAAAAAAMCLpba8slAql9NFCYltJUYH4zIk+pzY7Z4JAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB75LwAA///MUDi3") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r8, &(0x7f0000000340)=ANY=[@ANYRES64=r7], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r8, 0x0) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r9, 0x541c, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) [ 676.684748][T17767] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 676.701592][T17763] EXT4-fs (loop1): failed to initialize system zone (-117) [ 676.720134][T17763] EXT4-fs (loop1): mount failed 11:59:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) [ 676.768797][T15351] EXT4-fs (loop4): unmounting filesystem. 11:59:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x7, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095", @ANYBLOB="ba36c4e12532102b52859e2c803228cc34ebb883331590d62375c24f69e0a80ae93f3c9cf4a86b65925e5ddeee4228aa432bfc2c734b458572fbaf7ea953c8366adc274b4f4fe9de30fd2097d6fc04f7dac13d8917673f02fd82e8daa42b92c1e69f76c75fcacdc3896f8cfd1dfe165fbb8b322af242abf1eca8e3c84d952b3a1deb6c8419cf94b0ee310794ee3b32c2e71eeba6f86f44bfc8e9c70e95550beea2453f587b9e986a7d89abe236dca3035cf9d30105e455db6956a32a9b4a9de7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$packet(0x11, 0x3, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r1}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r3}, 0x10) preadv2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000500)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) socket$inet(0x2, 0x80000, 0x6) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) getresuid(&(0x7f0000000200)=0x0, &(0x7f00000002c0), &(0x7f0000000340)) quotactl_fd$Q_GETNEXTQUOTA(r6, 0xffffffff80000901, r7, &(0x7f0000000380)) r8 = dup(r6) ioctl$KVM_SET_MSRS(r8, 0xc008ae88, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000050200f59104"]) write$cgroup_subtree(r8, &(0x7f00000001c0)={[{0x2b, 'cpu'}, {0x2d, 'blkio'}, {0x2d, 'net'}, {0x2b, 'rlimit'}, {0x2d, 'rdma'}]}, 0x1f) 11:59:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = dup(r2) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$MRT_ADD_MFC_PROXY(0xffffffffffffffff, 0x0, 0xd2, &(0x7f0000000040)={@remote, @empty, 0x0, "4ef7289910e0843a8f13f2fe244b73fb24e0fe49951c925bca907f6a609d8f49"}, 0x3c) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000b40), 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x57bd2fad169a9b88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) r7 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="12010000090003206d0414c340000000000109022400010000a000090400000103010100092100080001220100090581"], 0x0) syz_usb_control_io$hid(r7, &(0x7f00000001c0)={0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="00020c0000000c0002"], 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r7, 0x0, 0x0) syz_usb_control_io(r7, 0x0, 0x0) syz_usb_control_io(r7, 0x0, 0x0) syz_usb_control_io(r7, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f00000036c0), 0x0, 0x0) ioctl$UI_ABS_SETUP(r8, 0x4004556d, &(0x7f0000003700)={0x0, {0x1d94c8c7, 0x0, 0x0, 0x2}}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, 0x0}], 0xffff, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x4000}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f000000b000/0x2000)=nil}) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) 11:59:49 executing program 3: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 677.028483][T17710] loop2: detected capacity change from 0 to 1024 [ 677.045803][T17710] EXT4-fs: Ignoring removed nomblk_io_submit option [ 677.053604][T17710] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 677.087363][T17710] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 677.115062][T17710] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 677.128776][T17710] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 677.137585][T17710] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 677.159778][ T7551] (unnamed net_device) (uninitialized): Assigned a random MAC address: 1a:ec:fb:23:83:89 [ 677.177304][ T7551] rtl8150 3-1:0.0: eth1: rtl8150 is detected [ 677.188842][ T7551] usb 3-1: USB disconnect, device number 92 11:59:50 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:50 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") 11:59:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:50 executing program 0: getpid() r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x7, 0x4, 0x5, 0x2, 0x2dc3, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01001800000000000000e4000000a4000000030000000000000000000008000000000000000009000006040000000000000000000000000000000000001a0000000300000011000000090000000d00000007000000020000000000000002000000f9ffffff04000000010001000d0000000000000204000000070000000000000a040000000400000004000006040000000b000000400000000e000020030000000400"/191], 0x0, 0xbf}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/unix\x00') socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000000400)=@abs={0x1}, 0x6e) pread64(r1, &(0x7f0000000480)=""/177, 0xb1, 0xe0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r5, &(0x7f0000000000), 0xe) listen(r5, 0x0) ioctl$sock_SIOCINQ(r5, 0x541b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000080000000850000008600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x1004, 0x8, 0x8}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r8, 0x0, r10, 0x0, 0x39000, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r9, 0x0, r11, 0x0, 0x8ca, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x15}, &(0x7f0000000300)=0x0) timer_settime(r12, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r7}, 0x10) [ 677.789130][ T5262] EXT4-fs (loop2): unmounting filesystem. 11:59:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_plug\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r4}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 11:59:50 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:50 executing program 2: r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000002c0)=ANY=[@ANYBLOB="1201040000002f2057155081ed29010203010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000c00)={0x84, &(0x7f00000007c0)={0x0, 0x8, 0x1, "ab"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000959800001801000020a07025000000fffe20202027ea000000000000bfa100000000000007010000f0ffffffb702000005000000b7030000000000008500000073000000957ef7364b7691b9f9de2e59f30933142ccee3113865fc315fb19ece5addc2e9b1bc4dd3c8f72619e99964501a9bcb7b6473ff88f34006150044c600cc5698912c34f9e9bd2b617e30b7b600040000bf55e5e9554fbb7a4700348ce443c18df784f5f9b06e77628004f5c01b105e5d04e3410f5b09e2d17f8de69197fc694eb9"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x8, 0x108}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000160000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1008002, &(0x7f00000004c0)={[{@grpquota}, {@delalloc}, {@resuid}, {@init_itable}, {@dioread_nolock}, {@jqfmt_vfsold}, {@nomblk_io_submit}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f00000005c0)="$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") syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000d80)=ANY=[@ANYRES8, @ANYRESHEX], 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d90000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) [ 677.874481][T17842] loop3: detected capacity change from 0 to 512 [ 677.902508][ T28] audit: type=1400 audit(1713268790.521:563): avc: denied { listen } for pid=17835 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 677.931013][T17842] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 677.946141][T17842] EXT4-fs (loop3): orphan cleanup on readonly fs [ 677.953652][T17842] EXT4-fs error (device loop3): ext4_read_block_bitmap_nowait:511: comm syz-executor.3: Block bitmap for bg 0 marked uninitialized 11:59:50 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r1, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) [ 677.971295][T17842] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 677.983008][T17842] EXT4-fs (loop3): 1 orphan inode deleted [ 677.992119][T17842] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. 