t$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) syz_clone3(&(0x7f00000002c0)={0x201180400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r3}}, 0x58) 12:58:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_newroute={0x3c, 0x18, 0x409, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_FD={0x8}}}, @RTA_PRIORITY={0x8, 0x4, 0x8}]}, 0x3c}}, 0x0) 12:58:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MTU={0x8, 0x4001}]}, 0x3c}}, 0x0) [ 484.112051][T23225] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 484.121319][T23225] netlink: 27 bytes leftover after parsing attributes in process `syz-executor.2'. [ 484.138664][T23227] loop0: detected capacity change from 0 to 2048 [ 484.148591][T23234] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 484.184714][T23239] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 484.194141][T23239] netlink: 27 bytes leftover after parsing attributes in process `syz-executor.2'. [ 484.203963][T23243] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 484.227333][T23227] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 484.251031][T11100] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:58:43 executing program 4: timer_create(0x3, 0x0, &(0x7f0000000400)) exit(0x0) timer_gettime(0x0, &(0x7f0000000000)) 12:58:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MTU={0x8, 0x4001}]}, 0x3c}}, 0x0) 12:58:43 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) r2 = open(&(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x0) r3 = openat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) syz_clone3(&(0x7f00000002c0)={0x201180400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r3}}, 0x58) 12:58:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="94000000100001084be518264f22be8500000000", @ANYRES32=r2, @ANYBLOB="00000000000000006c00168047000180280001"], 0x94}}, 0x0) 12:58:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_newroute={0x3c, 0x18, 0x409, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_FD={0x8}}}, @RTA_PRIORITY={0x8, 0x4, 0x8}]}, 0x3c}}, 0x0) 12:58:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000480, &(0x7f0000000080)=ANY=[@ANYRES8=0x0, @ANYRESHEX=0x0, @ANYRES32=0x0], 0x1, 0x773, &(0x7f00000007c0)="$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") r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f00000000c0)) 12:58:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_newroute={0x3c, 0x18, 0x409, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_FD={0x8}}}, @RTA_PRIORITY={0x8, 0x4, 0x8}]}, 0x3c}}, 0x0) 12:58:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0xe403}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MTU={0x8, 0x4001}]}, 0x3c}}, 0x0) [ 484.965610][T23255] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 484.975002][T23253] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 484.984300][T23253] netlink: 27 bytes leftover after parsing attributes in process `syz-executor.2'. 12:58:43 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) r2 = open(&(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x0) r3 = openat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) syz_clone3(&(0x7f00000002c0)={0x201180400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r3}}, 0x58) 12:58:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') vmsplice(r0, &(0x7f0000001900)=[{&(0x7f0000001800)="ae", 0x1}], 0x1, 0x0) 12:58:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x54, 0x10, 0x421, 0x0, 0xfffffffd, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @link_local={0x8}}]}, 0x54}}, 0x0) [ 485.008765][T23262] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 485.017805][T23259] loop0: detected capacity change from 0 to 2048 12:58:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') vmsplice(r0, &(0x7f0000001900)=[{&(0x7f0000001800)="ae", 0x1}], 0x1, 0x0) [ 485.070126][T23259] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 485.096276][T11100] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:58:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') vmsplice(r0, &(0x7f0000001900)=[{&(0x7f0000001800)="ae", 0x1}], 0x1, 0x0) 12:58:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18020000000000000000000000000030850000002c0000009500b6d80000000000002b400337a077ae55f52c1c80a2649baca85309be96d5a45bbbdb5fa529d139d075b3eee14473f51be98db7efbb059842ba4470e8e04acb807fbb97c68abdccf398450758e9f672b6bb61c9898c89c11071adac29fd64d33a3502fbeb1ed99dd0ce92f34c420bfcc2635421d339ad521d6953b1137850d9e9ebf65ee988ea2dbee528678eb47efb7b3f19046c6f1bd1bf56e5853ed96137f95b3a11953b783050831e0d57dc"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x900, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 12:58:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x54, 0x10, 0x421, 0x0, 0xfffffffd, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @link_local={0x8}}]}, 0x54}}, 0x0) 12:58:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x812, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:58:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getpid() socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) write$cgroup_subtree(r2, 0x0, 0xa) 12:58:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_GROUP_TYPE={0x6}, @NHA_GROUP={0xc, 0x2, [{}]}]}, 0x2c}}, 0x0) 12:58:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') vmsplice(r0, &(0x7f0000001900)=[{&(0x7f0000001800)="ae", 0x1}], 0x1, 0x0) 12:58:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x812, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:58:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newnexthop={0x24, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 12:58:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x54, 0x10, 0x421, 0x0, 0xfffffffd, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @link_local={0x8}}]}, 0x54}}, 0x0) 12:58:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_GROUP_TYPE={0x6}, @NHA_GROUP={0xc, 0x2, [{}]}]}, 0x2c}}, 0x0) 12:58:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x812, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 485.895318][T23282] net_ratelimit: 2 callbacks suppressed [ 485.895331][T23282] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 12:58:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x812, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:58:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18020000000000000000000000000030850000002c0000009500b6d80000000000002b400337a077ae55f52c1c80a2649baca85309be96d5a45bbbdb5fa529d139d075b3eee14473f51be98db7efbb059842ba4470e8e04acb807fbb97c68abdccf398450758e9f672b6bb61c9898c89c11071adac29fd64d33a3502fbeb1ed99dd0ce92f34c420bfcc2635421d339ad521d6953b1137850d9e9ebf65ee988ea2dbee528678eb47efb7b3f19046c6f1bd1bf56e5853ed96137f95b3a11953b783050831e0d57dc"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x900, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 12:58:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newnexthop={0x24, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 12:58:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getpid() socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) write$cgroup_subtree(r2, 0x0, 0xa) 12:58:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_GROUP_TYPE={0x6}, @NHA_GROUP={0xc, 0x2, [{}]}]}, 0x2c}}, 0x0) [ 485.974298][T23293] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 12:58:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newnexthop={0x24, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 12:58:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18020000000000000000000000000030850000002c0000009500b6d80000000000002b400337a077ae55f52c1c80a2649baca85309be96d5a45bbbdb5fa529d139d075b3eee14473f51be98db7efbb059842ba4470e8e04acb807fbb97c68abdccf398450758e9f672b6bb61c9898c89c11071adac29fd64d33a3502fbeb1ed99dd0ce92f34c420bfcc2635421d339ad521d6953b1137850d9e9ebf65ee988ea2dbee528678eb47efb7b3f19046c6f1bd1bf56e5853ed96137f95b3a11953b783050831e0d57dc"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x900, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 12:58:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x54, 0x10, 0x421, 0x0, 0xfffffffd, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @link_local={0x8}}]}, 0x54}}, 0x0) 12:58:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_GROUP_TYPE={0x6}, @NHA_GROUP={0xc, 0x2, [{}]}]}, 0x2c}}, 0x0) 12:58:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newnexthop={0x24, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 12:58:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getpid() socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) write$cgroup_subtree(r2, 0x0, 0xa) [ 486.099497][T23316] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 12:58:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000600), &(0x7f0000000080)='./file1\x00', 0x200040, &(0x7f0000000000)={[{@dots}, {@fat=@tz_utc}, {@nodots}, {@fat=@check_strict}, {@nodots}, {@dots}, {@dots}, {@dots}]}, 0x1, 0x1a0, &(0x7f0000000780)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) [ 486.165295][T23322] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 12:58:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x43, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) [ 486.285633][T23326] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 12:58:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18020000000000000000000000000030850000002c0000009500b6d80000000000002b400337a077ae55f52c1c80a2649baca85309be96d5a45bbbdb5fa529d139d075b3eee14473f51be98db7efbb059842ba4470e8e04acb807fbb97c68abdccf398450758e9f672b6bb61c9898c89c11071adac29fd64d33a3502fbeb1ed99dd0ce92f34c420bfcc2635421d339ad521d6953b1137850d9e9ebf65ee988ea2dbee528678eb47efb7b3f19046c6f1bd1bf56e5853ed96137f95b3a11953b783050831e0d57dc"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x900, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 12:58:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x43, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 12:58:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getpid() socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) write$cgroup_subtree(r2, 0x0, 0xa) 12:58:45 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x43, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 12:58:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x43, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) [ 486.340705][T23328] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 12:58:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18020000000000000000000000000030850000002c0000009500b6d80000000000002b400337a077ae55f52c1c80a2649baca85309be96d5a45bbbdb5fa529d139d075b3eee14473f51be98db7efbb059842ba4470e8e04acb807fbb97c68abdccf398450758e9f672b6bb61c9898c89c11071adac29fd64d33a3502fbeb1ed99dd0ce92f34c420bfcc2635421d339ad521d6953b1137850d9e9ebf65ee988ea2dbee528678eb47efb7b3f19046c6f1bd1bf56e5853ed96137f95b3a11953b783050831e0d57dc"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x900, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 12:58:45 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x43, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 12:58:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x43, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 12:58:45 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x43, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 12:58:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getpid() socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) write$cgroup_subtree(r2, 0x0, 0xa) 12:58:45 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x2e}}], 0x2, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) 12:58:45 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$nfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000000000046b11c056c840e21810a40451300fb647286373c0ae35177ad060180b3e9efd812b7"]) [ 486.463356][T23344] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 486.517377][T23352] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 486.575954][T23353] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 486.611469][T23360] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 12:58:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18020000000000000000000000000030850000002c0000009500b6d80000000000002b400337a077ae55f52c1c80a2649baca85309be96d5a45bbbdb5fa529d139d075b3eee14473f51be98db7efbb059842ba4470e8e04acb807fbb97c68abdccf398450758e9f672b6bb61c9898c89c11071adac29fd64d33a3502fbeb1ed99dd0ce92f34c420bfcc2635421d339ad521d6953b1137850d9e9ebf65ee988ea2dbee528678eb47efb7b3f19046c6f1bd1bf56e5853ed96137f95b3a11953b783050831e0d57dc"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x900, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 12:58:45 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x2e}}], 0x2, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) 12:58:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getpid() socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) write$cgroup_subtree(r2, 0x0, 0xa) 12:58:45 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$nfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000000000046b11c056c840e21810a40451300fb647286373c0ae35177ad060180b3e9efd812b7"]) 12:58:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getpid() socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) write$cgroup_subtree(r2, 0x0, 0xa) 12:58:45 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x2e}}], 0x2, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) 12:58:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18020000000000000000000000000030850000002c0000009500b6d80000000000002b400337a077ae55f52c1c80a2649baca85309be96d5a45bbbdb5fa529d139d075b3eee14473f51be98db7efbb059842ba4470e8e04acb807fbb97c68abdccf398450758e9f672b6bb61c9898c89c11071adac29fd64d33a3502fbeb1ed99dd0ce92f34c420bfcc2635421d339ad521d6953b1137850d9e9ebf65ee988ea2dbee528678eb47efb7b3f19046c6f1bd1bf56e5853ed96137f95b3a11953b783050831e0d57dc"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x900, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 12:58:45 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x2e}}], 0x2, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) 12:58:45 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$nfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000000000046b11c056c840e21810a40451300fb647286373c0ae35177ad060180b3e9efd812b7"]) 12:58:45 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$nfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000000000046b11c056c840e21810a40451300fb647286373c0ae35177ad060180b3e9efd812b7"]) 12:58:45 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$nfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000000000046b11c056c840e21810a40451300fb647286373c0ae35177ad060180b3e9efd812b7"]) 12:58:45 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x2e}}], 0x2, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) 12:58:45 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$nfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000000000046b11c056c840e21810a40451300fb647286373c0ae35177ad060180b3e9efd812b7"]) 12:58:45 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x2e}}], 0x2, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) 12:58:45 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$nfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000000000046b11c056c840e21810a40451300fb647286373c0ae35177ad060180b3e9efd812b7"]) 12:58:45 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x2e}}], 0x2, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) 12:58:45 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x2e}}], 0x2, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) 12:58:45 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x81, 0x7f, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000580), 0x7, r0}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() r3 = perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0xe5, 0x6, 0x3f, 0x0, 0x0, 0x1890a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x7f, 0x0, 0x2, 0xfffffffffffffffa, 0x3f, 0x6, 0x0, 0x0, 0x0, 0xfe}, r2, 0xc, r3, 0xf) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x5, 0xffffffffffffffff, 0xb) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r0, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 12:58:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2, 0x0, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}}) 12:58:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 12:58:45 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x2e}}], 0x2, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) 12:58:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2, 0x0, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}}) 12:58:45 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x2e}}], 0x2, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) 12:58:45 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000000c0)='netlink_extack\x00'}, 0x11) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000009c0)=@ipv6_newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0x4, 0x8, 0x0, 0x1, @LWTUNNEL_IP_SRC={0x8, 0x3, @broadcast}}, @NHA_OIF={0x8}]}, 0x2c}}, 0x0) 12:58:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2, 0x0, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}}) 12:58:45 executing program 1: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x48, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0x3, "0300000000000000000300"}}}]}, 0x48}}, 0x0) 12:58:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000200)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0x4, 0xdf, &(0x7f00000002c0)=""/223, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0xc, 0x0, 0x0, 0x10, 0x0}, 0x80) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r1, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x1e, 0x0, &(0x7f0000000040)) 12:58:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2, 0x0, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}}) [ 487.134625][T23416] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 12:58:45 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000000c0)='netlink_extack\x00'}, 0x11) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000009c0)=@ipv6_newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0x4, 0x8, 0x0, 0x1, @LWTUNNEL_IP_SRC={0x8, 0x3, @broadcast}}, @NHA_OIF={0x8}]}, 0x2c}}, 0x0) [ 487.251933][T23430] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 12:58:46 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x81, 0x7f, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000580), 0x7, r0}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() r3 = perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0xe5, 0x6, 0x3f, 0x0, 0x0, 0x1890a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x7f, 0x0, 0x2, 0xfffffffffffffffa, 0x3f, 0x6, 0x0, 0x0, 0x0, 0xfe}, r2, 0xc, r3, 0xf) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x5, 0xffffffffffffffff, 0xb) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r0, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 12:58:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000200)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0x4, 0xdf, &(0x7f00000002c0)=""/223, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0xc, 0x0, 0x0, 0x10, 0x0}, 0x80) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r1, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x1e, 0x0, &(0x7f0000000040)) 12:58:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 12:58:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) mq_open(&(0x7f0000004a40)='&@\x00', 0x40, 0x0, &(0x7f0000004a80)={0x0, 0xa097, 0x6}) 12:58:46 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') rename(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='./file1\x00') rename(&(0x7f0000000340)='./file1\x00', &(0x7f0000000300)='./file0\x00') 12:58:46 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000000c0)='netlink_extack\x00'}, 0x11) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000009c0)=@ipv6_newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0x4, 0x8, 0x0, 0x1, @LWTUNNEL_IP_SRC={0x8, 0x3, @broadcast}}, @NHA_OIF={0x8}]}, 0x2c}}, 0x0) 12:58:46 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') rename(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='./file1\x00') rename(&(0x7f0000000340)='./file1\x00', &(0x7f0000000300)='./file0\x00') 12:58:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000200)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0x4, 0xdf, &(0x7f00000002c0)=""/223, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0xc, 0x0, 0x0, 0x10, 0x0}, 0x80) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r1, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x1e, 0x0, &(0x7f0000000040)) 12:58:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) mq_open(&(0x7f0000004a40)='&@\x00', 0x40, 0x0, &(0x7f0000004a80)={0x0, 0xa097, 0x6}) 12:58:46 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000000c0)='netlink_extack\x00'}, 0x11) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000009c0)=@ipv6_newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0x4, 0x8, 0x0, 0x1, @LWTUNNEL_IP_SRC={0x8, 0x3, @broadcast}}, @NHA_OIF={0x8}]}, 0x2c}}, 0x0) [ 487.397752][T23439] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 12:58:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) mq_open(&(0x7f0000004a40)='&@\x00', 0x40, 0x0, &(0x7f0000004a80)={0x0, 0xa097, 0x6}) 12:58:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) [ 487.499546][T23451] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 12:58:46 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x81, 0x7f, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000580), 0x7, r0}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() r3 = perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0xe5, 0x6, 0x3f, 0x0, 0x0, 0x1890a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x7f, 0x0, 0x2, 0xfffffffffffffffa, 0x3f, 0x6, 0x0, 0x0, 0x0, 0xfe}, r2, 0xc, r3, 0xf) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x5, 0xffffffffffffffff, 0xb) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r0, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 12:58:46 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') rename(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='./file1\x00') rename(&(0x7f0000000340)='./file1\x00', &(0x7f0000000300)='./file0\x00') 12:58:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x1, &(0x7f0000000200)=@raw=[@exit], &(0x7f0000000280)='GPL\x00', 0x4, 0xdf, &(0x7f00000002c0)=""/223, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0xc, 0x0, 0x0, 0x10, 0x0}, 0x80) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r1, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x1e, 0x0, &(0x7f0000000040)) 12:58:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) mq_open(&(0x7f0000004a40)='&@\x00', 0x40, 0x0, &(0x7f0000004a80)={0x0, 0xa097, 0x6}) 12:58:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 12:58:46 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') rename(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='./file1\x00') rename(&(0x7f0000000340)='./file1\x00', &(0x7f0000000300)='./file0\x00') 12:58:46 executing program 2: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x81, 0x7f, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000580), 0x7, r0}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() r3 = perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0xe5, 0x6, 0x3f, 0x0, 0x0, 0x1890a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x7f, 0x0, 0x2, 0xfffffffffffffffa, 0x3f, 0x6, 0x0, 0x0, 0x0, 0xfe}, r2, 0xc, r3, 0xf) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x5, 0xffffffffffffffff, 0xb) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r0, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 12:58:46 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') rename(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='./file1\x00') rename(&(0x7f0000000340)='./file1\x00', &(0x7f0000000300)='./file0\x00') 12:58:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x628, 0x358, 0x448, 0x448, 0x448, 0x448, 0x558, 0x558, 0x558, 0x558, 0x558, 0x6, 0x0, {[{{@ipv6={@private1, @remote, [], [], 'veth0_macvtap\x00', 'nr0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@private0, @empty, [], [], 'veth1_to_bond\x00', 'ip6tnl0\x00'}, 0x0, 0x118, 0x160, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@hbh={{0x48}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv4=@multicast2, 0x0, 0x1e}}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@hl={{0x28}}, @common=@inet=@esp={{0x30}}]}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @loopback}, @ipv6=@local}}}, {{@ipv6={@mcast2, @empty, [], [], 'ip6gre0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x688) 12:58:46 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') rename(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='./file1\x00') rename(&(0x7f0000000340)='./file1\x00', &(0x7f0000000300)='./file0\x00') 12:58:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x0, 0xb, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x83}]}, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:58:46 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') rename(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='./file1\x00') rename(&(0x7f0000000340)='./file1\x00', &(0x7f0000000300)='./file0\x00') [ 487.793234][T23473] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT 12:58:46 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x81, 0x7f, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000580), 0x7, r0}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() r3 = perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0xe5, 0x6, 0x3f, 0x0, 0x0, 0x1890a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x7f, 0x0, 0x2, 0xfffffffffffffffa, 0x3f, 0x6, 0x0, 0x0, 0x0, 0xfe}, r2, 0xc, r3, 0xf) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x5, 0xffffffffffffffff, 0xb) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r0, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 12:58:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x628, 0x358, 0x448, 0x448, 0x448, 0x448, 0x558, 0x558, 0x558, 0x558, 0x558, 0x6, 0x0, {[{{@ipv6={@private1, @remote, [], [], 'veth0_macvtap\x00', 'nr0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@private0, @empty, [], [], 