11:59:50 executing program 3: r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000002c0)=ANY=[@ANYBLOB="1201040000002f2057155081ed29010203010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000c00)={0x84, &(0x7f00000007c0)={0x0, 0x8, 0x1, "ab"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000959800001801000020a07025000000fffe20202027ea000000000000bfa100000000000007010000f0ffffffb702000005000000b7030000000000008500000073000000957ef7364b7691b9f9de2e59f30933142ccee3113865fc315fb19ece5addc2e9b1bc4dd3c8f72619e99964501a9bcb7b6473ff88f34006150044c600cc5698912c34f9e9bd2b617e30b7b600040000bf55e5e9554fbb7a4700348ce443c18df784f5f9b06e77628004f5c01b105e5d04e3410f5b09e2d17f8de69197fc694eb9"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x8, 0x108}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000160000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='timer_start\x00', r3}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7103}) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1008002, &(0x7f00000004c0)={[{@grpquota}, {@delalloc}, {@resuid}, {@init_itable}, {@dioread_nolock}, {@jqfmt_vfsold}, {@nomblk_io_submit}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f00000005c0)="$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") syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000d80)=ANY=[@ANYRES8, @ANYRESHEX], 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d90000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) 11:59:50 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:50 executing program 1: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f00000004c0)={'wg1\x00', 0x0}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)={0x20, r4, 0x1, 0x0, 0x0, {0x18}, [@ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x20}}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000140)='mm_page_alloc\x00', r6}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000100000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r9}, 0x10) io_uring_register$IORING_REGISTER_RESTRICTIONS(0xffffffffffffffff, 0x15, 0x0, 0x0) r11 = syz_btf_id_by_name$bpf_lsm(&(0x7f0000000280)='bpf_lsm_secctx_to_secid\x00') r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="c5cdcae0fe0391cea096e2e9e2904f60010dfd00507af329f4136d144ce23351388baad99bb45601cd2486b043edb26ccfb1fee059d76542dff3355dfd0e3bef296b9dde46b01a90295e67", @ANYRES32=r10, @ANYRESHEX=r7, @ANYRESHEX=r8], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r12}, 0x10) r13 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r13, 0x0, 0x0, 0x0) [ 678.065843][T16899] EXT4-fs (loop3): unmounting filesystem. 11:59:50 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) [ 678.169740][ T7551] usb 3-1: new high-speed USB device number 93 using dummy_hcd 11:59:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") [ 678.250359][T17871] loop1: detected capacity change from 0 to 512 [ 678.262552][T17871] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 678.277361][T17871] EXT4-fs (loop1): orphan cleanup on readonly fs [ 678.285684][T17871] EXT4-fs error (device loop1): ext4_read_block_bitmap_nowait:511: comm syz-executor.1: Block bitmap for bg 0 marked uninitialized [ 678.305395][T17871] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 678.317754][T17871] EXT4-fs (loop1): 1 orphan inode deleted [ 678.324441][T17871] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 678.369817][ T327] usb 4-1: new high-speed USB device number 112 using dummy_hcd 11:59:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r1, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:51 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cf84ded40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c86e00f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec231fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895012f1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c3405000000000000003871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d37261774cc5a3bf6b466cb72812da518ff602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d50a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a31b16ac5fb73fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953f88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a5fe1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9d66ebbc8bab4ea81232fbef665f6212f875b2a00000000000000aceb111b66a500ca52fd8f848088c67ee65dfdcc4c580e9bc18c1699dca07d019bf1bf9dd3da480d6c155d7e60674ce88ab5ae07a9d16e22792d99986b531ab4e592ab5925da779e700cf20309a2137877690dc5c07956fc82d7b3bb46d3138041af18508938c9be4e5d0a98073463a5cff6c146d020743da474cb81677a6f389f0e00c33b70b7f8bab95435c27167f365a29fb09cbf35bf192f6a65616fa2ad9a6c7ca3a3ecd96aaecd993e8badb40e7eb8a22b0015e70c885cd519e28448168c6d914265998bff74ea1b0e651a6cae9419096248a0e41573827ad60fafce6e6540734c1f23f75337d836c31497e8112969a039d65aa297e2b046b5f4d11116a89f9f65693d4dc3e70fbfe0b2044fdb3f87e887d1daae8e38a0c19f668f776e19a02bb2449ee4384f6536879c85d7e41bc0276ee2b125d41ff358323311703ec01d64a573bdeb75bdcc87d01de38365ab9222713d2d1640a742d62fefb5403b2ed9969c32a0841e8c36b0107bb888eb14ac62e6d4bdfaeb9ee7436b97bf3825a19d6c8997ce285edf1d277ed703f560460417bfe702af833e83c5b987befb6d1fcf765ab7ea537d9dafb622a1ba8686cb9b1c63b84470364942e90d1cf856cead864f5e38c83b9ed86cc5725a20299ce512b1650bb1f12ad0c6"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup(r4) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000500)='./bus\x00', 0x1c916, &(0x7f0000000340), 0x1b, 0x4cb, &(0x7f0000000c40)="$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") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, 0x0}], 0xffff, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x4000}) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.events\x00', 0x275a, 0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4020aeb2, &(0x7f00000004c0)={0x0, r7}) syz_clone(0x85203080, 0x0, 0x0, 0x0, 0x0, 0x0) [ 678.419838][ T7551] usb 3-1: Using ep0 maxpacket: 32 [ 678.434090][T15454] EXT4-fs (loop1): unmounting filesystem. [ 678.492620][T17878] loop1: detected capacity change from 0 to 512 [ 678.501875][T17878] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 678.523132][T17878] EXT4-fs (loop1): failed to initialize system zone (-117) [ 678.533371][T17878] EXT4-fs (loop1): mount failed [ 678.581968][T15572] device bridge_slave_1 left promiscuous mode [ 678.593942][T15572] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.604090][T15572] device bridge_slave_0 left promiscuous mode [ 678.612932][T15572] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.624033][T15572] device