'veth1_to_bond\x00', 'ip6tnl0\x00'}, 0x0, 0x118, 0x160, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@hbh={{0x48}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv4=@multicast2, 0x0, 0x1e}}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@hl={{0x28}}, @common=@inet=@esp={{0x30}}]}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @loopback}, @ipv6=@local}}}, {{@ipv6={@mcast2, @empty, [], [], 'ip6gre0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x688) 12:58:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x2, 0x4, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 12:58:46 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000017c0)={0x6, 0x4, &(0x7f0000000540)=@framed={{}, [@jmp={0x7, 0x0, 0x9, 0xa}]}, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:58:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x0, 0xb, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x83}]}, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:58:46 executing program 2: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x81, 0x7f, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000580), 0x7, r0}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() r3 = perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0xe5, 0x6, 0x3f, 0x0, 0x0, 0x1890a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x7f, 0x0, 0x2, 0xfffffffffffffffa, 0x3f, 0x6, 0x0, 0x0, 0x0, 0xfe}, r2, 0xc, r3, 0xf) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x5, 0xffffffffffffffff, 0xb) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r0, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 12:58:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x2, 0x4, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 12:58:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x0, 0xb, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x83}]}, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:58:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x628, 0x358, 0x448, 0x448, 0x448, 0x448, 0x558, 0x558, 0x558, 0x558, 0x558, 0x6, 0x0, {[{{@ipv6={@private1, @remote, [], [], 'veth0_macvtap\x00', 'nr0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@private0, @empty, [], [], 'veth1_to_bond\x00', 'ip6tnl0\x00'}, 0x0, 0x118, 0x160, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@hbh={{0x48}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv4=@multicast2, 0x0, 0x1e}}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@hl={{0x28}}, @common=@inet=@esp={{0x30}}]}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @loopback}, @ipv6=@local}}}, {{@ipv6={@mcast2, @empty, [], [], 'ip6gre0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x688) 12:58:46 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000017c0)={0x6, 0x4, &(0x7f0000000540)=@framed={{}, [@jmp={0x7, 0x0, 0x9, 0xa}]}, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:58:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x2, 0x4, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 12:58:46 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000017c0)={0x6, 0x4, &(0x7f0000000540)=@framed={{}, [@jmp={0x7, 0x0, 0x9, 0xa}]}, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:58:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x2, 0x4, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 12:58:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x0, 0xb, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x83}]}, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:58:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x628, 0x358, 0x448, 0x448, 0x448, 0x448, 0x558, 0x558, 0x558, 0x558, 0x558, 0x6, 0x0, {[{{@ipv6={@private1, @remote, [], [], 'veth0_macvtap\x00', 'nr0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@private0, @empty, [], [], 'veth1_to_bond\x00', 'ip6tnl0\x00'}, 0x0, 0x118, 0x160, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@hbh={{0x48}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv4=@multicast2, 0x0, 0x1e}}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@hl={{0x28}}, @common=@inet=@esp={{0x30}}]}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @loopback}, @ipv6=@local}}}, {{@ipv6={@mcast2, @empty, [], [], 'ip6gre0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x688) 12:58:47 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000017c0)={0x6, 0x4, &(0x7f0000000540)=@framed={{}, [@jmp={0x7, 0x0, 0x9, 0xa}]}, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:58:47 executing program 3: syz_emit_ethernet(0x16, &(0x7f0000000000)={@random="abdf4c355ad4", @dev, @void, {@llc={0x4, {@snap={0xaa, 0x0, 'C', "11a3c7"}}}}}, 0x0) 12:58:47 executing program 2: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x81, 0x7f, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000580), 0x7, r0}, 0x38) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() r3 = perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0xe5, 0x6, 0x3f, 0x0, 0x0, 0x1890a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x7f, 0x0, 0x2, 0xfffffffffffffffa, 0x3f, 0x6, 0x0, 0x0, 0x0, 0xfe}, r2, 0xc, r3, 0xf) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r2, 0x5, 0xffffffffffffffff, 0xb) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r0, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 12:58:47 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x1, @local}, 0x4a, {0x2, 0x0, @dev}}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @local}, 0x4a, {0x2, 0x0, @dev}, 'syz_tun\x00'}) 12:58:47 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0xc, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x5, 0x0, @private=0xa010502, @local, {[@timestamp_addr={0x44, 0x14, 0x7, 0x3, 0x0, [{@empty, 0x5000000}, {}]}, @lsrr={0x83, 0x3, 0x5e}, @generic={0x83, 0x2}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 12:58:47 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) r1 = dup2(r0, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}}) 12:58:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 12:58:47 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0xc, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x5, 0x0, @private=0xa010502, @local, {[@timestamp_addr={0x44, 0x14, 0x7, 0x3, 0x0, [{@empty, 0x5000000}, {}]}, @lsrr={0x83, 0x3, 0x5e}, @generic={0x83, 0x2}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 12:58:47 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x1, @local}, 0x4a, {0x2, 0x0, @dev}}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @local}, 0x4a, {0x2, 0x0, @dev}, 'syz_tun\x00'}) 12:58:47 executing program 3: r0 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x1, @local}, 0x4a, {0x2, 0x0, @dev}}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @local}, 0x4a, {0x2, 0x0, @dev}, 'syz_tun\x00'}) 12:58:47 executing program 3: r0 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x1, @local}, 0x4a, {0x2, 0x0, @dev}}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @local}, 0x4a, {0x2, 0x0, @dev}, 'syz_tun\x00'}) 12:58:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 12:58:47 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0xc, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x5, 0x0, @private=0xa010502, @local, {[@timestamp_addr={0x44, 0x14, 0x7, 0x3, 0x0, [{@empty, 0x5000000}, {}]}, @lsrr={0x83, 0x3, 0x5e}, @generic={0x83, 0x2}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 12:58:47 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x1, @local}, 0x4a, {0x2, 0x0, @dev}}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @local}, 0x4a, {0x2, 0x0, @dev}, 'syz_tun\x00'}) 12:58:47 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0xc, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x5, 0x0, @private=0xa010502, @local, {[@timestamp_addr={0x44, 0x14, 0x7, 0x3, 0x0, [{@empty, 0x5000000}, {}]}, @lsrr={0x83, 0x3, 0x5e}, @generic={0x83, 0x2}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 12:58:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 12:58:47 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x1, @local}, 0x4a, {0x2, 0x0, @dev}}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @local}, 0x4a, {0x2, 0x0, @dev}, 'syz_tun\x00'}) 12:58:48 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="440000001300290a000000000000002007000000", @ANYRES32=r2, @ANYBLOB="00000000020000001c001a800800", @ANYRES8=r0], 0x44}}, 0x0) 12:58:48 executing program 3: r0 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x1, @local}, 0x4a, {0x2, 0x0, @dev}}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @local}, 0x4a, {0x2, 0x0, @dev}, 'syz_tun\x00'}) 12:58:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 12:58:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f0000000240)=""/44, 0x2c) getdents64(r0, &(0x7f0000000280)=""/217, 0xd9) 12:58:48 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) r1 = dup2(r0, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}}) 12:58:48 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @multicast1}, 0xc) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x1}}}}}, 0x0) 12:58:48 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="440000001300290a000000000000002007000000", @ANYRES32=r2, @ANYBLOB="00000000020000001c001a800800", @ANYRES8=r0], 0x44}}, 0x0) 12:58:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f0000000240)=""/44, 0x2c) getdents64(r0, &(0x7f0000000280)=""/217, 0xd9) 12:58:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f0000000240)=""/44, 0x2c) getdents64(r0, &(0x7f0000000280)=""/217, 0xd9) 12:58:48 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, 0x9c) 12:58:48 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @multicast1}, 0xc) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x1}}}}}, 0x0) 12:58:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f0000000240)=""/44, 0x2c) getdents64(r0, &(0x7f0000000280)=""/217, 0xd9) 12:58:48 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, 0x9c) 12:58:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f0000000240)=""/44, 0x2c) getdents64(r0, &(0x7f0000000280)=""/217, 0xd9) 12:58:48 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="440000001300290a000000000000002007000000", @ANYRES32=r2, @ANYBLOB="00000000020000001c001a800800", @ANYRES8=r0], 0x44}}, 0x0) 12:58:48 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @multicast1}, 0xc) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x1}}}}}, 0x0) 12:58:49 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) r1 = dup2(r0, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}}) 12:58:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f0000000240)=""/44, 0x2c) getdents64(r0, &(0x7f0000000280)=""/217, 0xd9) 12:58:49 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="440000001300290a000000000000002007000000", @ANYRES32=r2, @ANYBLOB="00000000020000001c001a800800", @ANYRES8=r0], 0x44}}, 0x0) 12:58:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, 0x9c) 12:58:49 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @multicast1}, 0xc) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x1}}}}}, 0x0) 12:58:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f0000000240)=""/44, 0x2c) getdents64(r0, &(0x7f0000000280)=""/217, 0xd9) 12:58:49 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @multicast1}, 0xc) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x1}}}}}, 0x0) 12:58:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000012240)={0x0, 0x0, &(0x7f0000012200)={&(0x7f0000000040)=@newtaction={0x78, 0x30, 0x7, 0x0, 0x0, {}, [{0x64, 0x1, [@m_tunnel_key={0x60, 0x1, 0x0, 0x0, {{0xf}, {0x30, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x0) 12:58:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, 0x9c) 12:58:49 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 12:58:49 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) close_range(r0, 0xffffffffffffffff, 0x2) lseek(r0, 0x0, 0x0) 12:58:49 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @multicast1}, 0xc) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x1}}}}}, 0x0) 12:58:49 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) r1 = dup2(r0, r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}}) 12:58:49 executing program 1: r0 = fsopen(&(0x7f0000000300)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000280)='./file0\x00', r1, &(0x7f00000002c0)='./file0\x00') symlinkat(&(0x7f0000000640)='./file1\x00', r1, &(0x7f0000000780)='./file1\x00') renameat2(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file1\x00', 0x2) 12:58:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000012240)={0x0, 0x0, &(0x7f0000012200)={&(0x7f0000000040)=@newtaction={0x78, 0x30, 0x7, 0x0, 0x0, {}, [{0x64, 0x1, [@m_tunnel_key={0x60, 0x1, 0x0, 0x0, {{0xf}, {0x30, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x0) 12:58:49 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) close_range(r0, 0xffffffffffffffff, 0x2) lseek(r0, 0x0, 0x0) 12:58:49 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @multicast1}, 0xc) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x1}}}}}, 0x0) 12:58:49 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 12:58:49 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 12:58:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000012240)={0x0, 0x0, &(0x7f0000012200)={&(0x7f0000000040)=@newtaction={0x78, 0x30, 0x7, 0x0, 0x0, {}, [{0x64, 0x1, [@m_tunnel_key={0x60, 0x1, 0x0, 0x0, {{0xf}, {0x30, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x0) 12:58:49 executing program 1: r0 = fsopen(&(0x7f0000000300)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000280)='./file0\x00', r1, &(0x7f00000002c0)='./file0\x00') symlinkat(&(0x7f0000000640)='./file1\x00', r1, &(0x7f0000000780)='./file1\x00') renameat2(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file1\x00', 0x2) 12:58:49 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) close_range(r0, 0xffffffffffffffff, 0x2) lseek(r0, 0x0, 0x0) 12:58:49 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 12:58:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000012240)={0x0, 0x0, &(0x7f0000012200)={&(0x7f0000000040)=@newtaction={0x78, 0x30, 0x7, 0x0, 0x0, {}, [{0x64, 0x1, [@m_tunnel_key={0x60, 0x1, 0x0, 0x0, {{0xf}, {0x30, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x0) 12:58:50 executing program 1: r0 = fsopen(&(0x7f0000000300)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000280)='./file0\x00', r1, &(0x7f00000002c0)='./file0\x00') symlinkat(&(0x7f0000000640)='./file1\x00', r1, &(0x7f0000000780)='./file1\x00') renameat2(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file1\x00', 0x2) 12:58:50 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 12:58:50 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 12:58:50 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) close_range(r0, 0xffffffffffffffff, 0x2) lseek(r0, 0x0, 0x0) 12:58:50 executing program 5: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) 12:58:50 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) close(r0) 12:58:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) 12:58:50 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 12:58:50 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) close(r0) 12:58:50 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) close(r0) 12:58:50 executing program 1: r0 = fsopen(&(0x7f0000000300)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000280)='./file0\x00', r1, &(0x7f00000002c0)='./file0\x00') symlinkat(&(0x7f0000000640)='./file1\x00', r1, &(0x7f0000000780)='./file1\x00') renameat2(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file1\x00', 0x2) [ 492.168567][T23636] loop5: detected capacity change from 0 to 512 12:58:50 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) close(r0) 12:58:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) 12:58:50 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) close(r0) 12:58:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) 12:58:50 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) close(r0) [ 492.225746][T23636] EXT4-fs error (device loop5): __ext4_fill_super:5467: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 492.250756][T23636] EXT4-fs (loop5): warning: mounting fs with errors, running e2fsck is recommended [ 492.286333][T23636] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 12:58:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) 12:58:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) 12:58:51 executing program 5: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) 12:58:51 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) close(r0) 12:58:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) 12:58:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) [ 492.339162][ T26] audit: type=1400 audit(1692449931.006:1069): avc: denied { append } for pid=23634 comm="syz-executor.5" path="/root/syzkaller-testdir3628382944/syzkaller.grIdLx/488/file0/blkio.bfq.time_recursive" dev="loop5" ino=19 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 12:58:51 executing program 4: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) 12:58:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) 12:58:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) 12:58:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) [ 492.386872][T15920] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:58:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) 12:58:51 executing program 1: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) 12:58:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) 12:58:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile, @volatile, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x96}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x2, 0x0, 0x0, 0x8, 0x0, 0xf7a, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x0, 0x9, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) [ 492.471406][T23686] loop5: detected capacity change from 0 to 512 [ 492.505485][T23688] loop1: detected capacity change from 0 to 512 [ 492.530154][T23686] EXT4-fs error (device loop5): __ext4_fill_super:5467: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 492.551562][T23688] EXT4-fs error (device loop1): __ext4_fill_super:5467: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 492.566220][T23686] EXT4-fs (loop5): warning: mounting fs with errors, running e2fsck is recommended [ 492.567775][T23688] EXT4-fs (loop1): warning: mounting fs with errors, running e2fsck is recommended [ 492.592624][T23686] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 492.594291][T23688] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 12:58:51 executing program 5: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) 12:58:51 executing program 0: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) 12:58:51 executing program 2: prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$phonet(0x23, 0x2, 0x1) 12:58:51 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000b8"], 0x119) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/190, 0xbe}], 0x300) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) [ 492.676933][T15920] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 492.689681][T23702] loop0: detected capacity change from 0 to 512 [ 492.691082][T12905] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 492.739757][T23702] EXT4-fs error (device loop0): __ext4_fill_super:5467: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 492.755357][T23706] loop5: detected capacity change from 0 to 512 [ 492.755565][T23702] EXT4-fs (loop0): warning: mounting fs with errors, running e2fsck is recommended [ 492.773150][T23702] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 492.783544][T11529] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 492.817055][T23706] EXT4-fs error (device loop5): __ext4_fill_super:5467: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 492.881231][T23706] EXT4-fs (loop5): warning: mounting fs with errors, running e2fsck is recommended [ 492.908636][T23706] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 492.925414][T11100] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 492.986367][T15920] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:58:51 executing program 4: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) 12:58:51 executing program 2: prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$phonet(0x23, 0x2, 0x1) 12:58:51 executing program 1: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) 12:58:51 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000b8"], 0x119) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/190, 0xbe}], 0x300) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) 12:58:51 executing program 0: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) 12:58:51 executing program 5: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) [ 493.154662][T23716] loop0: detected capacity change from 0 to 512 [ 493.158119][T23717] loop1: detected capacity change from 0 to 512 [ 493.167471][T12688] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 493.168540][T23715] loop5: detected capacity change from 0 to 512 12:58:51 executing program 2: prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$phonet(0x23, 0x2, 0x1) [ 493.197065][T23716] EXT4-fs error (device loop0): __ext4_fill_super:5467: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 493.204174][T23717] EXT4-fs error (device loop1): __ext4_fill_super:5467: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 493.224903][T23716] EXT4-fs (loop0): warning: mounting fs with errors, running e2fsck is recommended [ 493.230865][T23717] EXT4-fs (loop1): warning: mounting fs with errors, running e2fsck is recommended 12:58:51 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000b8"], 0x119) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/190, 0xbe}], 0x300) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) [ 493.248294][T23717] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 493.254364][T23715] EXT4-fs error (device loop5): __ext4_fill_super:5467: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 493.283242][T23716] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 12:58:52 executing program 2: prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$phonet(0x23, 0x2, 0x1) [ 493.298125][T12905] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz0 [ 493.309470][T23715] EXT4-fs (loop5): warning: mounting fs with errors, running e2fsck is recommended 12:58:52 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000b8"], 0x119) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/190, 0xbe}], 0x300) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) [ 493.350568][T23715] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 12:58:52 executing program 0: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) 12:58:52 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000b8"], 0x119) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/190, 0xbe}], 0x300) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) [ 493.397105][ T3177] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz0 [ 493.425106][T11100] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 493.440281][T11529] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 493.477728][ T3177] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz1] on syz0 [ 493.501664][T23746] loop0: detected capacity change from 0 to 512 [ 493.540497][T23746] EXT4-fs error (device loop0): __ext4_fill_super:5467: inode #2: comm syz-executor.0: casefold flag without casefold feature [ 493.570958][T15920] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 493.587809][T23746] EXT4-fs (loop0): warning: mounting fs with errors, running e2fsck is recommended [ 493.613789][T23746] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 493.704032][T11100] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:58:52 executing program 4: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$eJzs3MtrHVUYAPBvJo9iWk3U+KqtRlvbaDUxqUYFKWTnIuhCF24vSRqLeWgTwZYiLbhwK9g/QHFr/wRRwcdGV9Ktii60EKTJoguRyNxHcvO4aW6bdGLn94O5PWdmbs+ZOXwzd04+JoDC6sk+koh9EfFzRHRWqqt36Kn8s3j13Gi2JLG09PrfSXm/havnRmu71r63N/tII3rTiPTDJB7eoN3ZM2ffLk1Ojp+u1vvnpt7pnz1z9plTU6WJ8Ynx6YHjA0NDLzz/4uDAth3rKz8t/vFZ66vTn19cmL52YrAj6+++6rb649guPdGz+lzWObLdjeXsvrpy0ppjR2hKS0Rkw9VWjv/OaImVweuM73/NtXPAjlrK7Gm4+fwScBtLIu8eAPmo3eiz59/acqt+e5C/+eHKA+BCdW5ncXn8WyOtFN498u3Xq57vt1NPRLw58trBbIkdmocBAAAAKLKvhiPi6Y3m/9K4v26/rPxARDwYEQ9FxP6Icl7PgYg4GBGPRMSjtXyiJqzdf/38T3rlhg6MLZkfjni5LrdrsW78q7paqrU7s0q0JSdPTY4/GxF3RURvtO3J6ptlaU29Vfqx0bb6+b9sydqvzQVW+3Gldc3fp8dKc6WbOWZWzF+I2N+60fgny5lASUQ8FhGPb+U//K6cUTfRfemf5VUvfXTv5Ua7X3/82UlLn0Yc3TD+VzIXk83zM/vL14P+2lVhvR8uDn3RqH3jn68s/js2H/+upD5fd7b5Nr7p/u2XRttu9PrfnrxR7mB7dd37pbm50wMR7cnI+vWDzff5dlU7H7XzlY1/76GN7//3VL+TndBDEXE4Ip6o5i4fLd/7I56MiKci4tgmbZ6f+P3fRtvEf76y8R9rKv6bL/x14ePDjdrfWvw/V+5Mb3WN33/Xt9UByrufAAAAAAAAAGyPtPwOvCTtWy6naV9f5R1+3dGRTs7Mzh07OfPe9FjlXXld0ZbWMr066/JBB8rllfrgmvrxiLg7Ij5puaNc7xudmRzL++Ch4PY2iP/Mny159w7Ycd7XCsUl/qG4xD8Ul/iH4hL/UFziH4pL/ENxiX8orrXx/8HlkRPXvjxwKafuALeQ+z8U0s2810/h/1KojfZu6Y/C7i/ke10CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2C3+CwAA//9Gw89t") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) 12:58:52 executing program 1: syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000900)=ANY=[], 0x3, 0x435, &(0x7f0000000ac0)="$eJzs3MtrHVUYAPBvJo9iWk3U+KqtRlvbaDUxqUYFKWTnIuhCF24vSRqLeWgTwZYiLbhwK9g/QHFr/wRRwcdGV9Ktii60EKTJoguRyNxHcvO4aW6bdGLn94O5PWdmbs+ZOXwzd04+JoDC6sk+koh9EfFzRHRWqqt36Kn8s3j13Gi2JLG09PrfSXm/havnRmu71r63N/tII3rTiPTDJB7eoN3ZM2ffLk1Ojp+u1vvnpt7pnz1z9plTU6WJ8Ynx6YHjA0NDLzz/4uDAth3rKz8t/vFZ66vTn19cmL52YrAj6+++6rb649guPdGz+lzWObLdjeXsvrpy0ppjR2hKS0Rkw9VWjv/OaImVweuM73/NtXPAjlrK7Gm4+fwScBtLIu8eAPmo3eiz59/acqt+e5C/+eHKA+BCdW5ncXn8WyOtFN498u3Xq57vt1NPRLw58trBbIkdmocBAAAAKLKvhiPi6Y3m/9K4v26/rPxARDwYEQ9FxP6Icl7PgYg4GBGPRMSjtXyiJqzdf/38T3rlhg6MLZkfjni5LrdrsW78q7paqrU7s0q0JSdPTY4/GxF3RURvtO3J6ptlaU29Vfqx0bb6+b9sydqvzQVW+3Gldc3fp8dKc6WbOWZWzF+I2N+60fgny5lASUQ8FhGPb+U//K6cUTfRfemf5VUvfXTv5Ua7X3/82UlLn0Yc3TD+VzIXk83zM/vL14P+2lVhvR8uDn3RqH3jn68s/js2H/+upD5fd7b5Nr7p/u2XRttu9PrfnrxR7mB7dd37pbm50wMR7cnI+vWDzff5dlU7H7XzlY1/76GN7//3VL+TndBDEXE4Ip6o5i4fLd/7I56MiKci4tgmbZ6f+P3fRtvEf76y8R9rKv6bL/x14ePDjdrfWvw/V+5Mb3WN33/Xt9UByrufAAAAAAAAAGyPtPwOvCTtWy6naV9f5R1+3dGRTs7Mzh07OfPe9FjlXXld0ZbWMr066/JBB8rllfrgmvrxiLg7Ij5puaNc7xudmRzL++Ch4PY2iP/Mny159w7Ycd7XCsUl/qG4xD8Ul/iH4hL/UFziH4pL/ENxiX8orrXx/8HlkRPXvjxwKafuALeQ+z8U0s2810/h/1KojfZu6Y/C7i/ke10CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2C3+CwAA//9Gw89t") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x185102, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r1, 