veth1_macvtap left promiscuous mode [ 678.634940][T15572] device veth0_vlan left promiscuous mode [ 678.639809][ T327] usb 4-1: Using ep0 maxpacket: 32 11:59:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x11, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="250a00000400000061114f000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x90) r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000002c0)=ANY=[@ANYBLOB="1201040000002f2057155081ed29010203010902120001000000000904"], 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{r1}, &(0x7f0000000680), &(0x7f0000000740)='%pS \x00'}, 0x20) syz_usb_connect$uac1(0x5, 0x105, &(0x7f0000000300)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xf3, 0x3, 0x1, 0x6, 0x130, 0x9, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x0, 0x6}, [@selector_unit={0x8, 0x24, 0x5, 0x5, 0x6, "9a8458"}, @selector_unit={0x5, 0x24, 0x5, 0x6, 0xbb}, @feature_unit={0x11, 0x24, 0x6, 0x1, 0x6, 0x5, [0x9, 0x9, 0x1, 0x1, 0x5], 0x1f}, @processing_unit={0xc, 0x24, 0x7, 0x2, 0x0, 0x5, "bcea667c6f"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xc, 0x24, 0x2, 0x1, 0x7, 0x3, 0x80, 0x5, '(', "a26f69"}, @format_type_ii_discrete={0x12, 0x24, 0x2, 0x2, 0x1, 0x3, 0x81, "e0a33250f62e9fc475"}, @format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x7, 0x2, 0x80}, @format_type_i_continuous={0xc, 0x24, 0x2, 0x1, 0x1, 0x1, 0x4, 0x2, "e2771a", "f9"}, @format_type_ii_discrete={0x10, 0x24, 0x2, 0x2, 0xe1, 0xc1db, 0x5, "d27aa245e2a175"}]}, {{0x9, 0x5, 0x1, 0x9, 0x40, 0x6e, 0x1f, 0x1f, {0x7, 0x25, 0x1, 0x3, 0x1, 0x2}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xc, 0x24, 0x2, 0x1, 0x7, 0x1, 0x9, 0x25, "b3", "3fa934"}, @format_type_i_continuous={0x9, 0x24, 0x2, 0x1, 0x7, 0x3, 0x2, 0x20, "", "87"}, @format_type_i_continuous={0xc, 0x24, 0x2, 0x1, 0x7, 0x1, 0x46, 0x1, "cd1bee", 'Q'}, @as_header={0x7, 0x24, 0x1, 0x0, 0x9, 0x1002}]}, {{0x9, 0x5, 0x82, 0x9, 0x400, 0x82, 0x1, 0x7, {0x7, 0x25, 0x1, 0x2, 0x5, 0x100}}}}}}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x0, 0x9, 0xe0, 0x20, 0x20}, 0xf, &(0x7f0000000080)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x4, 0x8, 0x1}]}, 0x5, [{0x19, &(0x7f0000000180)=@string={0x19, 0x3, "a02267290a2826e743114801359a07974029c1c25197c9"}}, {0xd4, &(0x7f0000000440)=@string={0xd4, 0x3, "bf7ec56e711fef5038bfce74f6a1f26ea78602e76cc2c7926ee44a3adb801a9826dbf1e81218efa10bb808640840eb535fc5214eb538cf3a806d6318c9ede8bed0e71f80c73901e84e3502eb2d030105930f906ac2ed9980f817a8bb6c8167ee8ff95976acef7c01f35f1ea242870e075242a071ff7ac29482d5b80d37f137702959f74ca9e0e0de2c68c8a04e23142c2dcee2824da6c10451f917f99e96e336b62db2dec692e1c1f78c7ce37e68ce6d88683bbf7047743f0208ad4224dcf8719a43146dba63cc881b1f245737f396465f21"}}, {0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0xc0c}}, {0xc0, &(0x7f0000000580)=ANY=[@ANYBLOB="c0036893837c61e4bea50dad0b29e4f00d5cf5d8ce8e289ad758799199a0ed34ccf9e7ccfc2f02670d2fd2bcc1a4c8b2cf31d4750b913b768430a97cd1ba51c95c1066ff2bb698ed05b83e3c69d75185c024ffbb68741f657cb8117d2f59add3ad6e98e9d4183d4815c7294f8188b6b645a9795ea052c40313e75c6904cdc739466c263fb872cf539c971b456c29e3df9e14ce3fd2c14c0b8870f01464d4582c9cb8fe34440b8312c362c9d21ae3c27fed5a7169bf2e86e0db2abe6720e7d545"]}, {0xd5, &(0x7f0000000800)=@string={0xd5, 0x3, "286213c8dc9babd1da7e809c15d1f3ad0423635f4bc2c3644d053ae17dc1437ac11a9d7e8c8c35d0dcd7593e036f6b27f367c18d0056c89c6eee8c3f19a836fdac722e733a239bbdc3c4b917337948b77eb6ce9870745d99e5200e6710b033271f68b330228939bea472a8068051570e3d8e7882abf83b3d27075f4bf0979064f303c73d4d7f6c211671e06a50aa8b2be7d02e2f82f8a80a5ef7322d3192e8da9df27a059f203b87587f9517bfb69a1f6e1fd4883f89eca019525aaec1a59e1e1e18327533d7aca1c39c3c30e85f94e73e74b6"}}]}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000c00)={0x84, &(0x7f00000007c0)={0x0, 0x0, 0x1, "ab"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000959800001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000780)={0x2c, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0}) mlockall(0x1) [ 678.700083][ T7551] usb 3-1: New USB device found, idVendor=1557, idProduct=8150, bcdDevice=29.ed [ 678.700098][ C0] softirq: huh, entered softirq 3 NET_RX ffffffff840acf50 with preempt_count 00000103, exited with 00000102? [ 678.701216][T15572] BUG: scheduling while atomic: kworker/u4:11/15572/0x00000002 [ 678.727288][ T7551] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 678.737988][T15572] Modules linked in: [ 678.753860][T15572] Preemption disabled at: [ 678.753872][T15572] [] netlink_broadcast+0x7b/0x1160 [ 678.758274][ T7551] usb 3-1: Product: syz [ 678.760024][T15572] CPU: 0 PID: 15572 Comm: kworker/u4:11 Not tainted 6.1.75-syzkaller-00027-g77fec6cefe26 #0 [ 678.771980][ T7551] usb 3-1: Manufacturer: syz [ 678.775070][T15572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 678.775097][T15572] Workqueue: netns cleanup_net [ 678.775133][T15572] Call Trace: [ 678.775141][T15572] [ 678.775151][T15572] dump_stack_lvl+0x151/0x1b7 [ 678.790015][ T7551] usb 3-1: SerialNumber: syz [ 678.794092][T15572] ? netlink_broadcast+0x7b/0x1160 [ 678.794133][T15572] ? netlink_broadcast+0x7b/0x1160 [ 678.794156][T15572] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 678.811749][ T7551] usb 3-1: config 0 descriptor?? [ 678.812156][T15572] ? netlink_broadcast+0x7b/0x1160 [ 678.812188][T15572] dump_stack+0x15/0x1b [ 678.871962][T15572] __schedule_bug+0x195/0x260 [ 678.876885][T15572] ? ttwu_do_activate+0x17c/0x290 [ 678.882993][T15572] ? cpu_util_update_eff+0x10e0/0x10e0 [ 678.889152][T15572] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 678.896567][T15572] ? try_to_wake_up+0x670/0x1220 [ 678.902240][T15572] __schedule+0xcf7/0x1550 [ 678.909619][T15572] ? _raw_spin_lock+0x1b0/0x1b0 [ 678.916689][T15572] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 678.922159][T15572] ? __sched_text_start+0x8/0x8 [ 678.928160][T15572] ? kthread_data+0x53/0xc0 [ 678.933017][T15572] ? wq_worker_sleeping+0x64/0x290 [ 678.943290][T15572] schedule+0xc3/0x180 [ 678.949136][T15572] synchronize_rcu_expedited+0x6fc/0x890 [ 678.955733][T15572] ? synchronize_rcu+0x3d0/0x3d0 [ 678.962724][T15572] ? debug_smp_processor_id+0x17/0x20 [ 678.970746][T15572] ? kasan_quarantine_put+0x34/0x1a0 [ 678.977145][T15572] ? pde_put+0x146/0x1a0 [ 678.981663][T15572] ? rcu_exp_handler+0x360/0x360 [ 678.987146][T15572] ? igmp6_group_dropped+0x148/0xa10 [ 678.993125][T15572] ? kmem_cache_free+0x291/0x510 [ 678.998248][T15572] ? __kasan_check_write+0x14/0x20 [ 679.003191][T15572] ? mutex_unlock+0xb2/0x260 [ 679.007621][T15572] ? wake_bit_function+0x230/0x230 [ 679.012569][T15572] ? __kasan_check_read+0x11/0x20 [ 679.017517][T15572] synchronize_net+0x28/0x40 [ 679.021941][T15572] ipv6_mc_down+0x9b/0x360 [ 679.026190][T15572] ? ipv6_mc_destroy_dev+0x23/0x630 [ 679.031239][T15572] ipv6_mc_destroy_dev+0x2b/0x630 [ 679.036170][T15572] ? ipv6_ac_destroy_dev+0x2e4/0x300 [ 679.041384][T15572] addrconf_ifdown+0x162c/0x1ab0 [ 679.046170][T15572] ? addrconf_cleanup+0x140/0x140 [ 679.051184][T15572] ? mutex_unlock+0xb2/0x260 [ 679.055614][T15572] ? __kasan_check_write+0x14/0x20 [ 679.063515][T15572] ? __mutex_lock_slowpath+0x10/0x10 [ 679.069067][T15572] ? macsec_notify+0x101/0x4c0 [ 679.073671][T15572] ? __mutex_lock_slowpath+0x10/0x10 [ 679.079396][T15572] addrconf_notify+0x32f/0xe10 [ 679.079772][ T60] usb 1-1: new high-speed USB device number 