0x0, 0x1000000201005) syz_open_dev$vcsu(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) 12:58:52 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$phonet(0x23, 0x2, 0x1) 12:58:52 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000b8"], 0x119) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/190, 0xbe}], 0x300) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) 12:58:52 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$phonet(0x23, 0x2, 0x1) 12:58:52 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140016000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000300)={0x20, r5, 0x601, 0x0, 0x0, {0x3}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 12:58:52 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$phonet(0x23, 0x2, 0x1) 12:58:52 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140016000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000300)={0x20, r5, 0x601, 0x0, 0x0, {0x3}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) [ 493.886974][T23756] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 493.898786][T23757] loop1: detected capacity change from 0 to 512 [ 493.907266][ T3177] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on syz0 12:58:52 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000b8"], 0x119) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/190, 0xbe}], 0x300) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) 12:58:52 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$phonet(0x23, 0x2, 0x1) [ 493.930897][T23757] EXT4-fs error (device loop1): __ext4_fill_super:5467: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 493.950296][T23757] EXT4-fs (loop1): warning: mounting fs with errors, running e2fsck is recommended [ 493.950749][T23765] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 493.971555][T23757] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 12:58:52 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140016000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000300)={0x20, r5, 0x601, 0x0, 0x0, {0x3}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 12:58:52 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$phonet(0x23, 0x2, 0x1) [ 494.039927][T12688] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz1] on syz0 [ 494.113013][T11529] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 494.129682][T23782] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 12:58:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x655e, 0x4) r1 = dup2(r0, r0) setsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000000080)=0xfffffffc, 0x4) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x28) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2020) 12:58:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='status\x00') setgroups(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fchown(r1, 0x0, 0xee01) 12:58:53 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$phonet(0x23, 0x2, 0x1) 12:58:53 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') 12:58:53 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140016000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000300)={0x20, r5, 0x601, 0x0, 0x0, {0x3}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 12:58:53 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r0, 0x0) setpgid(0x0, r0) tkill(r0, 0x3d) wait4(0x0, 0x0, 0x80000000, 0x0) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:58:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='status\x00') setgroups(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fchown(r1, 0x0, 0xee01) 12:58:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x655e, 0x4) r1 = dup2(r0, r0) setsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000000080)=0xfffffffc, 0x4) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x28) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2020) [ 494.476883][T23797] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 494.487372][ T26] audit: type=1400 audit(1692449933.166:1070): avc: denied { setattr } for pid=23791 comm="syz-executor.1" name="status" dev="proc" ino=81578 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 494.515147][T23795] loop3: detected capacity change from 0 to 512 [ 494.539645][T23795] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 494.552280][T23795] ext4 filesystem being mounted at /root/syzkaller-testdir2619239228/syzkaller.jSMS4r/379/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 494.568001][ T26] audit: type=1400 audit(1692449933.246:1071): avc: denied { execmem } for pid=23794 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 12:58:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000f40)=@newpolicy={0xc4, 0x13, 0x1, 0x0, 0x0, {{@in, @in6=@ipv4={'\x00', '\xff\xff', @private}, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@policy_type={0xa, 0x10, {0x2}}]}, 0xc4}}, 0x0) 12:58:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x15, 0x0, 0x0, 0x2}, {0xc}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) syz_open_dev$tty1(0xc, 0x4, 0x1) 12:58:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='status\x00') setgroups(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fchown(r1, 0x0, 0xee01) 12:58:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x655e, 0x4) r1 = dup2(r0, r0) setsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000000080)=0xfffffffc, 0x4) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x28) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2020) 12:58:53 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r0, 0x0) setpgid(0x0, r0) tkill(r0, 0x3d) wait4(0x0, 0x0, 0x80000000, 0x0) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:58:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000f40)=@newpolicy={0xc4, 0x13, 0x1, 0x0, 0x0, {{@in, @in6=@ipv4={'\x00', '\xff\xff', @private}, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@policy_type={0xa, 0x10, {0x2}}]}, 0xc4}}, 0x0) 12:58:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='status\x00') setgroups(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fchown(r1, 0x0, 0xee01) [ 494.748305][ T26] audit: type=1400 audit(1692449933.416:1072): avc: denied { setattr } for pid=23794 comm="syz-executor.3" name="file0" dev="loop3" ino=19 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 12:58:54 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') 12:58:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000f40)=@newpolicy={0xc4, 0x13, 0x1, 0x0, 0x0, {{@in, @in6=@ipv4={'\x00', '\xff\xff', @private}, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@policy_type={0xa, 0x10, {0x2}}]}, 0xc4}}, 0x0) 12:58:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[], 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[], 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x5, 0x1ff, 0x84}, 0x48) 12:58:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x15, 0x0, 0x0, 0x2}, {0xc}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) syz_open_dev$tty1(0xc, 0x4, 0x1) 12:58:54 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x655e, 0x4) r1 = dup2(r0, r0) setsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000000080)=0xfffffffc, 0x4) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x28) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2020) 12:58:54 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r0, 0x0) setpgid(0x0, r0) tkill(r0, 0x3d) wait4(0x0, 0x0, 0x80000000, 0x0) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:58:54 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r0, 0x0) setpgid(0x0, r0) tkill(r0, 0x3d) wait4(0x0, 0x0, 0x80000000, 0x0) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:58:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x15, 0x0, 0x0, 0x2}, {0xc}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) syz_open_dev$tty1(0xc, 0x4, 0x1) 12:58:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000f40)=@newpolicy={0xc4, 0x13, 0x1, 0x0, 0x0, {{@in, @in6=@ipv4={'\x00', '\xff\xff', @private}, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@policy_type={0xa, 0x10, {0x2}}]}, 0xc4}}, 0x0) 12:58:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[], 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[], 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x5, 0x1ff, 0x84}, 0x48) 12:58:54 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$eJzs3cFPG9kZAPBvBgiEkEDaHNqqbdI0bVpFscFJUJRTemlVRZGqRj31kFBwEMLGCJs00BzI/1CpkXpq/4QeKvVQKae97233tpfsYaXsbrSrsNIevJqxIYRgYDcES/j3k55m3jzj7z2sec98gF8APetcRKxFxLGIuBcRo+3rSbvEzVbJHvfyxaPp9RePppNoNu98luTt2bXY8jWZE+3nHIqIP/4u4i/Jm3HrK6vzU5VKealdLzaqi8X6yurluerUbHm2vFAqTU5Mjl+/cq10YGM9W/3P89/O3frT///3k2fvr/36b1m3RtptW8dxkFpDH9iMk+mPiFvvIlgX9LXHc6zbHeE7SSPiexFxPr//R6MvfzUBgKOs2RyN5ujWOgBw1KV5DixJC+1cwEikaaHQyuGdieG0Uqs3Lt2vLS/MtHJlYzGQ3p+rlMfbucKxGEiy+kR+/qpe2la/EhGnI+Lvg8fzemG6Vpnp5hsfAOhhJ7at/18OttZ/AOCIG+p2BwCAQ2f9B4DeY/0HgN5j/QeA3mP9B4DeY/0HgN5j/QeAnvKH27ez0lxvf/71zIOV5fnag8sz5fp8obo8XZiuLS0WZmu12fwze6p7PV+lVlucuBrLD4uNcr1RrK+s3q3Wlhcad/PP9b5bHjiUUQEAuzl99umHSUSs3Tiel9iyl4O1Go62tNsdALqmr9sdALrGbl/Qu/yMD+ywRe9rOv6J0JOD7wtwOC7+UP4fepX8P/Qu+X/oXfL/0LuazcSe/wDQY+T4Ab//BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgG9vJC9JWmjvBT4SaVooRJyMiLEYSO7PVcrjEXEqIj4YHBjM6hPd7jQA8JbST5L2/l8XRy+MbG89lnw1mB8j4q//vPOPh1ONxtJEdv3zzeuNJ+3rpW70HwDYy8Y6vbGOb3j54tH0RjnM/jz/TWtz0Szueru0WvqjPz8OxUBEDH+RtOst2fuVvgOIv/Y4In6w0/iTPDcy1t75dHv8LPbJQ42fvhY/zdtax+x78f0D6Av0mqfZ/HNzp/svjXP5cef7fyifod7exvy3/sb8l27Of30d5r9z+41x9b3fd2x7HPGj/p3iJ5vxkw7xL+wz/kc//un5Tm3Nf0VcjJ3jb41VbFQXi/WV1ctz1anZ8mx5oVSanJgcv37lWqmY56iLG5nqN31649Kp3cY/3CH+0B7j/8U+x//vr+/9+We7xP/Vz3d+/c/sEj9bE3+5z/hTw//tuH13Fn+mw/j3ev0v7TP+s49XZ/b5UADgENRXVuenKpXykhMnTpxsnnR7ZgLetVc3fbd7AgAAAAAAAAAAAAAAdHIY/07U7TECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwdH0TAAD//yyP2UE=") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') [ 495.345881][T17831] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:58:54 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') [ 495.450985][T23853] loop3: detected capacity change from 0 to 512 [ 495.475711][T23855] loop5: detected capacity change from 0 to 512 [ 495.517173][T23855] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 495.523060][T23853] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 495.529935][T23855] ext4 filesystem being mounted at /root/syzkaller-testdir3628382944/syzkaller.grIdLx/499/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 495.543139][T23853] ext4 filesystem being mounted at /root/syzkaller-testdir2619239228/syzkaller.jSMS4r/380/file0 supports timestamps until 2038-01-19 (0x7fffffff) 12:58:55 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') 12:58:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x15, 0x0, 0x0, 0x2}, {0xc}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) syz_open_dev$tty1(0xc, 0x4, 0x1) 12:58:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[], 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[], 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x5, 0x1ff, 0x84}, 0x48) 12:58:55 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') 12:58:55 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') 12:58:55 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') [ 497.080270][T15920] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 497.155001][T17831] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:58:55 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') 12:58:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[], 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[], 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x5, 0x1ff, 0x84}, 0x48) [ 497.241969][T23878] loop5: detected capacity change from 0 to 512 [ 497.268754][T23878] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 497.270508][T23882] loop0: detected capacity change from 0 to 512 [ 497.281296][T23878] ext4 filesystem being mounted at /root/syzkaller-testdir3628382944/syzkaller.grIdLx/500/file0 supports timestamps until 2038-01-19 (0x7fffffff) 12:58:57 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$eJzs3cFPG9kZAPBvBgiEkEDaHNqqbdI0bVpFscFJUJRTemlVRZGqRj31kFBwEMLGCJs00BzI/1CpkXpq/4QeKvVQKae97233tpfsYaXsbrSrsNIevJqxIYRgYDcES/j3k55m3jzj7z2sec98gF8APetcRKxFxLGIuBcRo+3rSbvEzVbJHvfyxaPp9RePppNoNu98luTt2bXY8jWZE+3nHIqIP/4u4i/Jm3HrK6vzU5VKealdLzaqi8X6yurluerUbHm2vFAqTU5Mjl+/cq10YGM9W/3P89/O3frT///3k2fvr/36b1m3RtptW8dxkFpDH9iMk+mPiFvvIlgX9LXHc6zbHeE7SSPiexFxPr//R6MvfzUBgKOs2RyN5ujWOgBw1KV5DixJC+1cwEikaaHQyuGdieG0Uqs3Lt2vLS/MtHJlYzGQ3p+rlMfbucKxGEiy+kR+/qpe2la/EhGnI+Lvg8fzemG6Vpnp5hsfAOhhJ7at/18OttZ/AOCIG+p2BwCAQ2f9B4DeY/0HgN5j/QeA3mP9B4DeY/0HgN5j/QeAnvKH27ez0lxvf/71zIOV5fnag8sz5fp8obo8XZiuLS0WZmu12fwze6p7PV+lVlucuBrLD4uNcr1RrK+s3q3Wlhcad/PP9b5bHjiUUQEAuzl99umHSUSs3Tiel9iyl4O1Go62tNsdALqmr9sdALrGbl/Qu/yMD+ywRe9rOv6J0JOD7wtwOC7+UP4fepX8P/Qu+X/oXfL/0LuazcSe/wDQY+T4Ab//BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgG9vJC9JWmjvBT4SaVooRJyMiLEYSO7PVcrjEXEqIj4YHBjM6hPd7jQA8JbST5L2/l8XRy+MbG89lnw1mB8j4q//vPOPh1ONxtJEdv3zzeuNJ+3rpW70HwDYy8Y6vbGOb3j54tH0RjnM/jz/TWtz0Szueru0WvqjPz8OxUBEDH+RtOst2fuVvgOIv/Y4In6w0/iTPDcy1t75dHv8LPbJQ42fvhY/zdtax+x78f0D6Av0mqfZ/HNzp/svjXP5cef7fyifod7exvy3/sb8l27Of30d5r9z+41x9b3fd2x7HPGj/p3iJ5vxkw7xL+wz/kc//un5Tm3Nf0VcjJ3jb41VbFQXi/WV1ctz1anZ8mx5oVSanJgcv37lWqmY56iLG5nqN31649Kp3cY/3CH+0B7j/8U+x//vr+/9+We7xP/Vz3d+/c/sEj9bE3+5z/hTw//tuH13Fn+mw/j3ev0v7TP+s49XZ/b5UADgENRXVuenKpXykhMnTpxsnnR7ZgLetVc3fbd7AgAAAAAAAAAAAAAAdHIY/07U7TECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwdH0TAAD//yyP2UE=") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') [ 499.289824][T23895] loop1: detected capacity change from 0 to 512 12:58:58 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') [ 499.376955][T23892] loop3: detected capacity change from 0 to 512 [ 499.419764][T15920] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 499.420562][T23895] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 499.441404][T23895] ext4 filesystem being mounted at /root/syzkaller-testdir543595805/syzkaller.4QWIw4/749/file0 supports timestamps until 2038-01-19 (0x7fffffff) 12:58:58 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') [ 499.477835][T23882] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 499.512562][T23882] ext4 filesystem being mounted at /root/syzkaller-testdir3383782909/syzkaller.CeNBs5/740/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 499.590719][T23904] loop5: detected capacity change from 0 to 512 [ 499.623395][T23892] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 499.636105][T23892] ext4 filesystem being mounted at /root/syzkaller-testdir2619239228/syzkaller.jSMS4r/381/file0 supports timestamps until 2038-01-19 (0x7fffffff) 12:58:59 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') [ 501.227372][T23904] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 501.240060][T23904] ext4 filesystem being mounted at /root/syzkaller-testdir3628382944/syzkaller.grIdLx/501/file0 supports timestamps until 2038-01-19 (0x7fffffff) 12:59:00 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$eJzs3cFPG9kZAPBvBgiEkEDaHNqqbdI0bVpFscFJUJRTemlVRZGqRj31kFBwEMLGCJs00BzI/1CpkXpq/4QeKvVQKae97233tpfsYaXsbrSrsNIevJqxIYRgYDcES/j3k55m3jzj7z2sec98gF8APetcRKxFxLGIuBcRo+3rSbvEzVbJHvfyxaPp9RePppNoNu98luTt2bXY8jWZE+3nHIqIP/4u4i/Jm3HrK6vzU5VKealdLzaqi8X6yurluerUbHm2vFAqTU5Mjl+/cq10YGM9W/3P89/O3frT///3k2fvr/36b1m3RtptW8dxkFpDH9iMk+mPiFvvIlgX9LXHc6zbHeE7SSPiexFxPr//R6MvfzUBgKOs2RyN5ujWOgBw1KV5DixJC+1cwEikaaHQyuGdieG0Uqs3Lt2vLS/MtHJlYzGQ3p+rlMfbucKxGEiy+kR+/qpe2la/EhGnI+Lvg8fzemG6Vpnp5hsfAOhhJ7at/18OttZ/AOCIG+p2BwCAQ2f9B4DeY/0HgN5j/QeA3mP9B4DeY/0HgN5j/QeAnvKH27ez0lxvf/71zIOV5fnag8sz5fp8obo8XZiuLS0WZmu12fwze6p7PV+lVlucuBrLD4uNcr1RrK+s3q3Wlhcad/PP9b5bHjiUUQEAuzl99umHSUSs3Tiel9iyl4O1Go62tNsdALqmr9sdALrGbl/Qu/yMD+ywRe9rOv6J0JOD7wtwOC7+UP4fepX8P/Qu+X/oXfL/0LuazcSe/wDQY+T4Ab//BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgG9vJC9JWmjvBT4SaVooRJyMiLEYSO7PVcrjEXEqIj4YHBjM6hPd7jQA8JbST5L2/l8XRy+MbG89lnw1mB8j4q//vPOPh1ONxtJEdv3zzeuNJ+3rpW70HwDYy8Y6vbGOb3j54tH0RjnM/jz/TWtz0Szueru0WvqjPz8OxUBEDH+RtOst2fuVvgOIv/Y4In6w0/iTPDcy1t75dHv8LPbJQ42fvhY/zdtax+x78f0D6Av0mqfZ/HNzp/svjXP5cef7fyifod7exvy3/sb8l27Of30d5r9z+41x9b3fd2x7HPGj/p3iJ5vxkw7xL+wz/kc//un5Tm3Nf0VcjJ3jb41VbFQXi/WV1ctz1anZ8mx5oVSanJgcv37lWqmY56iLG5nqN31649Kp3cY/3CH+0B7j/8U+x//vr+/9+We7xP/Vz3d+/c/sEj9bE3+5z/hTw//tuH13Fn+mw/j3ev0v7TP+s49XZ/b5UADgENRXVuenKpXykhMnTpxsnnR7ZgLetVc3fbd7AgAAAAAAAAAAAAAAdHIY/07U7TECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwdH0TAAD//yyP2UE=") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') 12:59:00 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') [ 501.481030][T11100] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 501.481185][T17831] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:59:00 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$eJzs3cFPG9kZAPBvBgiEkEDaHNqqbdI0bVpFscFJUJRTemlVRZGqRj31kFBwEMLGCJs00BzI/1CpkXpq/4QeKvVQKae97233tpfsYaXsbrSrsNIevJqxIYRgYDcES/j3k55m3jzj7z2sec98gF8APetcRKxFxLGIuBcRo+3rSbvEzVbJHvfyxaPp9RePppNoNu98luTt2bXY8jWZE+3nHIqIP/4u4i/Jm3HrK6vzU5VKealdLzaqi8X6yurluerUbHm2vFAqTU5Mjl+/cq10YGM9W/3P89/O3frT///3k2fvr/36b1m3RtptW8dxkFpDH9iMk+mPiFvvIlgX9LXHc6zbHeE7SSPiexFxPr//R6MvfzUBgKOs2RyN5ujWOgBw1KV5DixJC+1cwEikaaHQyuGdieG0Uqs3Lt2vLS/MtHJlYzGQ3p+rlMfbucKxGEiy+kR+/qpe2la/EhGnI+Lvg8fzemG6Vpnp5hsfAOhhJ7at/18OttZ/AOCIG+p2BwCAQ2f9B4DeY/0HgN5j/QeA3mP9B4DeY/0HgN5j/QeAnvKH27ez0lxvf/71zIOV5fnag8sz5fp8obo8XZiuLS0WZmu12fwze6p7PV+lVlucuBrLD4uNcr1RrK+s3q3Wlhcad/PP9b5bHjiUUQEAuzl99umHSUSs3Tiel9iyl4O1Go62tNsdALqmr9sdALrGbl/Qu/yMD+ywRe9rOv6J0JOD7wtwOC7+UP4fepX8P/Qu+X/oXfL/0LuazcSe/wDQY+T4Ab//BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgG9vJC9JWmjvBT4SaVooRJyMiLEYSO7PVcrjEXEqIj4YHBjM6hPd7jQA8JbST5L2/l8XRy+MbG89lnw1mB8j4q//vPOPh1ONxtJEdv3zzeuNJ+3rpW70HwDYy8Y6vbGOb3j54tH0RjnM/jz/TWtz0Szueru0WvqjPz8OxUBEDH+RtOst2fuVvgOIv/Y4In6w0/iTPDcy1t75dHv8LPbJQ42fvhY/zdtax+x78f0D6Av0mqfZ/HNzp/svjXP5cef7fyifod7exvy3/sb8l27Of30d5r9z+41x9b3fd2x7HPGj/p3iJ5vxkw7xL+wz/kc//un5Tm3Nf0VcjJ3jb41VbFQXi/WV1ctz1anZ8mx5oVSanJgcv37lWqmY56iLG5nqN31649Kp3cY/3CH+0B7j/8U+x//vr+/9+We7xP/Vz3d+/c/sEj9bE3+5z/hTw//tuH13Fn+mw/j3ev0v7TP+s49XZ/b5UADgENRXVuenKpXykhMnTpxsnnR7ZgLetVc3fbd7AgAAAAAAAAAAAAAAdHIY/07U7TECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwdH0TAAD//yyP2UE=") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') [ 501.804332][T11529] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:59:01 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') 12:59:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000}, 0xb0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x5, 0x10}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0x6239}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) [ 502.370956][T15920] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 502.401852][T23932] loop3: detected capacity change from 0 to 512 [ 502.402531][T23927] loop0: detected capacity change from 0 to 512 [ 502.447955][T23936] loop1: detected capacity change from 0 to 512 [ 502.463453][T23927] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 502.476655][T23927] ext4 filesystem being mounted at /root/syzkaller-testdir3383782909/syzkaller.CeNBs5/741/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 502.491447][T23932] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 502.491563][T23932] ext4 filesystem being mounted at /root/syzkaller-testdir2619239228/syzkaller.jSMS4r/382/file0 supports timestamps until 2038-01-19 (0x7fffffff) 12:59:02 executing program 2: timer_create(0x2, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x1, &(0x7f00000003c0)={{}, {0x0, 0x989680}}, 0x0) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, 0x2710}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, 0x0, 0x0) timer_getoverrun(0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000440)="390000001300034700bb65e1c3e4ff5b4ab6380d218d9531058ad9caf8b175ff01000000010000005600000025000000190004000400000007", 0x39}], 0x1) open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 503.495773][T23950] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.2'. 12:59:03 executing program 2: timer_create(0x2, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x1, &(0x7f00000003c0)={{}, {0x0, 0x989680}}, 0x0) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, 0x2710}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, 0x0, 0x0) timer_getoverrun(0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000440)="390000001300034700bb65e1c3e4ff5b4ab6380d218d9531058ad9caf8b175ff01000000010000005600000025000000190004000400000007", 0x39}], 0x1) open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 12:59:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000}, 0xb0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x5, 0x10}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0x6239}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) 12:59:03 executing program 2: timer_create(0x2, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x1, &(0x7f00000003c0)={{}, {0x0, 0x989680}}, 0x0) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, 0x2710}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, 0x0, 0x0) timer_getoverrun(0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000440)="390000001300034700bb65e1c3e4ff5b4ab6380d218d9531058ad9caf8b175ff01000000010000005600000025000000190004000400000007", 0x39}], 0x1) open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 504.498534][T23958] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.2'. 12:59:03 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') 12:59:03 executing program 2: timer_create(0x2, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x1, &(0x7f00000003c0)={{}, {0x0, 0x989680}}, 0x0) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, 0x2710}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, 0x0, 0x0) timer_getoverrun(0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000440)="390000001300034700bb65e1c3e4ff5b4ab6380d218d9531058ad9caf8b175ff01000000010000005600000025000000190004000400000007", 0x39}], 0x1) open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 12:59:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000}, 0xb0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x5, 0x10}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0x6239}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) [ 504.578394][T11100] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 504.602766][T23961] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.2'. [ 504.622305][T23936] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 504.635554][T23936] ext4 filesystem being mounted at /root/syzkaller-testdir543595805/syzkaller.4QWIw4/750/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 504.661335][T17831] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:59:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000}, 0xb0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x5, 0x10}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0x6239}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) [ 504.671921][T23964] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.2'. 12:59:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000}, 0xb0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x5, 0x10}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0x6239}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) [ 504.716208][T23966] loop0: detected capacity change from 0 to 512 [ 504.784911][T23966] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 504.797558][T23966] ext4 filesystem being mounted at /root/syzkaller-testdir3383782909/syzkaller.CeNBs5/742/file0 supports timestamps until 2038-01-19 (0x7fffffff) 12:59:04 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x21, 0x4a6, &(0x7f0000000a40)="$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") write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./bus/file0\x00', 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) getpid() setuid(0x0) setxattr(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000400)=@known='security.apparmor\x00', &(0x7f00000003c0)='overlay\x00', 0xe407, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') 12:59:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000}, 0xb0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x5, 0x10}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0x6239}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) 12:59:04 executing program 4: timer_create(0x2, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x1, &(0x7f00000003c0)={{}, {0x0, 0x989680}}, 0x0) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, 0x2710}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, 0x0, 0x0) timer_getoverrun(0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000440)="390000001300034700bb65e1c3e4ff5b4ab6380d218d9531058ad9caf8b175ff01000000010000005600000025000000190004000400000007", 0x39}], 0x1) open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 505.471843][T11529] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 505.505463][T23983] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. 12:59:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000}, 0xb0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x5, 0x10}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0x6239}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) 12:59:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000}, 0xb0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x5, 0x10}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0x6239}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) 12:59:04 executing program 4: timer_create(0x2, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x1, &(0x7f00000003c0)={{}, {0x0, 0x989680}}, 0x0) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, 0x2710}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, 0x0, 0x0) timer_getoverrun(0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000440)="390000001300034700bb65e1c3e4ff5b4ab6380d218d9531058ad9caf8b175ff01000000010000005600000025000000190004000400000007", 0x39}], 0x1) open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 12:59:04 executing program 4: timer_create(0x2, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x1, &(0x7f00000003c0)={{}, {0x0, 0x989680}}, 0x0) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, 0x2710}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, 0x0, 0x0) timer_getoverrun(0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000440)="390000001300034700bb65e1c3e4ff5b4ab6380d218d9531058ad9caf8b175ff01000000010000005600000025000000190004000400000007", 0x39}], 0x1) open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 505.575035][T23987] loop1: detected capacity change from 0 to 512 [ 505.600949][T23989] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. 12:59:04 executing program 0: timer_create(0x2, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x1, &(0x7f00000003c0)={{}, {0x0, 0x989680}}, 0x0) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, 0x2710}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, 0x0, 0x0) timer_getoverrun(0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000440)="390000001300034700bb65e1c3e4ff5b4ab6380d218d9531058ad9caf8b175ff01000000010000005600000025000000190004000400000007", 0x39}], 0x1) open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 12:59:04 executing program 5: r0 = socket(0x200000100000011, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth0_to_hsr\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) sendmmsg$unix(r0, &(0x7f0000007c80)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="918fec13d560b1e11357714e8798", 0xe}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x10, 0x1, 0x25}}], 0x10}}], 0x2, 0x0) 12:59:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000}, 0xb0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x5, 0x10}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0x6239}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) [ 505.631761][T11100] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:59:04 executing program 4: prlimit64(0x0, 0x7, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$kcm(0x2, 0xa, 0x2) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) [ 505.676175][T23999] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 505.678053][T23987] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 505.698820][T23987] ext4 filesystem being mounted at /root/syzkaller-testdir543595805/syzkaller.4QWIw4/751/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 505.707848][T24003] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. 12:59:04 executing program 5: r0 = socket(0x200000100000011, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth0_to_hsr\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) sendmmsg$unix(r0, &(0x7f0000007c80)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="918fec13d560b1e11357714e8798", 0xe}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x10, 0x1, 0x25}}], 0x10}}], 0x2, 0x0) 12:59:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000006c0)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @private1}]}, &(0x7f0000000000)=0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000000c0)={r3}, &(0x7f0000000140)=0x8) 12:59:05 executing program 0: timer_create(0x2, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x1, &(0x7f00000003c0)={{}, {0x0, 0x989680}}, 0x0) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, 0x2710}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, 0x0, 0x0) timer_getoverrun(0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000440)="390000001300034700bb65e1c3e4ff5b4ab6380d218d9531058ad9caf8b175ff01000000010000005600000025000000190004000400000007", 0x39}], 0x1) open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 12:59:05 executing program 4: prlimit64(0x0, 0x7, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$kcm(0x2, 0xa, 0x2) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) 12:59:05 executing program 5: r0 = socket(0x200000100000011, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth0_to_hsr\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) sendmmsg$unix(r0, &(0x7f0000007c80)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="918fec13d560b1e11357714e8798", 0xe}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x10, 0x1, 0x25}}], 0x10}}], 0x2, 0x0) 12:59:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x1000000}, 0xb0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x5, 0x10}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0x6239}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xb, 0xa, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000001680), 0x8000, r1}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000000)=""/59}, 0x20) 12:59:05 executing program 1: socket(0x2, 0x3, 0x101) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@link_local={0x3}, @random="7f0a000300", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x12, 0x0, 0x2802, {0x5, 0x2}}}}}}, 0x0) 12:59:05 executing program 0: timer_create(0x2, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_settime(0x0, 0x1, &(0x7f00000003c0)={{}, {0x0, 0x989680}}, 0x0) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, 0x2710}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, 0x0, 0x0) timer_getoverrun(0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000440)="390000001300034700bb65e1c3e4ff5b4ab6380d218d9531058ad9caf8b175ff01000000010000005600000025000000190004000400000007", 0x39}], 0x1) open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 12:59:05 executing program 5: r0 = socket(0x200000100000011, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth0_to_hsr\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) sendmmsg$unix(r0, &(0x7f0000007c80)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="918fec13d560b1e11357714e8798", 0xe}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x10, 0x1, 0x25}}], 0x10}}], 0x2, 0x0) 12:59:05 executing program 4: prlimit64(0x0, 0x7, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$kcm(0x2, 0xa, 0x2) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) [ 506.446139][T11529] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 506.458671][T24016] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. 12:59:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000600)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)={0x30, r1, 0x607, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}]}, 0x30}}, 0x0) 12:59:05 executing program 1: socket(0x2, 0x3, 0x101) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@link_local={0x3}, @random="7f0a000300", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x12, 0x0, 0x2802, {0x5, 0x2}}}}}}, 0x0) 12:59:05 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000001080)={0x1f, 0xffffffffffffffff}, 0x6) writev(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)="47c18e18", 0x4}, {0x0, 0x2}], 0x2) [ 506.518878][T24025] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. 12:59:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=@ipv6_newaddrlabel={0x30, 0x48, 0x1, 0x0, 0x0, {}, [@IFAL_ADDRESS={0x14, 0x1, @dev}]}, 0x30}}, 0x0) 12:59:05 executing program 4: prlimit64(0x0, 0x7, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$kcm(0x2, 0xa, 0x2) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) 12:59:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005600)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f0000002500)=[{&(0x7f0000001400)="ce", 0x1}], 0x1, &(0x7f00000025c0)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x40}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}], 0x30}], 0x1, 0x0) 12:59:05 executing program 1: socket(0x2, 0x3, 0x101) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@link_local={0x3}, @random="7f0a000300", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x12, 0x0, 0x2802, {0x5, 0x2}}}}}}, 0x0) 12:59:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000600)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)={0x30, r1, 0x607, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}]}, 0x30}}, 0x0) 12:59:05 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000001080)={0x1f, 0xffffffffffffffff}, 0x6) writev(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)="47c18e18", 0x4}, {0x0, 0x2}], 0x2) 12:59:06 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000001080)={0x1f, 0xffffffffffffffff}, 0x6) writev(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)="47c18e18", 0x4}, {0x0, 0x2}], 0x2) 12:59:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=@ipv6_newaddrlabel={0x30, 0x48, 0x1, 0x0, 0x0, {}, [@IFAL_ADDRESS={0x14, 0x1, @dev}]}, 0x30}}, 0x0) 12:59:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=@ipv6_newaddrlabel={0x30, 0x48, 0x1, 0x0, 0x0, {}, [@IFAL_ADDRESS={0x14, 0x1, @dev}]}, 0x30}}, 0x0) 12:59:06 executing program 1: socket(0x2, 0x3, 0x101) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@link_local={0x3}, @random="7f0a000300", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x12, 0x0, 0x2802, {0x5, 0x2}}}}}}, 0x0) 12:59:06 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @remote, 'gretap0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x3, @multicast, 'lo\x00'}}) 12:59:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000600)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)={0x30, r1, 0x607, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}]}, 0x30}}, 0x0) 12:59:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000600)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)={0x30, r1, 0x607, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}]}, 0x30}}, 0x0) 12:59:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14}, &(0x7f0000000300)=0x0) timer_settime(r1, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0xfffffff2, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f0000000480)) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 12:59:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005600)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f0000002500)=[{&(0x7f0000001400)="ce", 0x1}], 0x1, &(0x7f00000025c0)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x40}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}], 0x30}], 0x1, 0x0) 12:59:06 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000001080)={0x1f, 0xffffffffffffffff}, 0x6) writev(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)="47c18e18", 0x4}, {0x0, 0x2}], 0x2) 12:59:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=@ipv6_newaddrlabel={0x30, 0x48, 0x1, 0x0, 0x0, {}, [@IFAL_ADDRESS={0x14, 0x1, @dev}]}, 0x30}}, 0x0) 12:59:06 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @remote, 'gretap0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x3, @multicast, 'lo\x00'}}) 12:59:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x2}]}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x48, 0x3, 0x6, 0x801, 0x0, 0x0, {0x3, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) 12:59:06 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @remote, 'gretap0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x3, @multicast, 'lo\x00'}}) 12:59:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_NEWCHAIN={0x98, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x6b, 0x3, "91abc12404cf378042f26c43f91f68d8a90767c0bc71f60877974475de3d78ef670efff3f7311209fb8cc158fa18f18591bb90dd1e0464d31ff30a7e5b227e08a2ee0643e735c3cd21b6e743176c8eefd41693bc94e6a273643642d61840a5f275333bb1afbbd5"}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x9, 0x400300}], {0x14}}, 0xfc}}, 0x0) 12:59:06 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) statx(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) socket$inet6_udp(0xa, 0x2, 0x0) getuid() r5 = socket(0x840000000002, 0x3, 0x100) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)=0x2) 12:59:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x2}]}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x48, 0x3, 0x6, 0x801, 0x0, 0x0, {0x3, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) 12:59:06 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @remote, 'gretap0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x3, @multicast, 'lo\x00'}}) 12:59:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_NEWCHAIN={0x98, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x6b, 0x3, "91abc12404cf378042f26c43f91f68d8a90767c0bc71f60877974475de3d78ef670efff3f7311209fb8cc158fa18f18591bb90dd1e0464d31ff30a7e5b227e08a2ee0643e735c3cd21b6e743176c8eefd41693bc94e6a273643642d61840a5f275333bb1afbbd5"}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x9, 0x400300}], {0x14}}, 0xfc}}, 0x0) 12:59:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14}, &(0x7f0000000300)=0x0) timer_settime(r1, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0xfffffff2, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f0000000480)) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) [ 508.327158][T24091] hub 5-0:1.0: USB hub found [ 508.331982][T24091] hub 5-0:1.0: 8 ports detected 12:59:07 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005600)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f0000002500)=[{&(0x7f0000001400)="ce", 0x1}], 0x1, &(0x7f00000025c0)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x40}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}], 0x30}], 0x1, 0x0) 12:59:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x2}]}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x48, 0x3, 0x6, 0x801, 0x0, 0x0, {0x3, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) 12:59:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_NEWCHAIN={0x98, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x6b, 0x3, "91abc12404cf378042f26c43f91f68d8a90767c0bc71f60877974475de3d78ef670efff3f7311209fb8cc158fa18f18591bb90dd1e0464d31ff30a7e5b227e08a2ee0643e735c3cd21b6e743176c8eefd41693bc94e6a273643642d61840a5f275333bb1afbbd5"}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x9, 0x400300}], {0x14}}, 0xfc}}, 0x0) 12:59:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x2}]}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x48, 0x3, 0x6, 0x801, 0x0, 0x0, {0x3, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) 12:59:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_NEWCHAIN={0x98, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x6b, 0x3, "91abc12404cf378042f26c43f91f68d8a90767c0bc71f60877974475de3d78ef670efff3f7311209fb8cc158fa18f18591bb90dd1e0464d31ff30a7e5b227e08a2ee0643e735c3cd21b6e743176c8eefd41693bc94e6a273643642d61840a5f275333bb1afbbd5"}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x9, 0x400300}], {0x14}}, 0xfc}}, 0x0) 12:59:07 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) statx(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) socket$inet6_udp(0xa, 0x2, 0x0) getuid() r5 = socket(0x840000000002, 0x3, 0x100) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)=0x2) 12:59:07 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) statx(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) socket$inet6_udp(0xa, 0x2, 0x0) getuid() r5 = socket(0x840000000002, 0x3, 0x100) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)=0x2) 12:59:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x2}]}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x48, 0x3, 0x6, 0x801, 0x0, 0x0, {0x3, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) 12:59:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14}, &(0x7f0000000300)=0x0) timer_settime(r1, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0xfffffff2, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f0000000480)) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) [ 509.635121][T24113] hub 5-0:1.0: USB hub found [ 509.639805][T24113] hub 5-0:1.0: 8 ports detected 12:59:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x2}]}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x48, 0x3, 0x6, 0x801, 0x0, 0x0, {0x3, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) 12:59:08 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) statx(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) socket$inet6_udp(0xa, 0x2, 0x0) getuid() r5 = socket(0x840000000002, 0x3, 0x100) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)=0x2) 12:59:08 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) statx(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) socket$inet6_udp(0xa, 0x2, 0x0) getuid() r5 = socket(0x840000000002, 0x3, 0x100) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)=0x2) [ 509.992587][T24124] hub 5-0:1.0: USB hub found [ 509.997386][T24124] hub 5-0:1.0: 8 ports detected 12:59:08 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005600)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f0000002500)=[{&(0x7f0000001400)="ce", 0x1}], 0x1, &(0x7f00000025c0)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x40}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}], 0x30}], 0x1, 0x0) 12:59:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x2}]}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x48, 0x3, 0x6, 0x801, 0x0, 0x0, {0x3, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) 12:59:08 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) statx(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) socket$inet6_udp(0xa, 0x2, 0x0) getuid() r5 = socket(0x840000000002, 0x3, 0x100) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)=0x2) 12:59:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14}, &(0x7f0000000300)=0x0) timer_settime(r1, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0xfffffff2, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f0000000480)) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 12:59:09 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) statx(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) socket$inet6_udp(0xa, 0x2, 0x0) getuid() r5 = socket(0x840000000002, 0x3, 0x100) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)=0x2) [ 510.933340][T24136] hub 5-0:1.0: USB hub found [ 510.938076][T24136] hub 5-0:1.0: 8 ports detected 12:59:09 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) statx(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) socket$inet6_udp(0xa, 0x2, 0x0) getuid() r5 = socket(0x840000000002, 0x3, 0x100) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)=0x2) 12:59:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14}, &(0x7f0000000300)=0x0) timer_settime(r1, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0xfffffff2, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f0000000480)) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 12:59:09 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0x2, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 12:59:09 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) statx(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) socket$inet6_udp(0xa, 0x2, 0x0) getuid() r5 = socket(0x840000000002, 0x3, 0x100) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)=0x2) [ 511.646419][T24147] hub 5-0:1.0: USB hub found [ 511.651298][T24147] hub 5-0:1.0: 8 ports detected [ 511.676074][T24152] hub 5-0:1.0: USB hub found [ 511.681603][T24152] hub 5-0:1.0: 8 ports detected 12:59:10 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0x2, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 511.963541][T24160] hub 5-0:1.0: USB hub found [ 511.968604][T24160] hub 5-0:1.0: 8 ports detected 12:59:10 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) statx(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) socket$inet6_udp(0xa, 0x2, 0x0) getuid() r5 = socket(0x840000000002, 0x3, 0x100) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)=0x2) 12:59:10 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0x2, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 12:59:10 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0x2, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 12:59:10 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0x2, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 512.403330][T24172] hub 5-0:1.0: USB hub found [ 512.408371][T24172] hub 5-0:1.0: 8 ports detected 12:59:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)='dn:\x00\x00\x00') 12:59:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14}, &(0x7f0000000300)=0x0) timer_settime(r1, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0xfffffff2, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f0000000480)) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 12:59:11 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0x2, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 12:59:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_lifetime={0x4, 0x4}]}, 0x80}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x4, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @broadcast}, 0x10) getsockopt(r1, 0xfff, 0x3, &(0x7f0000000580)=""/138, &(0x7f0000000400)=0x8a) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x3a68}], 0x6, &(0x7f0000000200)=""/20, 0x31, 0xd571012c}, 0x12c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000640)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f0000000700)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000480)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) setrlimit(0xdbb1d8fec8c9db25, &(0x7f0000000300)={0xa9, 0x800}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, 0x0, 0x0, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX], 0x100000530) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x400) setrlimit(0x2, &(0x7f0000000340)={0x1000000000, 0x401}) 12:59:11 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0x2, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 12:59:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)='dn:\x00\x00\x00') 12:59:11 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xa0, 0x35}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x6e, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x12c4}, 0x28) 12:59:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8}]}}]}]}, 0x3c}}, 0x0) [ 512.861696][ T26] audit: type=1400 audit(1692449951.526:1073): avc: denied { setopt } for pid=24179 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 512.891874][ T26] audit: type=1400 audit(1692449951.556:1074): avc: denied { getopt } for pid=24179 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 12:59:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)='dn:\x00\x00\x00') 12:59:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8}]}}]}]}, 0x3c}}, 0x0) 12:59:11 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xa0, 0x35}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x6e, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x12c4}, 0x28) 12:59:11 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xa0, 0x35}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x6e, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x12c4}, 0x28) 12:59:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)='dn:\x00\x00\x00') 12:59:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14}, &(0x7f0000000300)=0x0) timer_settime(r1, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0xfffffff2, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f0000000480)) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 12:59:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8}]}}]}]}, 0x3c}}, 0x0) 12:59:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8}]}}]}]}, 0x3c}}, 0x0) 12:59:12 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xa0, 0x35}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x6e, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x12c4}, 0x28) 12:59:12 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xa0, 0x35}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x6e, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x12c4}, 0x28) 12:59:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_lifetime={0x4, 0x4}]}, 0x80}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x4, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @broadcast}, 0x10) getsockopt(r1, 0xfff, 0x3, &(0x7f0000000580)=""/138, &(0x7f0000000400)=0x8a) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x3a68}], 0x6, &(0x7f0000000200)=""/20, 0x31, 0xd571012c}, 0x12c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000640)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f0000000700)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000480)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) setrlimit(0xdbb1d8fec8c9db25, &(0x7f0000000300)={0xa9, 0x800}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, 0x0, 0x0, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX], 0x100000530) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x400) setrlimit(0x2, &(0x7f0000000340)={0x1000000000, 0x401}) 12:59:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8}]}}]}]}, 0x3c}}, 0x0) 12:59:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8}]}}]}]}, 0x3c}}, 0x0) 12:59:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_lifetime={0x4, 0x4}]}, 0x80}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x4, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @broadcast}, 0x10) getsockopt(r1, 0xfff, 0x3, &(0x7f0000000580)=""/138, &(0x7f0000000400)=0x8a) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x3a68}], 0x6, &(0x7f0000000200)=""/20, 0x31, 0xd571012c}, 0x12c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000640)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f0000000700)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000480)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) setrlimit(0xdbb1d8fec8c9db25, &(0x7f0000000300)={0xa9, 0x800}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, 0x0, 0x0, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX], 0x100000530) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x400) setrlimit(0x2, &(0x7f0000000340)={0x1000000000, 0x401}) 12:59:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x16}, {0x8}]}}]}]}, 0x3c}}, 0x0) 12:59:12 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_lifetime={0x4, 0x4}]}, 0x80}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x4, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @broadcast}, 0x10) getsockopt(r1, 0xfff, 0x3, &(0x7f0000000580)=""/138, &(0x7f0000000400)=0x8a) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x3a68}], 0x6, &(0x7f0000000200)=""/20, 0x31, 0xd571012c}, 0x12c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000640)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f0000000700)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000480)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) setrlimit(0xdbb1d8fec8c9db25, &(0x7f0000000300)={0xa9, 0x800}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, 0x0, 0x0, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX], 