108 using dummy_hcd [ 679.084226][T15572] ? ip6mr_device_event+0x1ea/0x210 [ 679.084340][T15572] raw_notifier_call_chain+0x8c/0xf0 [ 679.084414][T15572] unregister_netdevice_many+0xe2a/0x1740 [ 679.110865][T15572] ? kmem_cache_free+0x291/0x510 [ 679.115820][T15572] ? alloc_netdev_mqs+0xf90/0xf90 [ 679.120673][T15572] ? unregister_netdevice_queue+0x258/0x350 [ 679.126409][T15572] ? list_netdevice+0x710/0x710 [ 679.131092][T15572] ? br_dev_delete+0xf9/0x110 [ 679.135607][T15572] default_device_exit_batch+0x5be/0x640 [ 679.141078][T15572] ? netdev_exit+0xb0/0xb0 [ 679.145323][T15572] ? xfrmi6_input+0x40/0x40 [ 679.149978][T15572] ? rtnl_unlock+0xe/0x10 [ 679.154132][T15572] ? cfg802154_pernet_exit+0xc7/0xe0 [ 679.159253][T15572] ? netdev_exit+0xb0/0xb0 [ 679.163776][T15572] cleanup_net+0x6c9/0xbf0 [ 679.168112][T15572] ? ops_init+0x490/0x490 [ 679.172268][T15572] ? __schedule+0xcaf/0x1550 [ 679.176786][T15572] process_one_work+0x73d/0xcb0 [ 679.181653][T15572] worker_thread+0xa60/0x1260 [ 679.186489][T15572] kthread+0x26d/0x300 [ 679.190376][T15572] ? worker_clr_flags+0x1a0/0x1a0 [ 679.195223][T15572] ? kthread_blkcg+0xd0/0xd0 [ 679.199651][T15572] ret_from_fork+0x1f/0x30 [ 679.203905][T15572] [ 679.339779][ T60] usb 1-1: Using ep0 maxpacket: 32 [ 679.439823][ T327] usb 4-1: New USB device found, idVendor=1557, idProduct=8150, bcdDevice=29.ed [ 679.448678][ T327] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 679.456802][ T327] usb 4-1: Product: syz [ 679.463419][ T327] usb 4-1: Manufacturer: syz [ 679.469352][ T327] usb 4-1: SerialNumber: syz [ 679.475065][ T327] usb 4-1: config 0 descriptor?? [ 679.494456][T17848] loop2: detected capacity change from 0 to 1024 [ 679.504318][T17848] EXT4-fs: Ignoring removed nomblk_io_submit option [ 679.511574][T17848] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 679.523046][T17848] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 679.534063][T17848] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 11:59:52 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x62, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x7, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r1, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={r0, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, r0, 0x1c7a4000) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), r0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) fgetxattr(r6, &(0x7f0000003000)=@known='user.syz\x00', &(0x7f0000003040)=""/193, 0xc1) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x80047210, &(0x7f0000003140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003180), 0x111002, 0x0) ptrace$setsig(0x4203, r1, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) getpeername$packet(r0, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003300)=0x14) 11:59:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x275a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") [ 679.547674][T17848] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 679.558062][T17848] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 679.569777][ T7551] (unnamed net_device) (uninitialized): Assigned a random MAC address: 5a:5f:94:87:fa:fb [ 679.591235][ T7551] rtl8150 3-1:0.0: eth1: rtl8150 is detected [ 679.598928][ T7551] usb 3-1: USB disconnect, device number 93 [ 679.619820][ T60] usb 1-1: New USB device found, idVendor=1557, idProduct=8150, bcdDevice=29.ed [ 679.637710][ T60] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 679.640456][T17894] loop1: detected capacity change from 0 to 512 [ 679.653616][ T60] usb 1-1: Product: syz [ 679.661771][ T60] usb 1-1: Manufacturer: syz [ 679.668116][ T60] usb 1-1: SerialNumber: syz [ 679.674368][T17894] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 679.678781][ T60] usb 1-1: config 0 descriptor?? [ 679.697629][T17894] EXT4-fs (loop1): orphan cleanup on readonly fs [ 679.705667][T17894] EXT4-fs error (device loop1): ext4_read_block_bitmap_nowait:511: comm syz-executor.1: Block bitmap for bg 0 marked uninitialized [ 679.720314][T17894] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 679.731377][T17894] EXT4-fs (loop1): 1 orphan inode deleted [ 679.737018][T17894] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. 11:59:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") [ 679.807096][T15454] EXT4-fs (loop1): unmounting filesystem. [ 679.838441][T17916] loop1: detected capacity change from 0 to 512 [ 679.846350][T17916] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 679.859585][T17916] EXT4-fs (loop1): orphan cleanup on readonly fs [ 679.867050][T17916] EXT4-fs error (device loop1): ext4_read_block_bitmap_nowait:511: comm syz-executor.1: Block bitmap for bg 0 marked uninitialized [ 679.882194][T17916] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 679.891204][T17916] EXT4-fs (loop1): 1 orphan inode deleted [ 679.897494][T17916] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. 11:59:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r1, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x2000011d) 11:59:52 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(r1) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f000014e000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/157, 0x9d, 0x0, 0x0}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, 0x0}], 0xffff, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x4000}) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0x5452, 0x0) 11:59:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES32=0x0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r0}, 0x10) syncfs(0xffffffffffffffff) 11:59:52 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r0, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10}, 0x18) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={0xffffffffffffffff, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, 0xffffffffffffffff, 0x1c7a4000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_NAN(0xffffffffffffffff, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r3, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r0, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) [ 679.935482][T17886] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 679.944372][T17886] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 679.956629][T15454] EXT4-fs (loop1): unmounting filesystem. 