0x100000530) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x400) setrlimit(0x2, &(0x7f0000000340)={0x1000000000, 0x401}) 12:59:12 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xa0, 0x35}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x6e, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x12c4}, 0x28) 12:59:13 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xa0, 0x35}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x6e, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x12c4}, 0x28) 12:59:13 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000010c0)={0x2, 0x4, &(0x7f0000000640)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x70}]}, &(0x7f0000000ec0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_lifetime={0x4, 0x4}]}, 0x80}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x4, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @broadcast}, 0x10) getsockopt(r1, 0xfff, 0x3, &(0x7f0000000580)=""/138, &(0x7f0000000400)=0x8a) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x3a68}], 0x6, &(0x7f0000000200)=""/20, 0x31, 0xd571012c}, 0x12c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000640)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f0000000700)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000480)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) setrlimit(0xdbb1d8fec8c9db25, &(0x7f0000000300)={0xa9, 0x800}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, 0x0, 0x0, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX], 0x100000530) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x400) setrlimit(0x2, &(0x7f0000000340)={0x1000000000, 0x401}) 12:59:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newqdisc={0x74, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x44, 0x2, {{0x0, 0x10001, 0x0, 0x1}, [@TCA_NETEM_JITTER64={0xc, 0xb, 0x1ff}, @TCA_NETEM_REORDER={0xc, 0x3, {0x0, 0xe1c6}}, @TCA_NETEM_CORR={0x10, 0x1, {0x6}}]}}}]}, 0x74}}, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$packet(r0, &(0x7f0000000380)="93a70b0100001006ff7f00000800", 0x36, 0x0, 0x0, 0x0) 12:59:13 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000010c0)={0x2, 0x4, &(0x7f0000000640)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x70}]}, &(0x7f0000000ec0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:13 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000010c0)={0x2, 0x4, &(0x7f0000000640)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x70}]}, &(0x7f0000000ec0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_lifetime={0x4, 0x4}]}, 0x80}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x4, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @broadcast}, 0x10) getsockopt(r1, 0xfff, 0x3, &(0x7f0000000580)=""/138, &(0x7f0000000400)=0x8a) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x3a68}], 0x6, &(0x7f0000000200)=""/20, 0x31, 0xd571012c}, 0x12c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000640)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f0000000700)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000480)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) setrlimit(0xdbb1d8fec8c9db25, &(0x7f0000000300)={0xa9, 0x800}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, 0x0, 0x0, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX], 0x100000530) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x400) setrlimit(0x2, &(0x7f0000000340)={0x1000000000, 0x401}) 12:59:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newqdisc={0x74, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x44, 0x2, {{0x0, 0x10001, 0x0, 0x1}, [@TCA_NETEM_JITTER64={0xc, 0xb, 0x1ff}, @TCA_NETEM_REORDER={0xc, 0x3, {0x0, 0xe1c6}}, @TCA_NETEM_CORR={0x10, 0x1, {0x6}}]}}}]}, 0x74}}, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$packet(r0, &(0x7f0000000380)="93a70b0100001006ff7f00000800", 0x36, 0x0, 0x0, 0x0) 12:59:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newqdisc={0x74, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x44, 0x2, {{0x0, 0x10001, 0x0, 0x1}, [@TCA_NETEM_JITTER64={0xc, 0xb, 0x1ff}, @TCA_NETEM_REORDER={0xc, 0x3, {0x0, 0xe1c6}}, @TCA_NETEM_CORR={0x10, 0x1, {0x6}}]}}}]}, 0x74}}, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$packet(r0, &(0x7f0000000380)="93a70b0100001006ff7f00000800", 0x36, 0x0, 0x0, 0x0) [ 514.664998][T24248] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 12:59:13 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_lifetime={0x4, 0x4}]}, 0x80}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x4, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @broadcast}, 0x10) getsockopt(r1, 0xfff, 0x3, &(0x7f0000000580)=""/138, &(0x7f0000000400)=0x8a) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x3a68}], 0x6, &(0x7f0000000200)=""/20, 0x31, 0xd571012c}, 0x12c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000640)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f0000000700)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000480)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) setrlimit(0xdbb1d8fec8c9db25, &(0x7f0000000300)={0xa9, 0x800}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, 0x0, 0x0, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX], 0x100000530) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x400) setrlimit(0x2, &(0x7f0000000340)={0x1000000000, 0x401}) 12:59:13 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000010c0)={0x2, 0x4, &(0x7f0000000640)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x70}]}, &(0x7f0000000ec0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newqdisc={0x74, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x44, 0x2, {{0x0, 0x10001, 0x0, 0x1}, [@TCA_NETEM_JITTER64={0xc, 0xb, 0x1ff}, @TCA_NETEM_REORDER={0xc, 0x3, {0x0, 0xe1c6}}, @TCA_NETEM_CORR={0x10, 0x1, {0x6}}]}}}]}, 0x74}}, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$packet(r0, &(0x7f0000000380)="93a70b0100001006ff7f00000800", 0x36, 0x0, 0x0, 0x0) 12:59:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000380)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@dontfrag={{0x14}}], 0x18}, 0x4008000) [ 514.740956][T24256] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 514.768873][T24262] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 12:59:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000380)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@dontfrag={{0x14}}], 0x18}, 0x4008000) [ 514.819661][T24271] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 12:59:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newqdisc={0x74, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x44, 0x2, {{0x0, 0x10001, 0x0, 0x1}, [@TCA_NETEM_JITTER64={0xc, 0xb, 0x1ff}, @TCA_NETEM_REORDER={0xc, 0x3, {0x0, 0xe1c6}}, @TCA_NETEM_CORR={0x10, 0x1, {0x6}}]}}}]}, 0x74}}, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$packet(r0, &(0x7f0000000380)="93a70b0100001006ff7f00000800", 0x36, 0x0, 0x0, 0x0) 12:59:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_lifetime={0x4, 0x4}]}, 0x80}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x4, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @broadcast}, 0x10) getsockopt(r1, 0xfff, 0x3, &(0x7f0000000580)=""/138, &(0x7f0000000400)=0x8a) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x3a68}], 0x6, &(0x7f0000000200)=""/20, 0x31, 0xd571012c}, 0x12c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000640)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f0000000700)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000480)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) setrlimit(0xdbb1d8fec8c9db25, &(0x7f0000000300)={0xa9, 0x800}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, 0x0, 0x0, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX], 0x100000530) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x400) setrlimit(0x2, &(0x7f0000000340)={0x1000000000, 0x401}) 12:59:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000380)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@dontfrag={{0x14}}], 0x18}, 0x4008000) 12:59:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newqdisc={0x74, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x44, 0x2, {{0x0, 0x10001, 0x0, 0x1}, [@TCA_NETEM_JITTER64={0xc, 0xb, 0x1ff}, @TCA_NETEM_REORDER={0xc, 0x3, {0x0, 0xe1c6}}, @TCA_NETEM_CORR={0x10, 0x1, {0x6}}]}}}]}, 0x74}}, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$packet(r0, &(0x7f0000000380)="93a70b0100001006ff7f00000800", 0x36, 0x0, 0x0, 0x0) [ 515.501828][T24283] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 515.522127][T24287] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 12:59:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_lifetime={0x4, 0x4}]}, 0x80}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x4, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @broadcast}, 0x10) getsockopt(r1, 0xfff, 0x3, &(0x7f0000000580)=""/138, &(0x7f0000000400)=0x8a) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x3a68}], 0x6, &(0x7f0000000200)=""/20, 0x31, 0xd571012c}, 0x12c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000640)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f0000000700)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000480)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) setrlimit(0xdbb1d8fec8c9db25, &(0x7f0000000300)={0xa9, 0x800}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, 0x0, 0x0, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX], 0x100000530) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x400) setrlimit(0x2, &(0x7f0000000340)={0x1000000000, 0x401}) 12:59:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000380)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@dontfrag={{0x14}}], 0x18}, 0x4008000) 12:59:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newqdisc={0x74, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x44, 0x2, {{0x0, 0x10001, 0x0, 0x1}, [@TCA_NETEM_JITTER64={0xc, 0xb, 0x1ff}, @TCA_NETEM_REORDER={0xc, 0x3, {0x0, 0xe1c6}}, @TCA_NETEM_CORR={0x10, 0x1, {0x6}}]}}}]}, 0x74}}, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$packet(r0, &(0x7f0000000380)="93a70b0100001006ff7f00000800", 0x36, 0x0, 0x0, 0x0) 12:59:14 executing program 4: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 12:59:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_lifetime={0x4, 0x4}]}, 0x80}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x4, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @broadcast}, 0x10) getsockopt(r1, 0xfff, 0x3, &(0x7f0000000580)=""/138, &(0x7f0000000400)=0x8a) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x3a68}], 0x6, &(0x7f0000000200)=""/20, 0x31, 0xd571012c}, 0x12c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000640)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f0000000700)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000480)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) setrlimit(0xdbb1d8fec8c9db25, &(0x7f0000000300)={0xa9, 0x800}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, 0x0, 0x0, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX], 0x100000530) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x400) setrlimit(0x2, &(0x7f0000000340)={0x1000000000, 0x401}) 12:59:14 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000300)=""/188, 0xbc}, {&(0x7f0000000580)=""/231, 0xe7}], 0x2, 0x0, 0x0) 12:59:14 executing program 4: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 12:59:14 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000300)=""/188, 0xbc}, {&(0x7f0000000580)=""/231, 0xe7}], 0x2, 0x0, 0x0) 12:59:14 executing program 4: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) [ 515.627720][T24295] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 12:59:15 executing program 2: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 12:59:15 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000300)=""/188, 0xbc}, {&(0x7f0000000580)=""/231, 0xe7}], 0x2, 0x0, 0x0) 12:59:15 executing program 4: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 12:59:15 executing program 2: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 12:59:15 executing program 4: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 12:59:15 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000300)=""/188, 0xbc}, {&(0x7f0000000580)=""/231, 0xe7}], 0x2, 0x0, 0x0) 12:59:15 executing program 1: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 12:59:15 executing program 4: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 12:59:15 executing program 5: r0 = memfd_create(&(0x7f0000000200)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\x91\xfdy\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0`\xaa8\xc7\xc8\x9d\xfdA\b\x10\x92(c\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdI\x83\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7 \x1d\xa1\xce\x8b\xac \xe8\x88\xdc\x02\xd7\x04\x9b\x9aL\x9f([4\x81\xf6\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6{\xf0(\xaeW;)\x9f\x9cR\xae\x12G\xd8\xa4y', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003400)={0x3, 0x2, &(0x7f0000003200)=@raw=[@call={0x85, 0x0, 0x0, 0xa3}, @exit], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:15 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000000b40)=[{{&(0x7f0000000500)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@dstopts_2292={{0x10}}, @dstopts_2292={{0x18}}], 0x30}}], 0x2, 0x0) 12:59:15 executing program 1: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 12:59:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 2: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 12:59:15 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000000b40)=[{{&(0x7f0000000500)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@dstopts_2292={{0x10}}, @dstopts_2292={{0x18}}], 0x30}}], 0x2, 0x0) 12:59:15 executing program 1: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 12:59:15 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000000b40)=[{{&(0x7f0000000500)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@dstopts_2292={{0x10}}, @dstopts_2292={{0x18}}], 0x30}}], 0x2, 0x0) 12:59:15 executing program 5: r0 = memfd_create(&(0x7f0000000200)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\x91\xfdy\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0`\xaa8\xc7\xc8\x9d\xfdA\b\x10\x92(c\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdI\x83\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7 \x1d\xa1\xce\x8b\xac \xe8\x88\xdc\x02\xd7\x04\x9b\x9aL\x9f([4\x81\xf6\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6{\xf0(\xaeW;)\x9f\x9cR\xae\x12G\xd8\xa4y', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003400)={0x3, 0x2, &(0x7f0000003200)=@raw=[@call={0x85, 0x0, 0x0, 0xa3}, @exit], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:15 executing program 4: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000060a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000230000/0x3000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f000072a000/0x1000)=nil) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munmap(&(0x7f0000843000/0x3000)=nil, 0x3000) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000c51000/0x2000)=nil) mremap(&(0x7f0000ccc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000b0e000/0x2000)=nil) mremap(&(0x7f0000d61000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 12:59:15 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sync_file_range(r0, 0x0, 0xfffffffffffffff7, 0x0) [ 516.514886][T24337] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:59:15 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001740)=@acquire={0x128, 0x17, 0x8a1, 0x0, 0x0, {{@in=@local}, @in=@empty, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {{@in6=@empty, @in6=@local}, {}, {}, 0x0, 0x0, 0x0, 0x2}}}, 0x128}}, 0x0) 12:59:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 5: r0 = memfd_create(&(0x7f0000000200)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\x91\xfdy\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0`\xaa8\xc7\xc8\x9d\xfdA\b\x10\x92(c\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdI\x83\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7 \x1d\xa1\xce\x8b\xac \xe8\x88\xdc\x02\xd7\x04\x9b\x9aL\x9f([4\x81\xf6\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6{\xf0(\xaeW;)\x9f\x9cR\xae\x12G\xd8\xa4y', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003400)={0x3, 0x2, &(0x7f0000003200)=@raw=[@call={0x85, 0x0, 0x0, 0xa3}, @exit], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:15 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000000b40)=[{{&(0x7f0000000500)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@dstopts_2292={{0x10}}, @dstopts_2292={{0x18}}], 0x30}}], 0x2, 0x0) 12:59:15 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001740)=@acquire={0x128, 0x17, 0x8a1, 0x0, 0x0, {{@in=@local}, @in=@empty, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {{@in6=@empty, @in6=@local}, {}, {}, 0x0, 0x0, 0x0, 0x2}}}, 0x128}}, 0x0) 12:59:15 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sync_file_range(r0, 0x0, 0xfffffffffffffff7, 0x0) 12:59:15 executing program 5: r0 = memfd_create(&(0x7f0000000200)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\x91\xfdy\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0`\xaa8\xc7\xc8\x9d\xfdA\b\x10\x92(c\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdI\x83\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7 \x1d\xa1\xce\x8b\xac \xe8\x88\xdc\x02\xd7\x04\x9b\x9aL\x9f([4\x81\xf6\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6{\xf0(\xaeW;)\x9f\x9cR\xae\x12G\xd8\xa4y', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003400)={0x3, 0x2, &(0x7f0000003200)=@raw=[@call={0x85, 0x0, 0x0, 0xa3}, @exit], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:15 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001740)=@acquire={0x128, 0x17, 0x8a1, 0x0, 0x0, {{@in=@local}, @in=@empty, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {{@in6=@empty, @in6=@local}, {}, {}, 0x0, 0x0, 0x0, 0x2}}}, 0x128}}, 0x0) 12:59:15 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sync_file_range(r0, 0x0, 0xfffffffffffffff7, 0x0) 12:59:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) [ 516.633573][T24363] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 516.651718][T24362] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 12:59:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001740)=@acquire={0x128, 0x17, 0x8a1, 0x0, 0x0, {{@in=@local}, @in=@empty, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {{@in6=@empty, @in6=@local}, {}, {}, 0x0, 0x0, 0x0, 0x2}}}, 0x128}}, 0x0) 12:59:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sync_file_range(r0, 0x0, 0xfffffffffffffff7, 0x0) 12:59:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "16"}]}]}}}, {0x10, 0x1, 0x0, 0x1, @dup_ipv4={{0x8}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}}, 0x0) [ 516.725932][T24375] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 516.733210][T24375] IPv6: NLM_F_CREATE should be set when creating new route [ 516.750417][T24379] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 516.757746][T24379] IPv6: NLM_F_CREATE should be set when creating new route 12:59:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "16"}]}]}}}, {0x10, 0x1, 0x0, 0x1, @dup_ipv4={{0x8}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}}, 0x0) 12:59:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2275, &(0x7f0000000000)=0x40000042) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)) 12:59:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "16"}]}]}}}, {0x10, 0x1, 0x0, 0x1, @dup_ipv4={{0x8}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}}, 0x0) 12:59:15 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2275, &(0x7f0000000000)=0x40000042) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)) [ 516.831068][T24396] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 516.856116][T24397] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 516.863540][T24397] IPv6: NLM_F_CREATE should be set when creating new route 12:59:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2275, &(0x7f0000000000)=0x40000042) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)) 12:59:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) [ 516.874982][T24402] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 12:59:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "16"}]}]}}}, {0x10, 0x1, 0x0, 0x1, @dup_ipv4={{0x8}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}}, 0x0) 12:59:15 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2275, &(0x7f0000000000)=0x40000042) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)) 12:59:15 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2275, &(0x7f0000000000)=0x40000042) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)) 12:59:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000640)=0x1, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x2c, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TUPLE={0x4}]}, 0x2c}}, 0x0) 12:59:15 executing program 4: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil, 0x2) 12:59:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3ff}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x1ff}, &(0x7f0000000100)=0x8) r2 = socket(0x2, 0x80805, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x83, &(0x7f0000000300)={r4, 0xfff}, &(0x7f0000000140)=0xb0) [ 516.954228][T24412] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 516.963357][T24413] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 12:59:15 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2275, &(0x7f0000000000)=0x40000042) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)) 12:59:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000640)=0x1, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x2c, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TUPLE={0x4}]}, 0x2c}}, 0x0) 12:59:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000640)=0x1, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x2c, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TUPLE={0x4}]}, 0x2c}}, 0x0) 12:59:15 executing program 4: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil, 0x2) 12:59:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x3) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="6000000000010101000000000600124000020000440002800c000280050001000000000006000340000000002c00018014000300fc010000000000000000ffff0000000014000400200100000000000000000000000000010000000000000000"], 0x60}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x2c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000400)={'macsec0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000780)={0x0, 0xfffffffffffffe96, &(0x7f0000000280)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000480)={0x0, r8, 0x7, 0x0, 0x20000, 0x80000001}) openat$cgroup_int(r4, &(0x7f0000000700)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000380)=0x8) r10 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r4, r1, 0x9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r10}, 0x1) openat$cgroup_procs(r11, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r12 = openat$cgroup(r11, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@ipv6_getnexthop={0x28, 0x6a, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NHA_ID={0x8}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x28}}, 0x8080) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.swap.events\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r13, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="f39298e2f66ef7c156699ca53f398d1b2aa0ea631740a80d2829ce20", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fddbdf250400000014040180080003000100000408000100", @ANYRES32=r9, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc801}, 0x4000) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r4}, 0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x200, 0x3f, 0x8, 0x2}, {0x5, 0x9, 0x79, 0xfffffff8}, {0xda7, 0x4, 0x20, 0xe25}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800010000000000000000000a00000000000000000000001400050000010000000f0000000000007a71bb39"], 0x30}}, 0x0) 12:59:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000640)=0x1, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x2c, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TUPLE={0x4}]}, 0x2c}}, 0x0) [ 516.995137][T24419] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 12:59:15 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2275, &(0x7f0000000000)=0x40000042) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)) 12:59:15 executing program 4: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil, 0x2) 12:59:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000640)=0x1, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x2c, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TUPLE={0x4}]}, 0x2c}}, 0x0) 12:59:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000640)=0x1, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x2c, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TUPLE={0x4}]}, 0x2c}}, 0x0) 12:59:15 executing program 4: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffa000/0x1000)=nil, 0x2) [ 517.079941][T24439] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 12:59:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3ff}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x1ff}, &(0x7f0000000100)=0x8) r2 = socket(0x2, 0x80805, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x83, &(0x7f0000000300)={r4, 0xfff}, &(0x7f0000000140)=0xb0) 12:59:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{}, 0x11, 0x5, 0xc6}, {{0x0, 0x2710}, 0x11, 0x401}], 0x30) write$char_usb(r0, &(0x7f0000000040)="e2", 0x12d8) 12:59:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) quotactl_fd$Q_SETINFO(r0, 0xffffffff80000602, 0x0, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x8}) 12:59:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000640)=0x1, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x2c, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TUPLE={0x4}]}, 0x2c}}, 0x0) 12:59:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x500, @in6={0xa, 0x0, 0x0, @empty}}]}, 0x70}, 0x1, 0x7}, 0x0) 12:59:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 12:59:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{}, 0x11, 0x5, 0xc6}, {{0x0, 0x2710}, 0x11, 0x401}], 0x30) write$char_usb(r0, &(0x7f0000000040)="e2", 0x12d8) 12:59:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 12:59:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) quotactl_fd$Q_SETINFO(r0, 0xffffffff80000602, 0x0, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x8}) 12:59:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3ff}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x1ff}, &(0x7f0000000100)=0x8) r2 = socket(0x2, 0x80805, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x83, &(0x7f0000000300)={r4, 0xfff}, &(0x7f0000000140)=0xb0) 12:59:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x500, @in6={0xa, 0x0, 0x0, @empty}}]}, 0x70}, 0x1, 0x7}, 0x0) 12:59:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) quotactl_fd$Q_SETINFO(r0, 0xffffffff80000602, 0x0, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x8}) 12:59:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3ff}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x1ff}, &(0x7f0000000100)=0x8) r2 = socket(0x2, 0x80805, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x83, &(0x7f0000000300)={r4, 0xfff}, &(0x7f0000000140)=0xb0) 12:59:17 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{}, 0x11, 0x5, 0xc6}, {{0x0, 0x2710}, 0x11, 0x401}], 0x30) write$char_usb(r0, &(0x7f0000000040)="e2", 0x12d8) 12:59:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 12:59:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) quotactl_fd$Q_SETINFO(r0, 0xffffffff80000602, 0x0, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x8}) 12:59:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x500, @in6={0xa, 0x0, 0x0, @empty}}]}, 0x70}, 0x1, 0x7}, 0x0) 12:59:17 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{}, 0x11, 0x5, 0xc6}, {{0x0, 0x2710}, 0x11, 0x401}], 0x30) write$char_usb(r0, &(0x7f0000000040)="e2", 0x12d8) 12:59:17 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 12:59:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 12:59:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x500, @in6={0xa, 0x0, 0x0, @empty}}]}, 0x70}, 0x1, 0x7}, 0x0) 12:59:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3ff}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x1ff}, &(0x7f0000000100)=0x8) r2 = socket(0x2, 0x80805, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x83, &(0x7f0000000300)={r4, 0xfff}, &(0x7f0000000140)=0xb0) 12:59:17 executing program 4: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x3c1, 0x3, 0x330, 0x170, 0x150, 0x150, 0x170, 0x0, 0x260, 0x238, 0x206, 0x260, 0x238, 0x7fffffe, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'veth1_to_team\x00', 'xfrm0\x00'}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'dummy0\x00', {0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffff7, 0x7}}}, @common=@inet=@ecn={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x390) [ 518.783531][T24498] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 12:59:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3ff}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x1ff}, &(0x7f0000000100)=0x8) r2 = socket(0x2, 0x80805, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x83, &(0x7f0000000300)={r4, 0xfff}, &(0x7f0000000140)=0xb0) 12:59:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x3c1, 0x3, 0x330, 0x170, 0x150, 0x150, 0x170, 0x0, 0x260, 0x238, 0x206, 0x260, 0x238, 0x7fffffe, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'veth1_to_team\x00', 'xfrm0\x00'}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'dummy0\x00', {0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffff7, 0x7}}}, @common=@inet=@ecn={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x390) 12:59:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 12:59:18 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00'}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0x18}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) 12:59:18 executing program 4: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:18 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00'}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0x18}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) 12:59:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x3c1, 0x3, 0x330, 0x170, 0x150, 0x150, 0x170, 0x0, 0x260, 0x238, 0x206, 0x260, 0x238, 0x7fffffe, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'veth1_to_team\x00', 'xfrm0\x00'}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'dummy0\x00', {0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffff7, 0x7}}}, @common=@inet=@ecn={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x390) 12:59:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3ff}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x1ff}, &(0x7f0000000100)=0x8) r2 = socket(0x2, 0x80805, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0x83, &(0x7f0000000300)={r4, 0xfff}, &(0x7f0000000140)=0xb0) 12:59:18 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00'}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0x18}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) 12:59:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x3c1, 0x3, 0x330, 0x170, 0x150, 0x150, 0x170, 0x0, 0x260, 0x238, 0x206, 0x260, 0x238, 0x7fffffe, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'veth1_to_team\x00', 'xfrm0\x00'}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'dummy0\x00', {0x0, 0x0, 0x100, 0x0, 0x0, 0xfffffff7, 0x7}}}, @common=@inet=@ecn={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x390) [ 519.590151][T24516] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 12:59:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 12:59:18 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00'}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0x18}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) [ 519.679247][T24534] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 12:59:19 executing program 4: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 12:59:19 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 0: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 2: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 520.452074][T24544] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 12:59:19 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 4: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 0: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 2: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 520.610472][T24564] loop3: detected capacity change from 0 to 2048 12:59:19 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 12:59:19 executing program 2: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 0: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1, 0x3}, 0x18) r5 = dup(r2) io_uring_setup(0x3450, &(0x7f0000000080)) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@deltaction={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmmsg(r5, &(0x7f0000004f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 12:59:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) [ 520.888678][T24595] team0: Device macvlan2 is already an upper device of the team interface [ 520.949578][T24601] team0: Device macvlan2 is already an upper device of the team interface 12:59:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000004100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, 0x0) socketpair(0x28, 0x4, 0xff, &(0x7f00000000c0)) ioctl$TUNSETNOCSUM(r4, 0x8922, 0x20000000) 12:59:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 12:59:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x304}, "a63ba81f8b867674", "543a53dc105ca222b8db88c34478d0d0", "e4e99417", "381fa753b6c97b54"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000200)=@gcm_256={{0x303}, "b9b499f6f8e24f95", "535e1c436a9b9880c97b19d309175a36b86a1e9b39b5f382bca3f7f4c20338e8", "a319056a", "d9a549de21af260e"}, 0x38) 12:59:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x8000, 0x56eb, 0x1}, 0x48) fsetxattr$security_evm(r0, &(0x7f0000000000), 0x0, 0x2000000, 0x0) 12:59:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 12:59:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 12:59:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x304}, "a63ba81f8b867674", "543a53dc105ca222b8db88c34478d0d0", "e4e99417", "381fa753b6c97b54"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000200)=@gcm_256={{0x303}, "b9b499f6f8e24f95", "535e1c436a9b9880c97b19d309175a36b86a1e9b39b5f382bca3f7f4c20338e8", "a319056a", "d9a549de21af260e"}, 0x38) 12:59:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x8000, 0x56eb, 0x1}, 0x48) fsetxattr$security_evm(r0, &(0x7f0000000000), 0x0, 0x2000000, 0x0) 12:59:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x304}, "a63ba81f8b867674", "543a53dc105ca222b8db88c34478d0d0", "e4e99417", "381fa753b6c97b54"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000200)=@gcm_256={{0x303}, "b9b499f6f8e24f95", "535e1c436a9b9880c97b19d309175a36b86a1e9b39b5f382bca3f7f4c20338e8", "a319056a", "d9a549de21af260e"}, 0x38) 12:59:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x8000, 0x56eb, 0x1}, 0x48) fsetxattr$security_evm(r0, &(0x7f0000000000), 0x0, 0x2000000, 0x0) 12:59:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) [ 521.355443][T24611] team0: Device macvlan2 is already an upper device of the team interface [ 521.513749][T24630] loop3: detected capacity change from 0 to 2048 12:59:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000004100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, 0x0) socketpair(0x28, 0x4, 0xff, &(0x7f00000000c0)) ioctl$TUNSETNOCSUM(r4, 0x8922, 0x20000000) 12:59:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x8000, 0x56eb, 0x1}, 0x48) fsetxattr$security_evm(r0, &(0x7f0000000000), 0x0, 0x2000000, 0x0) 12:59:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 12:59:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x304}, "a63ba81f8b867674", "543a53dc105ca222b8db88c34478d0d0", "e4e99417", "381fa753b6c97b54"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000200)=@gcm_256={{0x303}, "b9b499f6f8e24f95", "535e1c436a9b9880c97b19d309175a36b86a1e9b39b5f382bca3f7f4c20338e8", "a319056a", "d9a549de21af260e"}, 0x38) 12:59:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 12:59:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000004100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, 0x0) socketpair(0x28, 0x4, 0xff, &(0x7f00000000c0)) ioctl$TUNSETNOCSUM(r4, 0x8922, 0x20000000) 12:59:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000004100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, 0x0) socketpair(0x28, 0x4, 0xff, &(0x7f00000000c0)) ioctl$TUNSETNOCSUM(r4, 0x8922, 0x20000000) 12:59:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000004100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, 0x0) socketpair(0x28, 0x4, 0xff, &(0x7f00000000c0)) ioctl$TUNSETNOCSUM(r4, 0x8922, 0x20000000) [ 522.266323][T24634] team0: Device macvlan2 is already an upper device of the team interface 12:59:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000004100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, 0x0) socketpair(0x28, 0x4, 0xff, &(0x7f00000000c0)) ioctl$TUNSETNOCSUM(r4, 0x8922, 0x20000000) 12:59:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000004100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, 0x0) socketpair(0x28, 0x4, 0xff, &(0x7f00000000c0)) ioctl$TUNSETNOCSUM(r4, 0x8922, 0x20000000) [ 522.454811][T24657] loop3: detected capacity change from 0 to 2048 12:59:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:21 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000004100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, 0x0) socketpair(0x28, 0x4, 0xff, &(0x7f00000000c0)) ioctl$TUNSETNOCSUM(r4, 0x8922, 0x20000000) 12:59:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000004100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, 0x0) socketpair(0x28, 0x4, 0xff, &(0x7f00000000c0)) ioctl$TUNSETNOCSUM(r4, 0x8922, 0x20000000) 12:59:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:21 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000004100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, 0x0) socketpair(0x28, 0x4, 0xff, &(0x7f00000000c0)) ioctl$TUNSETNOCSUM(r4, 0x8922, 0x20000000) 12:59:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 523.379853][T24685] loop1: detected capacity change from 0 to 2048 [ 523.404613][T24687] loop3: detected capacity change from 0 to 2048 [ 523.416321][T24681] loop5: detected capacity change from 0 to 2048 [ 523.487060][T24688] loop0: detected capacity change from 0 to 2048 12:59:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 525.044682][T24705] loop1: detected capacity change from 0 to 2048 12:59:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 525.087831][T24713] loop0: detected capacity change from 0 to 2048 [ 525.239184][T24719] loop3: detected capacity change from 0 to 2048 [ 525.266679][T24720] loop5: detected capacity change from 0 to 2048 12:59:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 526.569330][T24733] loop3: detected capacity change from 0 to 2048 12:59:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 526.801988][T24741] loop1: detected capacity change from 0 to 2048 12:59:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 526.977405][T24749] loop0: detected capacity change from 0 to 2048 [ 526.980284][T24750] loop5: detected capacity change from 0 to 2048 12:59:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:26 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) io_setup(0x8, &(0x7f0000000040)=0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, r2}]) 12:59:27 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) io_setup(0x8, &(0x7f0000000040)=0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, r2}]) [ 528.348251][T24764] loop3: detected capacity change from 0 to 2048 12:59:27 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x1411, 0x101, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x18}}, 0x0) 12:59:27 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x1411, 0x101, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x18}}, 0x0) 12:59:27 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) io_setup(0x8, &(0x7f0000000040)=0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, r2}]) 12:59:27 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, 0x0, 0x2bb98205) splice(r0, 0x0, r2, 0x0, 0x4ff9b, 0xf) write(0xffffffffffffffff, 0x0, 0x0) 12:59:27 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x1411, 0x101, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x18}}, 0x0) 12:59:27 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x1411, 0x101, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x18}}, 0x0) 12:59:27 executing program 4: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}, @rumble}) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x802b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x1068) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000100)=""/243) 12:59:27 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, 0x0, 0x2bb98205) splice(r0, 0x0, r2, 0x0, 0x4ff9b, 0xf) write(0xffffffffffffffff, 0x0, 0x0) 12:59:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:27 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, 0x0, 0x2bb98205) splice(r0, 0x0, r2, 0x0, 0x4ff9b, 0xf) write(0xffffffffffffffff, 0x0, 0x0) 12:59:27 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) io_setup(0x8, &(0x7f0000000040)=0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, r2}]) 12:59:27 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x0, 0xe8, 0x2e0, 0x2e0, 0x1f8, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast2, @multicast2}}}, {{@arp={@multicast1, @private, 0x0, 0x0, 0x0, 0x0, {@mac}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'batadv_slave_0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) 12:59:27 executing program 4: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}, @rumble}) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x802b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x1068) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000100)=""/243) 12:59:27 executing program 3: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}, @rumble}) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x802b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x1068) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000100)=""/243) 12:59:27 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, 0x0, 0x2bb98205) splice(r0, 0x0, r2, 0x0, 0x4ff9b, 0xf) write(0xffffffffffffffff, 0x0, 0x0) 12:59:27 executing program 4: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}, @rumble}) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x802b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x1068) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000100)=""/243) 12:59:27 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x7d) syz_emit_ethernet(0xd2, &(0x7f0000000040)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x9c, 0x11, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], {0x0, 0xe22, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "48a0218b5e18924d1daa9268e74fedd2c8a2a913d275e7564902d3f13a287ef9", "785d6bbffbfaf9543ba160c69403a465487d352c9ee7997a57002ae9c6e47b6d442f2f756a91993e9542e889e7cf7118", "add317350284d1cc5d8d00d6ce891743b9653014e80fb7f826a1bf30", {"97d800c897ed102d02002000d03e6c77", "ca5e0ff0a96b6eefdd65b199f135c5e3"}}}}}}}}, 0x0) 12:59:27 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x0, 0xe8, 0x2e0, 0x2e0, 0x1f8, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast2, @multicast2}}}, {{@arp={@multicast1, @private, 0x0, 0x0, 0x0, 0x0, {@mac}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'batadv_slave_0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) 12:59:27 executing program 3: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}, @rumble}) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x802b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x1068) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000100)=""/243) 12:59:27 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x7d) syz_emit_ethernet(0xd2, &(0x7f0000000040)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x9c, 0x11, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], {0x0, 0xe22, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "48a0218b5e18924d1daa9268e74fedd2c8a2a913d275e7564902d3f13a287ef9", "785d6bbffbfaf9543ba160c69403a465487d352c9ee7997a57002ae9c6e47b6d442f2f756a91993e9542e889e7cf7118", "add317350284d1cc5d8d00d6ce891743b9653014e80fb7f826a1bf30", {"97d800c897ed102d02002000d03e6c77", "ca5e0ff0a96b6eefdd65b199f135c5e3"}}}}}}}}, 0x0) 12:59:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) getpeername$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000880)) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) recvmmsg(r5, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000540)=""/102, 0x66}], 0x2}, 0x1}], 0x1, 0x6000, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r6}, 0x10) sendfile(r3, r4, 0x0, 0xef84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=@ipv6_getaddr={0x50, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x1f, 0x0, 0xff}, [@IFA_TARGET_NETNSID={0x8, 0xa, 0x3}, @IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @private0}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x50}}, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x7, 0x2, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r7, &(0x7f0000000140)}, 0x20) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:59:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8b4e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f00000000c0), 0x9) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 12:59:28 executing program 3: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}, @rumble}) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x802b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x1068) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000100)=""/243) 12:59:28 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x0, 0xe8, 0x2e0, 0x2e0, 0x1f8, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast2, @multicast2}}}, {{@arp={@multicast1, @private, 0x0, 0x0, 0x0, 0x0, {@mac}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'batadv_slave_0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) 12:59:28 executing program 4: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}, @rumble}) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x802b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x1068) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000100)=""/243) 12:59:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x7d) syz_emit_ethernet(0xd2, &(0x7f0000000040)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x9c, 0x11, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], {0x0, 0xe22, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "48a0218b5e18924d1daa9268e74fedd2c8a2a913d275e7564902d3f13a287ef9", "785d6bbffbfaf9543ba160c69403a465487d352c9ee7997a57002ae9c6e47b6d442f2f756a91993e9542e889e7cf7118", "add317350284d1cc5d8d00d6ce891743b9653014e80fb7f826a1bf30", {"97d800c897ed102d02002000d03e6c77", "ca5e0ff0a96b6eefdd65b199f135c5e3"}}}}}}}}, 0x0) 12:59:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x7d) syz_emit_ethernet(0xd2, &(0x7f0000000040)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x9c, 0x11, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], {0x0, 0xe22, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "48a0218b5e18924d1daa9268e74fedd2c8a2a913d275e7564902d3f13a287ef9", "785d6bbffbfaf9543ba160c69403a465487d352c9ee7997a57002ae9c6e47b6d442f2f756a91993e9542e889e7cf7118", "add317350284d1cc5d8d00d6ce891743b9653014e80fb7f826a1bf30", {"97d800c897ed102d02002000d03e6c77", "ca5e0ff0a96b6eefdd65b199f135c5e3"}}}}}}}}, 0x0) 12:59:28 executing program 4: unshare(0x4000400) r0 = socket$xdp(0x2c, 0x3, 0x0) bind(r0, 0x0, 0x0) 12:59:28 executing program 3: perf_event_open(&(0x7f0000000000)={0xa, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:59:28 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x0, 0xe8, 0x2e0, 0x2e0, 0x1f8, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast2, @multicast2}}}, {{@arp={@multicast1, @private, 0x0, 0x0, 0x0, 0x0, {@mac}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'batadv_slave_0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) 12:59:28 executing program 4: unshare(0x4000400) r0 = socket$xdp(0x2c, 0x3, 0x0) bind(r0, 0x0, 0x0) 12:59:28 executing program 3: perf_event_open(&(0x7f0000000000)={0xa, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:59:29 executing program 3: perf_event_open(&(0x7f0000000000)={0xa, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:59:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8b4e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f00000000c0), 0x9) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 12:59:29 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000440)={&(0x7f00000002c0)={0x1d, r2}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)={0x4, 0x0, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @can={{}, 0x9, 0x0, 0x0, 0x0, "a38fddef8ec7fe03"}}, 0x48}}, 0x0) 12:59:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8b4e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f00000000c0), 0x9) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 12:59:29 executing program 4: unshare(0x4000400) r0 = socket$xdp(0x2c, 0x3, 0x0) bind(r0, 0x0, 0x0) 12:59:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}]}}, 0x0, 0x26, 0x0, 0xa}, 0x20) 12:59:29 executing program 3: perf_event_open(&(0x7f0000000000)={0xa, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:59:29 executing program 4: unshare(0x4000400) r0 = socket$xdp(0x2c, 0x3, 0x0) bind(r0, 0x0, 0x0) 12:59:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}]}}, 0x0, 0x26, 0x0, 0xa}, 0x20) 12:59:29 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000440)={&(0x7f00000002c0)={0x1d, r2}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)={0x4, 0x0, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @can={{}, 0x9, 0x0, 0x0, 0x0, "a38fddef8ec7fe03"}}, 0x48}}, 0x0) 12:59:29 executing program 4: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1ff}, 0xc) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0x795, 0x0, 0x606, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5, 0xa}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x1}]}) close(r0) perf_event_open(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={0x0}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000400), 0x6e, &(0x7f0000000a80)=[{&(0x7f00000006c0)=""/106, 0x6a}], 0x1, &(0x7f0000000ac0)}, 0x2000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:59:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}]}}, 0x0, 0x26, 0x0, 0xa}, 0x20) 12:59:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8b4e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f00000000c0), 0x9) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 12:59:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8b4e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f00000000c0), 0x9) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 12:59:29 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000440)={&(0x7f00000002c0)={0x1d, r2}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)={0x4, 0x0, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @can={{}, 0x9, 0x0, 0x0, 0x0, "a38fddef8ec7fe03"}}, 0x48}}, 0x0) 12:59:29 executing program 4: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}]}}, 0x0, 0x26, 0x0, 0xa}, 0x20) 12:59:29 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000440)={&(0x7f00000002c0)={0x1d, r2}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)={0x4, 0x0, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @can={{}, 0x9, 0x0, 0x0, 0x0, "a38fddef8ec7fe03"}}, 0x48}}, 0x0) 12:59:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1ff}, 0xc) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0x795, 0x0, 0x606, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5, 0xa}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x1}]}) close(r0) perf_event_open(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={0x0}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000400), 0x6e, &(0x7f0000000a80)=[{&(0x7f00000006c0)=""/106, 0x6a}], 0x1, &(0x7f0000000ac0)}, 0x2000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:59:29 executing program 