11:59:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7113}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x467, &(0x7f0000000240)="$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") 11:59:52 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) [ 680.055759][T17939] loop1: detected capacity change from 0 to 512 [ 680.063668][T17939] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 680.083341][T17939] EXT4-fs (loop1): orphan cleanup on readonly fs 11:59:52 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x25b45}, 0x90) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000680)="cadfdcbf364942e75f2e9da4c0bf4d81492e69664f2ac2eeecfb90dc04d459f4c48fa6897ef4e9e6cf7a118a2a3655a51ad99be95e1e7429e3daf514fd827a0262224fd2dda9fcce9e7404c8b9dba7785e0aee29216995d95ca3e37cc44a59ab3d04687cd3c51dc8c5bea16fbff5c335575f37c896cac8c2bac28002123356f9d82e816cb85f42be552c6a7d42c728dd7129c11de7c7565a503c8b3d8d896111f0dee4f3f85bcea7115c838be1e765a6054871c349103570f602b0e21a51c015b4778f0e1454d99ddc60517bbf6ec3fd1f68e2bd042f59560d351f5acb88", 0xde}, {&(0x7f0000000a40)="4d1cd2523ee997f94d429d1b122d60f7a83415ec630283c5fd826df8a77f102a6a2077e1a016093c7449e52135f846f1b0a4c2bb71f7b89c87f55ebbb45b79f71d3cf05cc8665f97aeaaefdee590ebedff546f8feb8f6ce0d2ce31c7ca16d91e16fc8c50ac1d818bdb58af6060ca5c589626a8f841ba7149ed21cd347dfcce09db296b03a0bcd77193cfe5a1d22779539dd040f4cfa5e9a132613cdf3bd81519b1b20c29ae78272cebb23b64c6d58f54fcddd5eae6894f31483d3906d28151f2e7f6a496256c2943fe46ddc4cd4df76fa47a5cb0237f78391722453dafd96e3db01ec01925594c2728d90c2def2e59ccf014086e516af66a36e6ed8de6ad0c741af5c40222a9c0265321fd6cd262ae64a978fd7aabfa8d26830798601d118975ae85f2be7e9fd11cec6987f86beb30861f6d861f8a360d88f76896da92113000716062e6de4c73e2348471501ae532c83495050175bebc8932feba116cc4b293c1cce280482cf7bce769078f6701384308f5c0f626b48885c822f10b423e943c34555df13a2919a0e692e28d81fe45fd72427996c58fa9d2016fd3bafbc7eb09fa264f35ddb57563b2bd8b7335e0f2efb49b112a9ed75b012200afbddfc937b1a4ceba7ee6b528c33611f714ad4be05be110170d2bfec9cc267a0a281e788bfbd8214d22cdeb4437db87e23b00e531cd7579b58ae2e8130fa82aec3f83e906874d5ccc68b10fc023d5b428b5b6c41f353538dc8c597cfafcb291ae86cde4538c499c705848520ce9aa0fe980c6c417d1e672ce03f4ef96d4cccf84d9b8819fa7152d82dbf927136dd97228059e8f3099e22f64923f3559a8018e4ff9126f5080e507e844ea0db70acccf1acc3fcdbc5bc7d7b94582ccf2f43e5461af0e782ca26380d7610c30f0fccfad442603893045e1f711cfe8f3c6a196454d96e8fbf5633a639f41fd2526577df14db84be6b4ea5d69b53ac54a954732e484568a0fff09eb40ebbd481f623659d26110873c21cdd84cc6fc3958ff16e5034674117c54bc854c13b8c902705c9b0c1cdd4f98cb28cc19151dc8b68d779817671d1316fee27f81a263020915fec1e48fb214123d02642246b3f2004109600ebafb3607b7062cd9ce01f883c0f84290567bd4c553f706a64c94d7c18c230bf04c99593402c7f0a78cf45d4117beadd9fd7407124e8fbc1e9cd346ef924954c7000eb2aa044a8ea632873bff5cadcafffb225cc1d4f9f8e281933e77343b12653038dec9426be0ba9538e554e8de5ec54dcd9a3efe4b0feaa0619819b8e8656588d7373489a2a543ddef1b5cd5fa260795687c1bc42af83f641400b9af59563703ba7dfe7a76b740e9fe66bc067db13a73eb57c25208feab361271d0a42b594bdda34f1c785623353d012553f8e6a9c891c773577ac7fefee2d94773d571cb6fc617a43aa1c64f1b4ff3d23d1a4034238b9cfe0605b27d90ac403b5e0a38ff71a26f7b4cc4e2d11fa12c691ac4781b582368461662981643e7f900c150e6734db874f360c12c1954c81a801cf868abee2b4d7e8a017741a5316edc7050bfe99919805d0e999beb88864de3061267fe7d7cb7d3d2e039836a338c0436fc0e3e7886c907af4d1d96693acae64a61de4afbe5f6fdf59a29ddafbe89277b29b5aee39e064f39e6147892c59989ab87925b8d6a266668cd6bd109d51d257404d7897500a8d8cd9ba932e0834e22b7c47b29700442873a59414d71866cca58b145d212e982638364b688d50d434262cd73d99d71e12c7f61594e350426f4ebf48e2bf65e79c369bab42a9d3fdffe6eca5262192812fe5825ff2f0455143e68854c24b97915acfd0ff1f3684ef45f9e95640a60822aab9d1a9c2e971bda856831aa7c61cd35e59ad2e7e52afcb0fc701debf28f2a070dbf888d452f7190d10d94907f120b3f637c6d81f9e3083478f26f12a4794c2e939b11febe313c794e25107376b878b3be8ad80c13516c2c0fc42e3f9e94f45b8e5ba754c4e2fd128b726e6dcf96943f2affbd8ad06aa31bca3f39d68fab57a6189dc9a23214650c891bf5db5a5b9c1dd06bb35c120491111d8122ced684985d69acc6948cb473c2c656f2d6e059a9e20bcaa53afce3a96bc1b3370f0b1fe083c062cf74a12837a55dfb4a32d96174a916b622079d2c252082cae61a96c05fdb958794b2f48eb24099adc7218965d3a51078cedd3f1903bcd145e6368798a4d1d8fe050e9d2a7ac0c504c9eeafe704d14624f43dd26c99412d7d4fda720d29408c5f61d0e6c7034424d2e2e95bb9a7cf42af86d7a8942344ceeb4dc9b40baf0945692fea12a5244493832a6f8446e8c87a577de21d605ea594129d2bcc9a21bfc92122ef50fa4b6cee5faaa28c5709e8bb4f87c0a88cfd7e2f84da195bfae312ca2b77fe2f02d9808c1bfe2370a82cb5b4b139b52bb96249139c83f359d61370efb0a436c646909548199060475d4e9f0cb6ca5dfdc77e5a0d27353dd2c64fa6d8a6f383e9ba6cd1e6ea69e5f3aa252fbda777470767c2c050e58da5c04388db11e422f41173494a9587a16f90976837a83130c69378ddd4f85e28f0928da85be06aba1c4ec586cd14828ab849701a08553db58ee3aa6dbd229378a28c21c93151a87e4273d7928d2d220c7ad1d187ecaa46148c6e26a701b2ee24450383cba52767aeb6dcfea961ac533872822e205b07555a2253609a84e229e734cf0670936594f4ac79383ae30ec5bd198d99cf065a9c0907194cab48dd0c4b9c32b75e17a844dccdef1a1dce8bc3145a2c6639478e38ad70e238375172fc2da39cbcd6bf50c5aff8e76733b06e230ffaacd189d2fac8bdb88733729f5977582ff53bb8dcfab30b8e40fbd90acc7b9404d3660679a69630c4ed8dd6371020c1f8914b503ecd8749a95c6d734bdb46c1e7015d615946c44035f8a28567cbb75677f428f4d1e36fc5bd7a073ba32beb35094a3b70b42585a4b6fff83147804c9296d829f4db6b24b256b71a4fcbb86dc6510401cadfe773af1b6e98f71557133ca23a30ac1c733ef9091a206641af7a0faeaad729dc1ef645eecfdfbb7aa6938ac00a2700f95a0d63f74dce216088ab17961cd3d7b7b759d2c618137a68615d9f2f26b7da5b66bb6defcf1d91cf1abff5a755d986a0c62e1b8562125eecbad98cc965dc707fb0be22bf16077ccbd49d6bb1e984855117cea7cd58450dc7c20b4fdc94cd9153f31db80db3d39f60ff0419e586ff24732c8173b41b3d79098ea795effeb778d1a51d9560c6c60d63520f4431a1bd0005ef063c7563beb686e75f391abe14cd5009ebfb077b8837cd805c189dd542c70088aeccc384f96148cb602807d099e1495a19098e716cc91831e9318540fe59b182e26cb9bd79daa0b0461387958cdcdcc30967c08fb8e28c9df982cc39a368554ea4058d82f7f45ea0d86ba23b53320946d81294b356adcffd314cd330252f55360f9b47a1ba8c43f3004ea4b8e6042860369c459daba0a78a6dd77101aea384a27b47db15771f43be3e04f92a217fae0875e4f8840b730a40f34b0ff7863777d40be07620b08b5ff4bbd23ab75a18eae50c7a210593291b8c7f25dc7563d3ebeffd25d25a5f1b7c6c4aa14b9de516ccb7084f63ce390c05cca302c25638fe0709528d7799fe18805f80b2e0ee777d51ca9fff23dc966e24a9f759e5eb48e6c819c7a4823aee289144d98b0dd98d1ec2b4943c0cbf5e042ec46065fb6ed71387df8bddf61b48a4da39f3e2c3d0913c2638cc8cc82631c4b6e7712e14e4f6e523a1043f5f62141fae44f37177f52d754cc414618094bd9b1f49d6e2b5ddac08588feb8e128ce59d2d1b8fc724fd24009b7ae8655262f18645b1ba5252a582c5ec9c0f520add95c0f8bac61012a2adcb17c39b8462fb7cb9cebdceecafd054fd9da44e63b4d83f861a9ecab35636f780928438022d454111140a0c52ee0e8f12d044b8d2933480fb8a782caf4c9350bf3aa75dedf5efeb2e353c62f2f7252386dcfad38eb1752c25c6de596c689ec6b7afc52c12a47e16c9ec1eca329c6573c8951f726c5769e95d3130f9d3eeb37c9cdae6d1d45756da4f27965dbe110cfd014a432748574a396792d6594f64b3e6a8b8a574eba4bd28abf7e97d248381d1962c2d7541ef87dcb7ac16208bec29b247ef0f9c0cbae89ae29f0a5c9146b9bd2efdfa91d7e679f605668071deb24fbff562719879007e56fdcf174d15072357d6837de6a123cb3d92368bc441e7df825f89f603d0e1c3c0225df13d9349b60a0319bcc828065af0da5aa728702802035e4475b7e2170a850f834bea9ee47b664db6a1207fa4e8d185041559b00ad412b87206e1fd703ed52786f8509eb0fa37d561b5ef38026c0f2eed74405c1c18a4d28e51decc13bde93765ba2a6864efd63e8cbaa6a233540a75bea8f004eaf77d5eaea19a9372eb9205eab155d5495287688cd70ba32fb67157bc7237a95bf622c9b853938b1790563e3436d81ca69cb1eeb10b33ec85a2d5a90a779c5d13fbfe2260cb2d981e86f60161a3700677350f7b60b6b31f46a9102c2678956a6bd3d87fe291369e97447d24cac6e56d4c8a6247d4ee4e8f9548223036c2fa11e6995f7e0f4f09afc85490f479a8b9d926ddc4a6018e356333f6e26e665162b488772b56c72d1e48bdc4f510233089de4dd40a5bee3004c96efca7b32b13120f9c087c01c79f0772e1966f1736bf67ab568d9aff548258ebdb06ffcee24d0863405ec54f98fc3a51337e26deecbb61ef2c71164277dcb492a4534303d5306e809f5c6f68c3c4bdd4e874651e80cafbde13790a4ea366742ec8f2e71d7d1761a1699911c10fe9c400931ae5a7931f642ece7f7cffc48ce2440143b51d1c8da341ba6d5461b4dd1ed76b9b6cc2c7d4a938c387c39342d238850108e427315a775eb9f4d2ea61328b0b7521f838c38437a77769d423c30ada8ee8d0ab10fa24164a2033321bec49daf34dbef41919b3e77d92b72f8cac8491f937a40c3d0a9a34a602d924b3b59d9af04bced88279c2e3a86e45a52851590504c2b3ca5c90950e3c2d0dc96dcd87a90547c4f977cb79281a32f4df007eae402b3e1e28a5a2fb004e8ad8ed24f557533aaf9b285dbf20e052194b61df0c612541ab24598085152c89f230d05ab82ebecc9c2a62c64ec0cf52fc05a9260ae34461bdbafa6a33d97b05b326327c548464e46d9e1a6d16ceb5119ca16e7277fe21c76da249d31bd47b814773510b50a358f601ea7b1bd747f6073090abe01c5b80512c75102b6ab7d9933040e57235dd66aa70940dced98730c0b0405c5ec26cd5bac2e779b4aafa2d929e99338d775695f11e3e0edf46d340bde6d221e32620365f962367fe91b511fb7891d99057d91daf7f2da66ee07aa1abdc1254856a69bde1995cfbfefa0f2d4e7c46c587ba88f79c4840d8942376025ac68f549e5c1b163e4e6af42f39c58a0eb39272ee4f885e087fcf12a24e5cd4272c4f7feeb22abb8630910a8eaf22d469ca44a2290c2aaae205a1347db00ef37a5efd8bbe8abdf72dc844dd8dd961cf6c5a790771c5115626f72cd131299a85d1934e2586ffad703feb6c6cfcba1e31f67061f1076fb24f55469480358e7cc3a8f35db5c9e80535fd4944ee514c45c79563a0f86fa5d92f68c6929391f56596ed0d3a8e89d8a90b2f9d57b28be63a299a5ac1026b47876d68d4a88e0cd30f29fb121b99f71a599a9635d45b2b6de915fa2a3b33d6c145f7a1fa02e52fd33beed4823c251c63905e1fb7", 0x1000}, {&(0x7f00000008c0)="c858d95aa0aefcb6b7f57533029194be8332b6a4b7506988919516e06df451d3b83ac1228df8ab41e8360e64fc42840ee321431dc5e21e1e73e18195ad8c0c1d3d8203d7005103348c4d1b06550813835192ca43af6f6df383122f6c96cffec512bf4a2087276b594634c23ff2c2bba807027b02603a798520053d954420d2732c2ae90faa81721ade53e71fda13ca2c1c9a714a41d240fd6895f3fb799f14054bbb06b5d8c3b86ef7a7d1d227ab0b3d111b97c49a0dc60353ea3bed22c0fcc76a706b4a133fb7e30d3c8e78cdb7c4c8599b4cc53cc934", 0xd7}, {&(0x7f0000000180)="4edb0a1e7ba9e04e90716e6427ea9a724f9c81b1f0337263f1468bd61c4f31419623160b2d4fe7adcf1e1568af5af9c93aceb3c5312d5ff919899bfd0cbe238daf381a7b453fb9b0c4553eeadee0de2787341e7bd497a6f9f7a8f4afdcd2611e95a587644116c4f41c", 0x69}], 0x4, &(0x7f0000001a40)=[@rthdr={{0x28, 0x29, 0x39, {0x32, 0x2, 0x2, 0x40, 0x0, [@empty]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x3}}, @hopopts={{0x98, 0x29, 0x36, {0x88, 0xf, '\x00', [@pad1, @jumbo={0xc2, 0x4, 0x3}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @jumbo={0xc2, 0x4, 0x7}, @ra={0x5, 0x2, 0x5}, @calipso={0x7, 0x58, {0x3, 0x14, 0x3, 0x1, [0x81, 0x8000000000000001, 0x4, 0x3, 0xfffffffffffffff9, 0x6, 0x9, 0x4ea, 0x7fffffffffffffff, 0x4]}}]}}}, @rthdrdstopts={{0x208, 0x29, 0x37, {0x5c, 0x3e, '\x00', [@pad1, @enc_lim, @generic={0x3f, 0xe7, "8a92bc262dd1a42bb9be956f8b540a26a4f684cf242d0fefd07098e16f023c793af954e68445c12961aa5db6aa9c23b57d9adc59a4f1880305f9d826665018688893734b9d69544590f584e0a888194ee3acd770d7e2f83a78bdbd087aa74181bcf321e328859d1759bf90a76c931551b3c99ef8d4bbd50656b04863182bc3457139ce8ee60b8e62137d3045f70e8a4049229897f3fc89bd915b1c6cfe411d5cfd37a7095b1daefd84c170542ef5d516b1aed611b2f19caa8f14bc49707401a2d3d85166625efc72609f2f20c468f30b1934b3abfcd67e5f577f0ec89b722f845e5ebc8c1ebdc8"}, @generic={0x1, 0xe7, "1ae3e82cb6279e91523f5454ec671e504bffed800b53a409789c568caf66d11958d5d38e672b393a1fb5373584909fc52d5ace47879225b7c1a39744ecad145810fe9361ad8799ab644ecd1db271069421c7ae1c1087fec5917ec790ea2ea9b4b44dd03d8016d3bd946c00a35b526967df541b3b97c17d6b8a153e6ef8ae1aa573027ef7ff78b6dfae7dd69bd5bc7bc320d1de07a72eb59f4025630d95468bbc5efbd4cc9aa52e1b124b97ac8b36c73b059e618376d3dab045c679974096e81654a52c56e62d7fcc932948d59545bac9326c5d768329ea2c3a8fd710445d0cdfd0b2c1a63dcffc"}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @jumbo={0xc2, 0x4, 0x40}]}}}, @tclass={{0x14, 0x29, 0x43, 0xffffffe1}}, @hopopts={{0x28, 0x29, 0x36, {0x2b, 0x1, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @hoplimit_2292={{0x14}}, @tclass={{0x14, 0x29, 0x43, 0x2}}, @rthdrdstopts={{0x48, 0x29, 0x37, {0x6c, 0x5, '\x00', [@enc_lim={0x4, 0x1, 0x2c}, @hao={0xc9, 0x10, @empty}, @generic, @hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @padn={0x1, 0x1, [0x0]}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x6}}], 0x3b0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), &(0x7f0000000840)='%ps \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) 11:59:52 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_emit_ethernet(0x46, &(0x7f00000000c0)={@local, @random="7f0a00034011", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x12, 0x0, 0x2802, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @private}, "000088beffff0000"}}}}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) syz_clone3(&(0x7f0000004b40)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000004b00)=[0x0], 0x1}, 0x58) r3 = socket$igmp6(0xa, 0x3, 0x2) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000ffff0000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r4}, &(0x7f0000000cc0), &(0x7f0000000d00)}, 0x20) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pwrite64(r6, 0x0, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r6, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0x60, 0x0, 0x8, 0x201, 0x0, 0x0, {0x0, 0x0, 0x6}, [@CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x10000}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xddc}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x101}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r7 = signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) io_submit(0x0, 0x1, &(0x7f0000001d00)=[&(0x7f0000001a80)={0x0, 0x0, 0x0, 0x5, 0x0, r7, 0x0}]) signalfd4(r7, &(0x7f0000000040)={[0x10001]}, 0x8, 0x0) copy_file_range(r4, &(0x7f00000003c0)=0x6, r7, &(0x7f0000000400)=0x3, 0xffffffffffff326e, 0x0) 11:59:52 executing program 4: keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x1}) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) (async) r0 = request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x3, r0, 0x0, 0x0) request_key(&(0x7f00000003c0)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, r0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x6c}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2c}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x3}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x6}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x801) r2 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000004000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r3, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000000600)={0x50, 0x0, r4, {0x7, 0x1f}}, 0x50) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x44401, 0x0) (async) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x44401, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) (async) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) write$FUSE_INIT(r6, &(0x7f00000002c0)={0x50, 0x0, r4, {0x7, 0x27, 0x8001, 0x2000868, 0x3, 0x1f, 0x9, 0xb51c}}, 0x50) (async) write$FUSE_INIT(r6, &(0x7f00000002c0)={0x50, 0x0, r4, {0x7, 0x27, 0x8001, 0x2000868, 0x3, 0x1f, 0x9, 0xb51c}}, 0x50) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}) write$FUSE_INIT(r5, 0x0, 0x0) (async) write$FUSE_INIT(r5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000950000010000000093a38e0bde41a838508f90"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) (async) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000950000010000000093a38e0bde41a838508f90"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='contention_end\x00', r7}, 0x10) dup3(r2, r3, 0x0) (async) dup3(r2, r3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_SET(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="58000558", @ANYRES16=r10, @ANYBLOB="010000000000000000000f0000001c0007800c0004000000000000000000080003000000000000000000"], 0x30}}, 0x0) r11 = dup(r8) write$FUSE_BMAP(r11, &(0x7f0000000100)={0x18, 0xffffffffffffffda, r4, {0x1000000}}, 