4: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8b4e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f00000000c0), 0x9) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 12:59:29 executing program 2: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 0: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 2: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 4: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8b4e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f00000000c0), 0x9) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 12:59:29 executing program 0: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1ff}, 0xc) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0x795, 0x0, 0x606, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5, 0xa}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x1}]}) close(r0) perf_event_open(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={0x0}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000400), 0x6e, &(0x7f0000000a80)=[{&(0x7f00000006c0)=""/106, 0x6a}], 0x1, &(0x7f0000000ac0)}, 0x2000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:59:29 executing program 4: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 2: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 1: r0 = socket(0x1d, 0x2, 0x6) bind$bt_hci(r0, 0x0, 0x0) 12:59:29 executing program 1: r0 = socket(0x1d, 0x2, 0x6) bind$bt_hci(r0, 0x0, 0x0) 12:59:29 executing program 1: r0 = socket(0x1d, 0x2, 0x6) bind$bt_hci(r0, 0x0, 0x0) 12:59:29 executing program 0: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 4: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @enum={0x1}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000180)=""/3, 0x3c, 0x3, 0x1}, 0x20) 12:59:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89fc, &(0x7f0000000780)={'erspan0\x00', 0x0}) 12:59:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @enum={0x1}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000180)=""/3, 0x3c, 0x3, 0x1}, 0x20) 12:59:29 executing program 4: select(0x40, &(0x7f0000000080)={0x3227, 0x4, 0x1, 0x7, 0x3, 0x7fffffff, 0x4, 0x1f}, &(0x7f00000000c0)={0x7, 0x101, 0x200, 0xfffffffffffffffe, 0xb93, 0x10001, 0x7ff, 0x80000001}, &(0x7f0000000140)={0x10001, 0x67, 0xaf, 0x1000, 0xfffffffffffff801, 0x8, 0xe3c, 0x7}, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) select(0x40, &(0x7f00000003c0)={0x100, 0x80000001, 0x9, 0x0, 0x1, 0x2, 0x2}, &(0x7f0000000400)={0x0, 0x1, 0x3, 0x40, 0x8000000000000000, 0xd6, 0x81, 0x8000000000000001}, &(0x7f0000000440)={0xf6f, 0x7fffffff, 0xbd3a, 0x3, 0x23, 0x8, 0x7fffffffffffffff, 0xffffffffffffffff}, &(0x7f00000004c0)={r0, r1/1000+10000}) r2 = add_key$keyring(&(0x7f0000000bc0), &(0x7f0000000c00)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000180)='<', 0x1, r3) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc3}, &(0x7f0000000340)={0x0, "1106c22b022644ea2920a750c878b2c69c847a046f35a5cab700583707d644cf02c5f94055cfc4dac2518e2699b07c983e4e93a64646984d17678e4ab33b23b9", 0x10}, 0x48, r2) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)=')^-\x00', r4) 12:59:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1ff}, 0xc) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0x795, 0x0, 0x606, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5, 0xa}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x1}]}) close(r0) perf_event_open(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={0x0}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000400), 0x6e, &(0x7f0000000a80)=[{&(0x7f00000006c0)=""/106, 0x6a}], 0x1, &(0x7f0000000ac0)}, 0x2000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:59:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv6_getroute={0x2c, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_MARK={0x8}, @RTA_IIF={0x8, 0x3, r1}]}, 0x2c}}, 0x0) 12:59:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89fc, &(0x7f0000000780)={'erspan0\x00', 0x0}) 12:59:29 executing program 1: r0 = socket(0x1d, 0x2, 0x6) bind$bt_hci(r0, 0x0, 0x0) 12:59:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @enum={0x1}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000180)=""/3, 0x3c, 0x3, 0x1}, 0x20) 12:59:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'macvtap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x0, 0x2}, [@NDA_LLADDR={0xa, 0x2, @random="8f4c1e94dcc0"}]}, 0x28}}, 0x0) 12:59:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv6_getroute={0x2c, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_MARK={0x8}, @RTA_IIF={0x8, 0x3, r1}]}, 0x2c}}, 0x0) 12:59:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89fc, &(0x7f0000000780)={'erspan0\x00', 0x0}) 12:59:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}, @enum={0x1}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000180)=""/3, 0x3c, 0x3, 0x1}, 0x20) 12:59:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv6_getroute={0x2c, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_MARK={0x8}, @RTA_IIF={0x8, 0x3, r1}]}, 0x2c}}, 0x0) 12:59:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'macvtap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x0, 0x2}, [@NDA_LLADDR={0xa, 0x2, @random="8f4c1e94dcc0"}]}, 0x28}}, 0x0) 12:59:29 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {0xa}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x4, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) 12:59:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89fc, &(0x7f0000000780)={'erspan0\x00', 0x0}) 12:59:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {0xa}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x4, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) 12:59:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r1, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000fc0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) 12:59:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'macvtap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x0, 0x2}, [@NDA_LLADDR={0xa, 0x2, @random="8f4c1e94dcc0"}]}, 0x28}}, 0x0) 12:59:29 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv6_getroute={0x2c, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_MARK={0x8}, @RTA_IIF={0x8, 0x3, r1}]}, 0x2c}}, 0x0) 12:59:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r1, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000fc0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) 12:59:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {0xa}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x4, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) 12:59:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'macvtap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x0, 0x2}, [@NDA_LLADDR={0xa, 0x2, @random="8f4c1e94dcc0"}]}, 0x28}}, 0x0) 12:59:29 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r1, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000fc0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) 12:59:29 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:29 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x24, r1, 0x1, 0x0, 0x0, {0xa}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x4, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) 12:59:29 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:29 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:29 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:29 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:29 executing program 3: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000000240)='./file0\x00', 0x50, &(0x7f0000000880)=ANY=[], 0x1, 0x11fb, &(0x7f00000013c0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x0) 12:59:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r1, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000fc0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) 12:59:29 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:29 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:30 executing program 1: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000080)) 12:59:30 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:30 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 12:59:30 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private1}, 0x20) 12:59:30 executing program 1: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000080)) 12:59:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 12:59:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0xa, 0xff00}}, &(0x7f0000000180)='GPL\x00', 0x2, 0xfd13, &(0x7f0000000000)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x2bd, 0x10, &(0x7f0000000000), 0x1f000000}, 0x48) [ 531.343022][ T26] audit: type=1400 audit(1692449970.016:1075): avc: denied { ioctl } for pid=24990 comm="syz-executor.1" path="socket:[85398]" dev="sockfs" ino=85398 ioctlcmd=0x89ef scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 12:59:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids'}]}, 0x6) 12:59:30 executing program 3: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000000240)='./file0\x00', 0x50, &(0x7f0000000880)=ANY=[], 0x1, 0x11fb, &(0x7f00000013c0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x0) 12:59:30 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private1}, 0x20) 12:59:30 executing program 1: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000080)) 12:59:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0xa, 0xff00}}, &(0x7f0000000180)='GPL\x00', 0x2, 0xfd13, &(0x7f0000000000)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x2bd, 0x10, &(0x7f0000000000), 0x1f000000}, 0x48) 12:59:30 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private1}, 0x20) [ 531.426396][T24987] loop3: detected capacity change from 0 to 8192 12:59:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 12:59:30 executing program 1: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000080)) 12:59:30 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private1}, 0x20) 12:59:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0xa, 0xff00}}, &(0x7f0000000180)='GPL\x00', 0x2, 0xfd13, &(0x7f0000000000)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x2bd, 0x10, &(0x7f0000000000), 0x1f000000}, 0x48) 12:59:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids'}]}, 0x6) 12:59:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids'}]}, 0x6) 12:59:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 12:59:30 executing program 3: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000000240)='./file0\x00', 0x50, &(0x7f0000000880)=ANY=[], 0x1, 0x11fb, &(0x7f00000013c0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x0) 12:59:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0xa, 0xff00}}, &(0x7f0000000180)='GPL\x00', 0x2, 0xfd13, &(0x7f0000000000)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x2bd, 0x10, &(0x7f0000000000), 0x1f000000}, 0x48) 12:59:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids'}]}, 0x6) 12:59:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 12:59:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids'}]}, 0x6) [ 531.636803][T25030] loop3: detected capacity change from 0 to 8192 12:59:30 executing program 0: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000000240)='./file0\x00', 0x50, &(0x7f0000000880)=ANY=[], 0x1, 0x11fb, &(0x7f00000013c0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x0) 12:59:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids'}]}, 0x6) 12:59:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 12:59:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids'}]}, 0x6) 12:59:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000726f736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) 12:59:30 executing program 1: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000000240)='./file0\x00', 0x50, &(0x7f0000000880)=ANY=[], 0x1, 0x11fb, &(0x7f00000013c0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x0) 12:59:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2000002, &(0x7f0000000080)=ANY=[], 0xff, 0x561, &(0x7f00000002c0)="$eJzs3c9vHFcdAPDvjH82desEeoAKSIBCQFHW8aaNql7aXECoqoSoOCAOqbE3lsk6G7LrUptIuH8DSCBxKhL/AAckDkg9ceDGCSFxQEjlgBQgAsVQkAbN7Njd2Lvx1lnvBu/nI43mx9t93+/bzeybfRvPC2BsnYuI7YiYjog3ImK+PJ6US7zSXvLH3b93Z3nn3p3lJLLs9b8lRXl+LDqek3uyrHM2Ir725YhvJQfjNje3bizV67Xb5f5Ca/3WQnNz6+La+tJqbbV2s1q9snjl0ouXX6gOrK1n139+90trr379V7/85Hu/3f7i9/K05sqyznZ8KNMPL243fWovTm4yIl49UrDHz0S5PuRl4DGVRsRHIuIzxfk/HxPFv04A4CTLsvnI5jv3AYCTLi3GwJK0Uo4FzEWaVirtMbxn4lRabzRbF643Nm6utMfKTsdUen2t/u/szMwfvpNfMKxOJdfX6rXFoqwoL/ar+/YvR8SZiPjhzBPFfmW5UV8Z4XUPAIyzJ/f1//+caff/fejyqx4A8H9jdtQJAABDp/8HgHFzbtQJAAAj0Mf3//LH/u1jzwUAGA7j/wAwfvT/ADB+9P8AMFa++tpr+ZLtlPe/Xnlzc+NG482LK7Xmjcr6xnJluXH7VmW10Vgt7tmzflh99Ubj1uLzsfHWQqvWbC00N7eurTc2brauFff1vlabGkqrAICHOXP23d8nEbH90hPFEh1zOeir4WRLR50AMDITo04AGBmzfcH46v87/m+ONQ9gdLrezHu26+aDfvwhgvh/RvBYOf/xfsb/HzwOnAzG/2F8HW38/+WB5wEM35HH/3822DyA4cuyZP+c/9N7RQDAidTv7//vZwcvHb4/0CsRYFQOm8x7IL//AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwAkzFxHfjiStlHOBz0WaVioRT0XE6ZhKrq/Va5ci4uk4GxFTM/n+4qiTBgAeUfqXpJz/6/z8c3P7S6eTf80U64j47k9e/9FbS63W7cX8+N/3js/sTh9W/eB5/c4rCAAcv6L/rpbrji/y9+/dWd5dhpnP3avx33Iq4uWde3eKpV0yGZPFera4ljj1j6Tcb89F+mxETAwg/vbbEfGxbu1PirGR0+XMp53xo4z91FDjpw/ET4uy9jq/+ProAHKBcfPu1Yh4pdv5l8a5Yt39/J8tPqEe3d2r7cp2P/t2OuLvfv5NdImfn/Pn+o3x/K+/cuBgNt8uezvi2clu8ZO9+EmP+M/1Gf+Pn/jUD17uUZa9E3E+usfvjLXQWr+10Nzcuri2vrRaW63drFavLF659OLlF6oLxRj1wu5I9UF/fenC071yy9t/qkf82a7tn9577uf6bP9P//PGNz/9kPhf+Gz39/+ZfPW77q9/3id+vs/4S6d+0XP67jz+So/2d33/Z3dLIy70Gf+9P2+t9PlQAGAImptbN5bq9drtR9rIv4UOop4DG3mKA62wc6NLzX+KY4p1lI2po7+q7yQjTX5y71p1sDV/I69xyM1JB9KK97MsG0g+9wfUrvwNOvTU62l6GJ9NwPH64KQfdSYAAAAAAAAAAAAAAEAvw/gLqv0xd7IsG01rAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOGn+FwAA//+NPdWq") r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee00"/20, @ANYRES32=r4, @ANYBLOB="01000000010051001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="5800000024000b0e0000000000000000ffe40000", @ANYRES32=r4, @ANYBLOB="00002000ffffffff000000000a0001006e6574656d000000280002000000000002008812df00002674000000fdffe1fe0000e2e60c000400"], 0x58}}, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="09059a03580148030c020200c52cf7c25975e00db02f8848eb2b2ff0dac8897c6b118777faffffff3066100cb610c5471d131466321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) [ 531.846563][T25055] loop3: detected capacity change from 0 to 8192 [ 531.857087][T25069] loop5: detected capacity change from 0 to 512 [ 531.870261][T25051] loop0: detected capacity change from 0 to 8192 12:59:30 executing program 3: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000000240)='./file0\x00', 0x50, &(0x7f0000000880)=ANY=[], 0x1, 0x11fb, &(0x7f00000013c0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x0) 12:59:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 12:59:30 executing program 0: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000000240)='./file0\x00', 0x50, &(0x7f0000000880)=ANY=[], 0x1, 0x11fb, &(0x7f00000013c0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x0) 12:59:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0xc}]}, 0x28}}, 0x0) 12:59:30 executing program 1: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000000240)='./file0\x00', 0x50, &(0x7f0000000880)=ANY=[], 0x1, 0x11fb, &(0x7f00000013c0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x0) 12:59:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0xc}]}, 0x28}}, 0x0) [ 531.904070][T25068] loop1: detected capacity change from 0 to 8192 12:59:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0xc}]}, 0x28}}, 0x0) [ 531.955524][T25069] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 531.972155][T25069] ext4 filesystem being mounted at /root/syzkaller-testdir3628382944/syzkaller.grIdLx/582/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 531.988593][T25069] __nla_validate_parse: 13 callbacks suppressed [ 531.988606][T25069] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 12:59:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2000002, &(0x7f0000000080)=ANY=[], 0xff, 0x561, &(0x7f00000002c0)="$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") r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee00"/20, @ANYRES32=r4, @ANYBLOB="01000000010051001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="5800000024000b0e0000000000000000ffe40000", @ANYRES32=r4, @ANYBLOB="00002000ffffffff000000000a0001006e6574656d000000280002000000000002008812df00002674000000fdffe1fe0000e2e60c000400"], 0x58}}, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="09059a03580148030c020200c52cf7c25975e00db02f8848eb2b2ff0dac8897c6b118777faffffff3066100cb610c5471d131466321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 12:59:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0xc}]}, 0x28}}, 0x0) [ 532.035845][T15920] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:59:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f0000000140)={[{@jqfmt_vfsold}, {@resgid={'resgid', 0x3d, 0xee00}}, {@bh}, {@noload}, {@data_err_ignore}, {@usrjquota}]}, 0xfe, 0x43e, &(0x7f00000004c0)="$eJzs3MtvG0UYAPBv7Tz6JKEUSkMLgYKIeCRN+qAHLiCQOICEBIciTiFJq1CnQU2QaBVB4BCOqBJ3xBGJv4ATXBBwQuIKd1SpQrm0cDJaezcxiZ3GiVOX+PeTtp3ZHWvm292xZ2fsBNCxBtN/kogDEfF7RPRVs/8tMFj97/bywsTfywsTSZTLb/2VVMrdWl6YyIvmr9tfzZTLWb63Tr1L70aMl0pTV7L8yPzMByNzV689Pz0zfnHq4tTlsXPnTp863nN27ExL4kzjujXw8eyxo6+9c/2NifPX3/v527S9B7LjtXG0ymD17Nb1VKsra7ODNemkq40NoSnFiEgvV3el//dFMfauHOuLVz9ra+OAHVUul8v1Pp8zi2VgF0ui3S0A2iP/oE+ff/PtLg097gk3X6o+AKVx3862dP+RmYhCVqZ7zfNtKw1GxPnFf75Kt9iheQgAgFrfp+Of5+qN/wrxUE25+7I1lP6IuD8iDkXEAxFxOCIejKiUPRIRDzdZ/9oVkvXjn8KNLQW2Sen478Vsbat2/Lc6+ov+YpY7WIm/O7kwXZo6mZ2ToejuTfOjG9Txwyu/fdHoWO34L93S+vOxYNaOG11rJugmx+fHtxNzrZufRgx01Ys/iXwZJ4mIoxExsMU6pp/55lijY3eOfwMtWGcqfx3xdPX6L8aa+HNJw/XJ0RfOjp0Z2ROlqZMj+V2x3i+/Lr3ZqP5txd8C6fXfV/f+X4m/P9kTMXf12qXKeu1c83Us/fF5w2eard7/PcnblXRPtu+j8fn5K6MRPcnr6/ePrb42z+fl0/iHTtTv/4di9Uw8EhHpTXw8Ih6NiMeytj8eEU9ExIkN4v/p5Sffbz7+DWblWyiNf/JO1z9qr3/zieKlH79rPv5cev1PV1JD2Z7NvP9ttoHbOXcAAADwf1GofAc+KQyvpAuF4eHqd/gPx75CaXZu/tkLsx9enqx+V74/ugv5TFdfzXzoaDY3nOfH1uRPZfPGXxb3VvLDE7OlyXYHDx1uf4P+n/qz2O7WATvO77Wgc+n/0Ln0f+hc+j90Lv0fOle9/v9JG9oB3H0+/6Fz6f/QufR/6Fz6P3Skhr+NL2zrJ/8Suz4RhXuiGbs/0bXpP2axxURv3UPtfmcCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABojX8DAAD//wGN5Qc=") sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 12:59:30 executing program 4: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) 12:59:30 executing program 1: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000000240)='./file0\x00', 0x50, &(0x7f0000000880)=ANY=[], 0x1, 0x11fb, &(0x7f00000013c0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x0) [ 532.079678][T25080] loop1: detected capacity change from 0 to 8192 [ 532.098176][T25094] loop5: detected capacity change from 0 to 512 [ 532.155236][T25094] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 532.166687][T25088] loop0: detected capacity change from 0 to 8192 [ 532.169178][T25094] ext4 filesystem being mounted at /root/syzkaller-testdir3628382944/syzkaller.grIdLx/583/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 532.186784][T25091] loop3: detected capacity change from 0 to 8192 12:59:30 executing program 0: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000000240)='./file0\x00', 0x50, &(0x7f0000000880)=ANY=[], 0x1, 0x11fb, &(0x7f00000013c0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x0) 12:59:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_128={{0x303, 0x38}, "837ad552eed22b08", "e420000021000000000800", '\x00', "0000ff45004fffff"}, 0x28) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x19, 0x0, &(0x7f00000015c0)) 12:59:30 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) creat(0x0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x2008001) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000004000), 0x0) 12:59:30 executing program 1: r0 = syz_io_uring_setup(0x94f, &(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000002a40)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200)=[r2, 0xffffffffffffffff], 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') read$qrtrtun(r3, &(0x7f0000000040)=""/100, 0x64) [ 532.224526][T25094] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 532.257176][T25103] loop1: detected capacity change from 0 to 8192 12:59:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2000002, &(0x7f0000000080)=ANY=[], 0xff, 0x561, &(0x7f00000002c0)="$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") r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee00"/20, @ANYRES32=r4, @ANYBLOB="01000000010051001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="5800000024000b0e0000000000000000ffe40000", @ANYRES32=r4, @ANYBLOB="00002000ffffffff000000000a0001006e6574656d000000280002000000000002008812df00002674000000fdffe1fe0000e2e60c000400"], 0x58}}, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="09059a03580148030c020200c52cf7c25975e00db02f8848eb2b2ff0dac8897c6b118777faffffff3066100cb610c5471d131466321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 12:59:31 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) creat(0x0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x2008001) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000004000), 0x0) 12:59:31 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) creat(0x0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x2008001) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000004000), 0x0) [ 532.339977][T15920] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 532.408799][T25122] loop5: detected capacity change from 0 to 512 12:59:31 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) creat(0x0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x2008001) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x9}) syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000004000), 0x0) [ 532.451947][T25112] loop0: detected capacity change from 0 to 8192 [ 532.463859][T25122] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 12:59:31 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.opaque\x00', &(0x7f00000000c0)='*#\\@\x00', 0x5, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.impure\x00', 0x0, 0x0) [ 532.510381][T25122] ext4 filesystem being mounted at /root/syzkaller-testdir3628382944/syzkaller.grIdLx/584/file0 supports timestamps until 2038-01-19 (0x7fffffff) 12:59:31 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.opaque\x00', &(0x7f00000000c0)='*#\\@\x00', 0x5, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.impure\x00', 0x0, 0x0) [ 532.611537][T25122] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 532.705471][T15920] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:59:31 executing program 4: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) 12:59:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_128={{0x303, 0x38}, "837ad552eed22b08", "e420000021000000000800", '\x00', "0000ff45004fffff"}, 0x28) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x19, 0x0, &(0x7f00000015c0)) 12:59:31 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.opaque\x00', &(0x7f00000000c0)='*#\\@\x00', 0x5, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.impure\x00', 0x0, 0x0) 12:59:31 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.opaque\x00', &(0x7f00000000c0)='*#\\@\x00', 0x5, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.impure\x00', 0x0, 0x0) 12:59:31 executing program 1: r0 = syz_io_uring_setup(0x94f, &(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000002a40)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200)=[r2, 0xffffffffffffffff], 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') read$qrtrtun(r3, &(0x7f0000000040)=""/100, 0x64) 12:59:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2000002, &(0x7f0000000080)=ANY=[], 0xff, 0x561, &(0x7f00000002c0)="$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") r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee00"/20, @ANYRES32=r4, @ANYBLOB="01000000010051001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="5800000024000b0e0000000000000000ffe40000", @ANYRES32=r4, @ANYBLOB="00002000ffffffff000000000a0001006e6574656d000000280002000000000002008812df00002674000000fdffe1fe0000e2e60c000400"], 0x58}}, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="09059a03580148030c020200c52cf7c25975e00db02f8848eb2b2ff0dac8897c6b118777faffffff3066100cb610c5471d131466321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 12:59:31 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.opaque\x00', &(0x7f00000000c0)='*#\\@\x00', 0x5, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.impure\x00', 0x0, 0x0) 12:59:31 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.opaque\x00', &(0x7f00000000c0)='*#\\@\x00', 0x5, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.impure\x00', 0x0, 0x0) 12:59:31 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.opaque\x00', &(0x7f00000000c0)='*#\\@\x00', 0x5, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.impure\x00', 0x0, 0x0) [ 533.016032][T25147] loop5: detected capacity change from 0 to 512 12:59:31 executing program 3: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) [ 533.081374][T25147] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 533.108836][T25147] ext4 filesystem being mounted at /root/syzkaller-testdir3628382944/syzkaller.grIdLx/585/file0 supports timestamps until 2038-01-19 (0x7fffffff) 12:59:31 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) [ 533.143657][T25147] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 12:59:31 executing program 5: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) [ 533.271797][T15920] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:59:32 executing program 4: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) 12:59:32 executing program 1: r0 = syz_io_uring_setup(0x94f, &(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000002a40)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200)=[r2, 0xffffffffffffffff], 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') read$qrtrtun(r3, &(0x7f0000000040)=""/100, 0x64) 12:59:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_128={{0x303, 0x38}, "837ad552eed22b08", "e420000021000000000800", '\x00', "0000ff45004fffff"}, 0x28) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x19, 0x0, &(0x7f00000015c0)) 12:59:32 executing program 3: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) 12:59:32 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) 12:59:32 executing program 1: r0 = syz_io_uring_setup(0x94f, &(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000002a40)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200)=[r2, 