0x18) [ 680.096360][T17939] EXT4-fs error (device loop1): ext4_read_block_bitmap_nowait:511: comm syz-executor.1: Block bitmap for bg 0 marked uninitialized [ 680.118368][T17939] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6137: Corrupt filesystem [ 680.138709][ T5262] EXT4-fs (loop2): unmounting filesystem. [ 680.147467][T17939] EXT4-fs (loop1): 1 orphan inode deleted 11:59:52 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f00000021c0)=@urb_type_iso={0x0, {0xd, 0x1}, 0x7f, 0x20, &(0x7f0000002080)="8fcd7347b33031d46b9f139edbfe92a6756d69232ed33b8c0729060ff5dd6a663617e61979c73e4b317f3fa82594ac3a69dd758aeb3480fd19ea399c73b18364b3cc335faed96ee307b51696da8ed57b6786f8a252dba812c6cd6a0081671104c684ac7bccbebaaef0ebc2078dbd6e240b", 0x71, 0x200, 0x9, 0x63, 0x4, 0xffff, &(0x7f0000002100)="f0f6a8e106e7e1d30ca438c3ad4665d56891de7256b043effadf254e0e7173489316120886de687946fa8f49e05bd21ce5d5cfd62cef25de15b753dd38284f9191b67476cb077709895681355fa88dc7d8318934ce1af9c9fe8fa7f303200694580828c9e584892e673a22b58f86fcf58b310bd40cf90c11687ea8fc05994fea1e753e667d707eeab0e6468b3c140a9e6720b8361f084d34f134c40cd7a6ca02c6b281a61beb", [{0x20000, 0x6}, {0x8, 0x4872, 0x5}, {0x6, 0x1000, 0x3}, {0xfffffe00, 0x0, 0x3}, {0x200, 0x6e77, 0x9ea}, {0x3e, 0x3ffc000, 0x4de}, {0x2, 0x7995d402, 0x400}, {0x7, 0x0, 0x5}, {0xd1a, 0xb28}, {0x10001, 0x0, 0x3839}, {0x7, 0x401, 0xe3fa}, {0x800, 0x5, 0x7f}, {0x7ade, 0x6, 0x1}, {0x1ff, 0xb3a, 0x80000001}, {0x2, 0x3, 0x4}, {0xfffffeff, 0x3, 0x3}, {0x0, 0x5, 0x80}, {0x9, 0x101}, {0x9, 0xd2a8, 0x72366cd3}, {0x32, 0x3, 0x5}, {0x7f, 0x8, 0x6}, {0x4, 0x9, 0x4}, {0x80000001, 0x10000, 0x20}, {0x6, 0x2, 0x81}, {0x51, 0xb9543a6, 0x20}, {0x10000, 0x0, 0x5}, {0x4, 0x3, 0x8}, {0x8, 0x8000, 0x24f0}, {0x8001, 0x10000, 0x7fff}, {0x4de, 0x1, 0x1}, {0x6, 0x0, 0x80000001}, {0x0, 0x40000000, 0x9}, {0xc93a, 0x0, 0x7ff}, {0x5, 0x6a5ac446, 0x5}, {0x8c, 0xc42bfe4, 0x20}, {0xf17f, 0xa69, 0x39ba9302}, {0x4, 0x8001, 0xbd}, {0x1ff, 0x6, 0x2}, {0x8000, 0xffffffff}, {0x7, 0x1, 0xd47}, {0x7a5, 0xffff, 0x5}, {0x6, 0x8, 0x800}, {0xfffffff9, 0x8, 0x800}, {0x3ff, 0x401, 0x80000000}, {0x0, 0x2, 0x3}, {0x802, 0x0, 0x3}, {0xb2, 0x1, 0xff}, {0x3, 0x0, 0x2}, {0x7, 0x280, 0x1}, {0x1, 0x9, 0x1000}, {0xfffffe00, 0x1000, 0x1}, {0x9, 0x0, 0xcbf}, {0x3, 0x93e, 0x2}, {0x41, 0xffff8001, 0x1}, {0x1, 0x7, 0xcb24}, {0x7, 0x7, 0x3ff}, {0x10001, 0x8, 0x33ac}, {0x996, 0xd37f, 0x6b}, {0x0, 0x3, 0x7}, {0x1f, 0xb1, 0x8001}, {0x1, 0x100, 0x4}, {0x1000, 0x4, 0x4}, {0x5, 0x36ab, 0x7fff}, {0xc400, 0x6, 0x1}, {0x2, 0x6, 0xfffffff8}, {0xd65, 0x10001, 0x57c1c1c}, {0x1f, 0x7, 0x2}, {0x2, 0x3f, 0xffffffc0}, {0x80000001, 0x81, 0x6}, {0x81, 0x100, 0x6}, {0xc1, 0x1ff, 0x80}, {0x8, 0x5, 0x8}, {0xfffffff8, 0x7, 0xffff}, {0x4, 0x41e79941, 0x7ce}, {0x4, 0x3}, {0xffffffff, 0x2, 0x9b}, {0x8000, 0x5, 0xc96}, {0x9, 0x401}, {0x2, 0x3f, 0xffff8001}, {0xfffffff7, 0xdc, 0x8}, {0x97, 0x5}, {0xa4f, 0x8, 0xef4c}, {0x1000, 0x1ff, 0x1}, {0x0, 0x8, 0x2}, {0x9, 0x9, 0x100}, {0x3, 0x5, 0x114}, {0x3f, 0x7, 0x1}, {0x401, 0x1}, {0x3, 0x0, 0x7fffffff}, {0x9, 0x80000000, 0x2}, {0x0, 0xc07, 0x4}, {0x3, 0xffff, 0x200}, {0x3, 0x3, 0xff}, {0x1, 0x0, 0x8}, {0x548, 0xa5e, 0x8}, {0x45f1, 0xe4d, 0x7}, {0x5012, 0x7, 0x7}, {0x0, 0x0, 0x8}, {0x9, 0x5, 0x7}]}) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000026c0)={0x37, 0x39f, 0x5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000002740)={'wg0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000002780), 0xd5, 0x200) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f00000027c0)={{0x4, 0xc8cc}, 0x100, './file0\x00'}) rt_sigqueueinfo(r0, 0x40, &(0x7f0000002900)={0x1, 0x4, 0x6}) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000002980)={0x5, 0x80000001, 0x40000, 0x400, 0x10001, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)=@o_path={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10}, 0x18) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a80), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000002c80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002c40)={&(0x7f0000002ac0)={0x17c, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "6e195eefa22aaf214e2f3e10409305dc69515b606755f2dea38daaea4f5480e8ca5b98b8cb697e8544c6"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "06792023570f2f8491da405c2a261f9235ca21abbe4c0d209478386a03bb4a6b0241392d349fb949cf7b3cef435f76a0ba1e3125b09f81af6da1dc92db400ca6089ae449fe296ed2368a4e309c73633c2d0ec8af42a644e9e4521393083a0b2f5b87ebb2bbbc21a46435"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x33, 0x5, "fdd38b5300a4288ae4507877bc04fb67cd61340bd3dd7be58e4cd2f1836d23ab14a9efacc77c789cfeabc305e34eba"}, @ETHTOOL_A_BITSET_MASK={0x7e, 0x5, "e7898bc37fa253d4c731e4cc1fc59c7052d2c0c463af78df67308b7525d944430dacd8132e1d64918cc58ed232c82bc8233c88c03babf45411e9af5ab298fcf557e326e23e37f0cdc676b17cb669ec686bc919171016f89cad96ad240b9d6e5fcf1c09b942a082881b9e3a0d6da5a75cb010754af45f5cccf164"}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) timerfd_create(0x0, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002e40)={0xffffffffffffffff, &(0x7f0000002cc0)="c72aef944bf3e41f0ffec2f5566aaca9fcbda1475dee28c7d8a2424788ea6a156539ea849a4a93feac33d8f59b3051fab6f5787f646522aa910e2ba5e90bf0235dd942e55fb923ea606471d101149217dcb3a3d9d5d0fd8715d7a4580e6f3afffd6966e20583b9fb0d9adb5686bda41db5caed935980a56d7a3b44bc035ef3b35caa8e98f0b457f87a54", &(0x7f0000002d80)=""/130}, 0x20) fallocate(0xffffffffffffffff, 0x20, 0x6, 0x10000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000009, 0x110, 0xffffffffffffffff, 0x1c7a4000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002ec0), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_NAN(0xffffffffffffffff, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)={0x20, r3, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x51}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000002fc0)={'vxcan1\x00'}) ptrace$setsig(0x4203, r0, 0x9, &(0x7f0000003200)={0x34, 0x5, 0x80000000}) 11:59:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 11:59:52 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000800)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2dc5c07001a000100000000897b2a1d84f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f069d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d3f00d6bf7da9299e6e81c96daf520300a16cab12d75a852b3e4470420877efbe1f000000000000007e15f9b683e63cfff7c638bca835b33bc18c4ed0351cd285197b0241569048b5b416ba1c57217be5a338392f831637ee8c25bb2183634a33b18c4b459f9aea5ab222d7060000000000665106000000a803d1b56126efec0225a5433883b0d17cb21dbfd886caf2624e7f00da0ef9893ef57c79a182dceca9c46a9f8b001e53b29c0c698ed30d8942e94ac057bde74e42021d895c22b6400000002b2c604ed73249e80f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b52c8422295fde5626cd43fb43fb3acf9b2e840713cba86d43a570ee3589b7e9000000000000000000000000000000dc85131317c56465978d957d000000000000000000000000000000000000000000000000000000000000000000301171e8e3a2d0c842c20fd293c073b93f7662fad1f4ae3e1fe359aa29a4b8965229fa06b0fb2e23d2644cfbdbd6929aa42151ea48334743ad0c378641e74d55d6cd7b098599190100000055ec9c0c26b71588d6fc97e3098fb0e778be446659cf665e7f848d85de70c3c426a539a9a0e92e7bbf77528053dcb3b791b8e3faae507a3b721b670b06b78bb09e82ecc85a4bbc596d8ce02a2cbede5573f8bdc84d61c5634fffa50e74ec0f2da4f3d82c2d2b5a20ec152df14481c3bb59a23e014d07fc070d87f58118f468bf80283e0ce7efda7906f9c53319aef22e01a9ba5649fc10fb5b8132dcf42c47a4b79efb9f720ebd2dcc1634f870cee6201bc0ad9e17c4633a17de505bed8fded3053cb455636132bdae3239b9c8b437256ac21a49c4f03b268c47e9becbaff440728429f9e0b0222485188b745b3c871d01d27eb4e5e00bcd79b95601098e044345a8aaa12fda56277aef89192b9af038ab8808a2adf0c3a15ec863e5f352c7967607cede40848eae2704701b7af0a0b30e9e5b76f45500000000000000", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$eJzs3M+LG2UYB/Cna7U1dTer1moL4ote9DI0e/CilyBbkAaUthFaQZi6Ew0Zk5AJCxGxevLq3yEevQniTS978W/wthePPYgjJtr9QTwshQ0sn89lHnjeL7wvAwPvMO/sv/3tZ4NelfXyaaydOxdr44j0MEWKtfjPV/HGW7/8+vLtu/dutjud7Vsp3Wjfab2ZUtp45acPv/j+1Z+nlz74YePHC7G3+dH+H1u/713Zu7r/151P+1XqV2k4mqY83R+Npvn9skg7/WqQpfR+WeRVkfrDqpgc6ffK0Xg8S/lwZ70xnhRVlfLhLA2KWZqO0nQyS/kneX+YsixL643gcXS/e1jXdURdPxlPRV3X9dPRiEvxTKzHRjRjM56N5+L5uBwvxJV4MV6Kq/NRq543AAAAAAAAAAAAAAAAAAAAnC3O/wMAAAAAAAAAAAAAAAAAAMDq3b5772a709m+ldLFiPKb3e5ud3Fd9Nu96EcZRVyPZvwZ89P/C4v6xrud7etpbjO+Lh/8m3+w233iaL41/53A0nxrkU9H8xeicTi/Fc24vDy/tTR/MV5/7VA+i2b89nGMooyd+Cd7kP+yldI773WO5a/NxwEAAMBZkKVHlu7fs+z/+ov8Cd4PHNtfn49r51e7diKq2eeDvCyLiUKhUDwqVv1k4jQc3PRVzwQAAAAAAAAAAICTOI3PCVe9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPibHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfBUAAP//LI7Vjg==") mkdir(&(0x7f00000003c0)='./file0\x00', 0x40) r1 = open(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, 0x0, 0x0) sendmmsg$unix(r6, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0x5, 0x200003f000000, 0x20000000}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x44001, &(0x7f0000000400)={0xa, 0x4e22, 0x7, @remote, 0x99}, 0x1c) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000001280)="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", 0xfa1}, {&(0x7f0000000480)="4d72afd2bb2eb0d847e8e3a7148339ad9a60ea1290d56acea4d7901ebbc407b52e1bd640fac4016f", 0x28}, {&(0x7f00000004c0)="ce2d1e468bd3055c952aea7c15b6dd87ff2ed853d88f8a29b3eb", 0x1a}, {&(0x7f0000000500)="1477836b4da67054fdad43be8b813801364fa71265ba4942", 0x18}, {&(0x7f0000000580)="fdd2d433d986be987c91cdec86e34015a837f0f4ee6d466de204968e34b63a9d15afc2296f02e4833d2c4d899cc163616fe5f2588f2a89ae4bd6db0ff1e8008c063c5d88", 0x44}], 0x5, &(0x7f0000000b40)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r4, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r4, r3, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r6]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee01, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [r3, r0, 0xffffffffffffffff, 0xffffffffffffffff, r5]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x110, 0x80}}], 0x1, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x104) write$P9_RREADDIR(r7, &(0x7f0000000500), 0xbf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getpeername$unix(r8, 0x0, &(0x7f0000000040)=0x19) connect$unix(0xffffffffffffffff, &(0x7f0000000400)=@file={0x0, './file2\x00'}, 0x6e) sendfile(r7, r7, &(0x7f0000000240)=0xe0000, 0x7f06) 11:59:52 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11:59:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='ext4_fc_track_inode\x00', r1}, 0x10) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14103e, 0x0) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r5, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) ftruncate(r3, 0x2008002) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x204092, &(0x7f0000000040), 0x7, 0x50d, &(0x7f00000006c0)="$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") bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000400)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00'}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000000)='.\x00', 0x400017e) r7 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents64(r7, 0x0, 0x0) getdents64(r7, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x8040ae9f, &(0x7f0000000000)) socket$inet_udplite(0x2, 0x2, 0x88) clock_getres(0x0, 0x0) 11:59:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_es_find_extent_range_enter\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_pid(r2, &(0x7f0000000980), 0x12) [ 680.229109][T17861] loop3: detected capacity change from 0 to 1024 [ 680.250621][T17861] EXT4-fs: Ignoring removed nomblk_io_submit option [ 680.259985][T17861] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 680.299803][T17861] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 680.321074][T17861] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 680.328332][T17956] loop2: detected capacity change from 0 to 8192 [ 680.335885][T17861] misc raw-gadget: fail, usb_gadget_register_driver returned -16 11:59:53 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) clock_getres(0x0, 0x0) [ 680.370169][ T327] (unnamed net_device) (uninitialized): Assigned a random MAC address: 52:ef:01:e6:3e:88 [ 680.402080][T17964] loop4: detected capacity change from 0 to 512 [ 680.410201][ T60] (unnamed net_device) (uninitialized): Assigned a random MAC address: 9a:27:7c:cf:f4:be [ 680.419205][ T327] rtl8150 4-1:0.0: eth1: rtl8150 is detected [ 680.428578][ T60] rtl8150 1-1:0.0: eth2: rtl8150 is detected [ 680.442556][T17964] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 680.467437][ T327] usb 4-1: USB disconnect, device number 112 [ 680.476574][T17964] EXT4-fs error (device loop4): ext4_orphan_get:1396: inode #17: comm syz-executor.4: iget: bad i_size value: -6917529027641081756 [ 680.493393][T17964] EXT4-fs error (device loop4): ext4_orphan_get:1401: comm syz-executor.4: couldn't read orphan inode 17 (err -117) [ 680.531604][T17964] EXT4-fs error (device loop4): ext4_readdir:260: inode #12: block 13: comm syz-executor.4: path (unknown): bad entry in directory: rec_len is smaller than minimal - offset=0, inode=12, rec_len=0, size=4096 fake=0 [ 680.700078][ T7551] usb 1-1: USB disconnect, device number 108 11:59:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xd, &(0x7f0000000300)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c00100000000000120000d1850000000500000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) fsetxattr(r2, &(0x7f0000000080)=@known='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) fgetxattr(r2, &(0x7f0000000000)=@known='trusted.overlay.upper\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x3}, 0x10}, 0x90) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = dup(r4) r6 = dup2(r5, r3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x70, 0x0, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f0000000040)) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000300)=0x3) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='jbd2_handle_stats\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000080850000008200000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='jbd2_handle_stats\x00', r11}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), &(0x7f0000000180)={'U-', 0x8}, 0x16, 0x2) ioctl$KVM_RUN(r5, 0xae80, 0x0) 11:59:53 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = dup(r1) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x4, r1}, 0x10) 11:59:53 executing program 4: socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0xa0}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 11:59:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000010600), &(0x7f0000010640)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1, 0x105df, &(0x7f00000106c0)="$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