0xffffffffffffffff], 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') read$qrtrtun(r3, &(0x7f0000000040)=""/100, 0x64) 12:59:33 executing program 5: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) 12:59:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_128={{0x303, 0x38}, "837ad552eed22b08", "e420000021000000000800", '\x00', "0000ff45004fffff"}, 0x28) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x19, 0x0, &(0x7f00000015c0)) 12:59:33 executing program 2: r0 = syz_io_uring_setup(0x94f, &(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000002a40)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200)=[r2, 0xffffffffffffffff], 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') read$qrtrtun(r3, &(0x7f0000000040)=""/100, 0x64) 12:59:33 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)={0x34, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x34}}, 0x0) 12:59:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000000001, 0x4}) 12:59:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000000001, 0x4}) 12:59:33 executing program 4: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) 12:59:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000000001, 0x4}) 12:59:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x8000000000000001, 0x4}) 12:59:33 executing program 3: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) 12:59:33 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) 12:59:33 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010100", 0x8, 0x11, 0x0, @rand_addr=' \x01\x00', @mcast2={0xff, 0x3}, {[], {0x0, 0x0, 0x8}}}}}}, 0x0) 12:59:34 executing program 5: bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x1, 0x40, 0x12, 0x1f, 0x0, 0xb109, 0x40000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000180), 0xb}, 0x8000, 0x7, 0x0, 0x1, 0x3f, 0x1, 0x3f, 0x0, 0x1f, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0x10, r0, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200), 0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0046686, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xc903, '\x00', 0x0, r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x58, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000680), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0xa, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8e75, 0x0, 0x0, 0x0, 0x9}, [@alu={0x4, 0x1, 0x7, 0x6, 0x9, 0xfffffffffffffff0, 0x10}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}]}, &(0x7f0000000280)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r6, 0x1b, r3, 0x8, &(0x7f0000000540)={0x8, 0xbe}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x9}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)=[r4]}, 0x80) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x408, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x860000000000000, 0x3f}, 0x4, 0xfffffffffffffffc, 0x10001, 0x4, 0x10001, 0x10001, 0x400, 0x0, 0x80000000, 0x0, 0xc02c}, 0x0, 0x7, r4, 0x0) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xfffffffffffffffe) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r8, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x10}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001640)={&(0x7f0000001600)='./file0\x00'}, 0x10) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001680)={0xffffffffffffffff, 0x80, 0x10}, 0xc) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x1d, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x2, 0x1000, &(0x7f0000000540)=""/4096, 0x40f00, 0x1, '\x00', r9, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xa, 0x7, 0xb5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)=[r10, r11, r8, r12, r8, r13, 0xffffffffffffffff]}, 0x80) 12:59:34 executing program 2: r0 = syz_io_uring_setup(0x94f, &(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000002a40)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200)=[r2, 0xffffffffffffffff], 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') read$qrtrtun(r3, &(0x7f0000000040)=""/100, 0x64) 12:59:34 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010100", 0x8, 0x11, 0x0, @rand_addr=' \x01\x00', @mcast2={0xff, 0x3}, {[], {0x0, 0x0, 0x8}}}}}}, 0x0) 12:59:34 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010100", 0x8, 0x11, 0x0, @rand_addr=' \x01\x00', @mcast2={0xff, 0x3}, {[], {0x0, 0x0, 0x8}}}}}}, 0x0) 12:59:34 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010100", 0x8, 0x11, 0x0, @rand_addr=' \x01\x00', @mcast2={0xff, 0x3}, {[], {0x0, 0x0, 0x8}}}}}}, 0x0) 12:59:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x93, 0x0, &(0x7f00000000c0)) [ 535.692536][T25289] loop1: detected capacity change from 0 to 2048 [ 535.820029][T25289] EXT4-fs (loop1): warning: checktime reached, running e2fsck is recommended [ 535.869149][T25289] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 535.915470][ T26] audit: type=1400 audit(1692449974.586:1076): avc: denied { map } for pid=25288 comm="syz-executor.1" path="/root/syzkaller-testdir543595805/syzkaller.4QWIw4/834/bus/cpuset.effective_mems" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 535.956010][T11529] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 536.010748][ T26] audit: type=1400 audit(1692449974.586:1077): avc: denied { execute } for pid=25288 comm="syz-executor.1" path="/root/syzkaller-testdir543595805/syzkaller.4QWIw4/834/bus/cpuset.effective_mems" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 12:59:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$eJzs3d1rW+cZAPDnyFLkONnswWDLrgyDzRAiz4mXbLCLjF2MQQKB7XqJkRWTWbaCJYfYGLawFnpTaEsvCu1NrvuR3vW2H1eF9L/oRUlIGyfUoZTicvThOLbk2LFiufHvB8d+33Ne6XkfnQ+9OucgBXBgDad/MhHHIuK1JGKwOT+JiFy9lI0422i3srxUTKckVlf/+U1Sb/Nweal4eN1jUkealV9HxKcvRxzPbI5bXVicniiXS3PN+mht5upodWHxxJWZianSVGn29Nj4+MkzfzxzercZ5tdK336xePTu63///Qdnv/v/r269+lkSZ+Noc1max24jbTQcw83XJJe+hE/4W7eD9Viyw/b/fU79YGfSXbOvsZfHsRiMvnoJAHiRpeOwVQDggEm8/wPAAdM6D/BweanYmtZODpzr1VmJvXPvrxHR38i/dX2zsSTbvGbXX78OOvAweeLKSBIRQ12IPxwR73z07/fSKbZxHTLXhZgAqf/diIhLQ8Obj//JpnsWduoP22gzvKH+PO7DANr7OB3//Knd+C+zNv6JNuOffJt991k8ff/P3OlCmI7S8d9f1t3btrIu/6ahvmbtZ/UxXy65fKVcSo9tP4+Ikcjl0/pYq3X/5hgjD3540Cn++vHf/Tf+824aP/3/uEXmTjb/5GMmJ2oTu8275d6NiN9k2+XfOv731z8ktBv/XthmjH/8+ZW3Oy1L80/zTafW2DYtJ3s01l29GfG7tuv/8R1tyZb3J47WN4fR1kbRxodfvjXQKf769Z9OafzWZ4G9kK7/ga3zH0rW369Z3XmM2zcHP+m0bHjt7HOn/Ntv/4eSf9XLh5rzrk/UanNjEYeSc5vnn2w9Mp3bqLfap/mP/Lb9/t86/iVttv9027y0zfyzd79+f8Os+4/z7/36n9zR+t9YSJKOi5qFWyvTfZ3ib5H/5y81Now72fx4ve1I8zH149+DrYeJW3SnXJo7HM++NQMAAAAAAAAAAAAAAAAAAAAAAADAzmUi4mgkmcJaOZMpFBq/4f3LGMiUK9Xa8cuV+dnJqP9W9lDkMq2vuhxc932oY83vw2/VT26on4qIX0TEm/nD9XqhWClP9jp5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGg60uH3/1Nf5R+tNvS6lwBA1/X3ugMAwJ7z/g8AB4/3fwA4eLz/A8DBczvT6x4AAHvt2T7/57veDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF5YF86fT6fVR8tLxbQ+eW1hfrpy7cRkqTpdmJkvFoqVuauFqUplqlwqFCszT3u+cqVydTxm56+P1krV2mh1YfHiTGV+tnbxyszEVOliKbcnWQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAzlQXFqcnyuXS3O4LmYhouyjb/Vj7rdAf+6Ib2yucWmmsj64+c7arT/j9vnihnk8htz+68bRCL49KAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8dPwYAAP//WQAx3w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x93, 0x0, &(0x7f00000000c0)) 12:59:34 executing program 2: r0 = syz_io_uring_setup(0x94f, &(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000002a40)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000200)=[r2, 0xffffffffffffffff], 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') read$qrtrtun(r3, &(0x7f0000000040)=""/100, 0x64) 12:59:34 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002000)={{0x14}, [], {0x14}}, 0x28}}, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x11}, &(0x7f0000001fee)='R\brust\xe3c*sgrVex:D0', 0x0) [ 536.267747][T25301] loop1: detected capacity change from 0 to 2048 12:59:35 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002000)={{0x14}, [], {0x14}}, 0x28}}, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x11}, &(0x7f0000001fee)='R\brust\xe3c*sgrVex:D0', 0x0) 12:59:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x50b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x4}, @IFLA_MACVLAN_FLAGS={0x6}]}}}]}, 0x44}}, 0x0) 12:59:35 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) [ 536.379296][T25301] EXT4-fs (loop1): warning: checktime reached, running e2fsck is recommended [ 536.403959][T25301] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 12:59:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x50b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x4}, @IFLA_MACVLAN_FLAGS={0x6}]}}}]}, 0x44}}, 0x0) 12:59:35 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002000)={{0x14}, [], {0x14}}, 0x28}}, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x11}, &(0x7f0000001fee)='R\brust\xe3c*sgrVex:D0', 0x0) 12:59:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x93, 0x0, &(0x7f00000000c0)) 12:59:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="8a", 0x1}], 0x1}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="ffffffef00000000280012000900010076657468"], 0x48}}, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x1, 0x1, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000840)=@newqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) [ 536.477753][T11529] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:59:35 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002000)={{0x14}, [], {0x14}}, 0x28}}, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0x11}, &(0x7f0000001fee)='R\brust\xe3c*sgrVex:D0', 0x0) 12:59:35 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@jmp={0x5, 0x1, 0xc}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:35 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@jmp={0x5, 0x1, 0xc}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_NEWCHAIN={0x90, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_USERDATA={0x6d, 0x3, "91abc12404cf378042f26c43f91f68d8a90767c0bc71f60877974475de3d78ef670efff3f7311209fb8cc158fa18f18591bb90dd1e0464d31ff30a7e5b227e08a2ee0643e735c3cd21b6e743176c8eefd41693bc94e6a273643642d61840a5f275333bb1afbbd583fe"}]}], {0x14}}, 0xe0}}, 0x0) 12:59:35 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@jmp={0x5, 0x1, 0xc}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 536.582413][T25321] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 536.622274][T25325] loop1: detected capacity change from 0 to 2048 12:59:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_NEWCHAIN={0x90, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_USERDATA={0x6d, 0x3, "91abc12404cf378042f26c43f91f68d8a90767c0bc71f60877974475de3d78ef670efff3f7311209fb8cc158fa18f18591bb90dd1e0464d31ff30a7e5b227e08a2ee0643e735c3cd21b6e743176c8eefd41693bc94e6a273643642d61840a5f275333bb1afbbd583fe"}]}], {0x14}}, 0xe0}}, 0x0) 12:59:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x50b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x4}, @IFLA_MACVLAN_FLAGS={0x6}]}}}]}, 0x44}}, 0x0) [ 536.637136][T25321] veth11: entered promiscuous mode [ 536.641406][T25325] EXT4-fs (loop1): warning: checktime reached, running e2fsck is recommended [ 536.642281][T25321] veth11: entered allmulticast mode [ 536.655317][T25325] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 536.727226][T11529] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:59:35 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:35 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@jmp={0x5, 0x1, 0xc}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_NEWCHAIN={0x90, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_USERDATA={0x6d, 0x3, "91abc12404cf378042f26c43f91f68d8a90767c0bc71f60877974475de3d78ef670efff3f7311209fb8cc158fa18f18591bb90dd1e0464d31ff30a7e5b227e08a2ee0643e735c3cd21b6e743176c8eefd41693bc94e6a273643642d61840a5f275333bb1afbbd583fe"}]}], {0x14}}, 0xe0}}, 0x0) 12:59:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$eJzs3d1rW+cZAPDnyFLkONnswWDLrgyDzRAiz4mXbLCLjF2MQQKB7XqJkRWTWbaCJYfYGLawFnpTaEsvCu1NrvuR3vW2H1eF9L/oRUlIGyfUoZTicvThOLbk2LFiufHvB8d+33Ne6XkfnQ+9OucgBXBgDad/MhHHIuK1JGKwOT+JiFy9lI0422i3srxUTKckVlf/+U1Sb/Nweal4eN1jUkealV9HxKcvRxzPbI5bXVicniiXS3PN+mht5upodWHxxJWZianSVGn29Nj4+MkzfzxzercZ5tdK336xePTu63///Qdnv/v/r269+lkSZ+Noc1max24jbTQcw83XJJe+hE/4W7eD9Viyw/b/fU79YGfSXbOvsZfHsRiMvnoJAHiRpeOwVQDggEm8/wPAAdM6D/BweanYmtZODpzr1VmJvXPvrxHR38i/dX2zsSTbvGbXX78OOvAweeLKSBIRQ12IPxwR73z07/fSKbZxHTLXhZgAqf/diIhLQ8Obj//JpnsWduoP22gzvKH+PO7DANr7OB3//Knd+C+zNv6JNuOffJt991k8ff/P3OlCmI7S8d9f1t3btrIu/6ahvmbtZ/UxXy65fKVcSo9tP4+Ikcjl0/pYq3X/5hgjD3540Cn++vHf/Tf+824aP/3/uEXmTjb/5GMmJ2oTu8275d6NiN9k2+XfOv731z8ktBv/XthmjH/8+ZW3Oy1L80/zTafW2DYtJ3s01l29GfG7tuv/8R1tyZb3J47WN4fR1kbRxodfvjXQKf769Z9OafzWZ4G9kK7/ga3zH0rW369Z3XmM2zcHP+m0bHjt7HOn/Ntv/4eSf9XLh5rzrk/UanNjEYeSc5vnn2w9Mp3bqLfap/mP/Lb9/t86/iVttv9027y0zfyzd79+f8Os+4/z7/36n9zR+t9YSJKOi5qFWyvTfZ3ib5H/5y81Now72fx4ve1I8zH149+DrYeJW3SnXJo7HM++NQMAAAAAAAAAAAAAAAAAAAAAAADAzmUi4mgkmcJaOZMpFBq/4f3LGMiUK9Xa8cuV+dnJqP9W9lDkMq2vuhxc932oY83vw2/VT26on4qIX0TEm/nD9XqhWClP9jp5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGg60uH3/1Nf5R+tNvS6lwBA1/X3ugMAwJ7z/g8AB4/3fwA4eLz/A8DBczvT6x4AAHvt2T7/57veDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF5YF86fT6fVR8tLxbQ+eW1hfrpy7cRkqTpdmJkvFoqVuauFqUplqlwqFCszT3u+cqVydTxm56+P1krV2mh1YfHiTGV+tnbxyszEVOliKbcnWQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAzlQXFqcnyuXS3O4LmYhouyjb/Vj7rdAf+6Ib2yucWmmsj64+c7arT/j9vnihnk8htz+68bRCL49KAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8dPwYAAP//WQAx3w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x93, 0x0, &(0x7f00000000c0)) 12:59:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x50b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x4}, @IFLA_MACVLAN_FLAGS={0x6}]}}}]}, 0x44}}, 0x0) 12:59:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="8a", 0x1}], 0x1}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="ffffffef00000000280012000900010076657468"], 0x48}}, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x1, 0x1, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000840)=@newqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 12:59:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_NEWCHAIN={0x90, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_USERDATA={0x6d, 0x3, "91abc12404cf378042f26c43f91f68d8a90767c0bc71f60877974475de3d78ef670efff3f7311209fb8cc158fa18f18591bb90dd1e0464d31ff30a7e5b227e08a2ee0643e735c3cd21b6e743176c8eefd41693bc94e6a273643642d61840a5f275333bb1afbbd583fe"}]}], {0x14}}, 0xe0}}, 0x0) 12:59:35 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) [ 537.291854][T25347] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 537.329855][T25348] loop1: detected capacity change from 0 to 2048 [ 537.336676][T25347] veth13: entered promiscuous mode 12:59:36 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) [ 537.341831][T25347] veth13: entered allmulticast mode 12:59:36 executing program 3: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="8a", 0x1}], 0x1}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="ffffffef00000000280012000900010076657468"], 0x48}}, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x1, 0x1, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000840)=@newqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 12:59:36 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) [ 537.371237][T25348] EXT4-fs (loop1): warning: checktime reached, running e2fsck is recommended [ 537.386917][T25348] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 537.393593][T25366] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 537.418048][T25366] veth15: entered promiscuous mode [ 537.423293][T25366] veth15: entered allmulticast mode [ 537.429428][T11529] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:59:36 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="8a", 0x1}], 0x1}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="ffffffef00000000280012000900010076657468"], 0x48}}, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x1, 0x1, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000840)=@newqdisc={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 12:59:36 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:36 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:36 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:36 executing program 3: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) [ 538.152328][T25373] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 538.168680][T25373] veth17: entered promiscuous mode [ 538.174031][T25373] veth17: entered allmulticast mode 12:59:36 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:37 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:37 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:37 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:37 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:37 executing program 3: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:37 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:38 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:38 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:38 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:38 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}}, 0x0) 12:59:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}}, 0x0) 12:59:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}}, 0x0) 12:59:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}}, 0x0) 12:59:38 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[{0x10}, {0x10, 0x110, 0x1}], 0x20, 0x500}}], 0x2, 0x0) 12:59:38 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x7]}, 0x6) 12:59:38 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[{0x10}, {0x10, 0x110, 0x1}], 0x20, 0x500}}], 0x2, 0x0) 12:59:38 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[{0x10}, {0x10, 0x110, 0x1}], 0x20, 0x500}}], 0x2, 0x0) [ 539.983113][ T26] audit: type=1400 audit(1692449978.656:1078): avc: denied { connect } for pid=25430 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 540.003933][ T26] audit: type=1400 audit(1692449978.656:1079): avc: denied { write } for pid=25430 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 12:59:39 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:39 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:39 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[{0x10}, {0x10, 0x110, 0x1}], 0x20, 0x500}}], 0x2, 0x0) 12:59:39 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x7]}, 0x6) 12:59:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x7]}, 0x6) 12:59:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x7]}, 0x6) 12:59:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x7]}, 0x6) 12:59:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r1, r0) 12:59:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x7]}, 0x6) 12:59:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r1, r0) 12:59:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x7]}, 0x6) 12:59:40 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:40 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:40 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x43, &(0x7f0000000080), 0x4) 12:59:40 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x1e0, &(0x7f000064a000/0x4000)=nil) shmat(r0, &(0x7f0000e35000/0x2000)=nil, 0x2000) munmap(&(0x7f0000e34000/0x1000)=nil, 0xffffffffdf1cbfff) shmget(0x0, 0x2000, 0x88, &(0x7f0000e33000/0x2000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000d7c000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/15) r2 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(r2, 0x3) shmctl$IPC_STAT(r1, 0x2, 0xffffffffffffffff) shmat(r1, &(0x7f0000bd5000/0x3000)=nil, 0x0) r3 = shmget$private(0x0, 0x2000, 0x7ea, &(0x7f0000ffc000/0x2000)=nil) r4 = shmget$private(0x0, 0xc00000, 0x0, &(0x7f00003fd000/0xc00000)=nil) shmctl$IPC_RMID(r4, 0x0) shmat(r0, &(0x7f0000a94000/0x3000)=nil, 0x800) shmat(r4, &(0x7f0000790000/0x6000)=nil, 0x1000) shmat(r3, &(0x7f0000e36000/0x2000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000100)=0xc) r6 = semget$private(0x0, 0x4000000009, 0x82) semop(r6, &(0x7f00000000c0)=[{0x4, 0xffff, 0xe5ce97ab354d96be}, {0x2, 0x2, 0x1800}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x800}], 0x4) semctl$GETZCNT(0x0, 0x0, 0x7, &(0x7f0000000440)=""/61) semctl$GETVAL(0x0, 0x1, 0x5, &(0x7f0000000040)=""/4096) r7 = geteuid() getgroups(0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, 0x0, r7, r8, 0x80, 0x2}, 0x4, 0x7fffffffffffffff, 0xfffffffffffffffe}) semop(0x0, &(0x7f0000000040)=[{0x2, 0xb15, 0x800}], 0x1) semop(r6, &(0x7f0000000440)=[{0x0, 0x3, 0x1800}, {0x2, 0x95}, {0x0, 0x3ff, 0x400}, {0x4, 0x2a5, 0x1800}], 0x4) semop(r6, &(0x7f0000000000)=[{0x3, 0x20, 0x1000}, {0x1, 0xefa, 0x800}, {0x3, 0xff01, 0x1000}, {0x4, 0x7}, {0x4, 0x6, 0x800}, {0x1, 0xfff7, 0x1800}, {0x1, 0x4}, {0x1, 0x2, 0x1800}], 0x8) 12:59:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r1, r0) 12:59:40 executing program 5: prlimit64(0x0, 0x0, 0xffffffffffffffff, 0x0) 12:59:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r1, r0) 12:59:40 executing program 5: prlimit64(0x0, 0x0, 0xffffffffffffffff, 0x0) 12:59:40 executing program 5: prlimit64(0x0, 0x0, 0xffffffffffffffff, 0x0) 12:59:40 executing program 3: setreuid(0xee00, 0x0) keyctl$join(0x1, 0x0) keyctl$session_to_parent(0x12) 12:59:40 executing program 3: setreuid(0xee00, 0x0) keyctl$join(0x1, 0x0) keyctl$session_to_parent(0x12) 12:59:40 executing program 5: prlimit64(0x0, 0x0, 0xffffffffffffffff, 0x0) 12:59:41 executing program 5: setreuid(0xee00, 0x0) keyctl$join(0x1, 0x0) keyctl$session_to_parent(0x12) 12:59:41 executing program 3: setreuid(0xee00, 0x0) keyctl$join(0x1, 0x0) keyctl$session_to_parent(0x12) 12:59:41 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x43, &(0x7f0000000080), 0x4) 12:59:41 executing program 3: setreuid(0xee00, 0x0) keyctl$join(0x1, 0x0) keyctl$session_to_parent(0x12) 12:59:41 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000640)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x14, 0x2, [@TCA_CAKE_AUTORATE={0x12}, @TCA_CAKE_TARGET={0x8}]}}]}, 0x44}}, 0x0) 12:59:41 executing program 0: add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 12:59:41 executing program 2: r0 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000f00c00000000", 0x14) clock_gettime(0x0, &(0x7f0000004d00)) recvmmsg(r0, &(0x7f0000004b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 12:59:41 executing program 5: setreuid(0xee00, 0x0) keyctl$join(0x1, 0x0) keyctl$session_to_parent(0x12) 12:59:41 executing program 0: add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 12:59:41 executing program 2: r0 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000f00c00000000", 0x14) clock_gettime(0x0, &(0x7f0000004d00)) recvmmsg(r0, &(0x7f0000004b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 12:59:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000f00c00000000", 0x14) clock_gettime(0x0, &(0x7f0000004d00)) recvmmsg(r0, &(0x7f0000004b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 12:59:41 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000640)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x14, 0x2, [@TCA_CAKE_AUTORATE={0x12}, @TCA_CAKE_TARGET={0x8}]}}]}, 0x44}}, 0x0) 12:59:41 executing program 5: setreuid(0xee00, 0x0) keyctl$join(0x1, 0x0) keyctl$session_to_parent(0x12) 12:59:41 executing program 0: add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 542.463227][T25504] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 542.530594][T25520] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 12:59:41 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x43, &(0x7f0000000080), 0x4) 12:59:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) pwritev(r0, &(0x7f0000001c00)=[{&(0x7f0000000240)="80fd0f010153", 0x6}], 0x1, 0x0, 0x0) 12:59:41 executing program 0: add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 12:59:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000f00c00000000", 0x14) clock_gettime(0x0, &(0x7f0000004d00)) recvmmsg(r0, &(0x7f0000004b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 12:59:41 executing program 2: r0 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000f00c00000000", 0x14) clock_gettime(0x0, &(0x7f0000004d00)) recvmmsg(r0, &(0x7f0000004b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 12:59:41 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000640)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x14, 0x2, [@TCA_CAKE_AUTORATE={0x12}, @TCA_CAKE_TARGET={0x8}]}}]}, 0x44}}, 0x0) 12:59:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000f00c00000000", 0x14) clock_gettime(0x0, &(0x7f0000004d00)) recvmmsg(r0, &(0x7f0000004b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 12:59:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={@empty, 0x0, r1}) 12:59:42 executing program 2: r0 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000f00c00000000", 0x14) clock_gettime(0x0, &(0x7f0000004d00)) recvmmsg(r0, &(0x7f0000004b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 12:59:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={@empty, 0x0, r1}) [ 543.303283][T25533] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 12:59:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x10000, &(0x7f0000000000)=ANY=[], 0x1, 0x1213, &(0x7f0000001200)="$eJzs3cGLG1UcB/DfdrftNnU3q9ZqF8SHXvQyNjl48rJIC2JAqE1BBWFqExs2m4RNWIiIqyev/hkiPXoQBPEf2IsXz4IX2YvHHsSRZmK3ra2uaDu1fD6X+SUz35n3MmRgwnuZ/Vc/39rsjrNuPokjCwuxNIpI11OkOBKLUfokXrr0w4/PvvX2O29stFrnLqR0fuNi45WU0upz37770bXnv5ucvPTV6jfHY2/tvf1fmj/tnd47s//bxau9ceqN02A4SXm6PBxO8sv9Tjo232u/k487qZi/Oljf7Q9Ho2nKB1dWaqPtznic8sE0bXamaTJMk+1pyj/Ie4OUZVlaqQX/RvvL60VRRBTF0TgWRVEUJ6IWJ+OxWInVqMdaPB5PxJNxKp6K0/F0PBNnZltV3W4AAAAAAAAAAAAAAAAAAAB4tJj/DwAAAAAAAAAAAAAAAAAAANU73Pz/E+b/AwAAAAAAAAAAAAAAAAAAwH3k+f8AAAAAAAAAAAAAAAAAAADwEFguFxdSWo7Y+mynvdMul+X7G93oRT86cTbq8WvMZv+Xyvr8661zZ9PMWry8tTvP7+60F2/PN2Z/J3Brvtid5xtlPt2ePx61W/PNqMepiOLmLg6O37xrfjlefOFG/tMyn0U9vn8/htGPK3Eje5D/uJHSa2+27sivx/rXFZ4XAAAA+A9l6aa73r9n2b3Wl/l/8PvAHffXS7G+VG3fiRhPP9zM+/3OdpXF4rwxFTfjwRQP1SdfTfHH9/6+HeLnLyrs4MLh+3W0+nNxz6Ka6xEP1p+vSwAAAAAAAAAAAPwfHH484NW/2KZ5LeLvR7wCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8zg4cCwAAAAAI87fuzmEDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAArgAAAP//X93enQ==") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) open(&(0x7f00000005c0)='./bus\x00', 0x145842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) 12:59:42 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0x0, 0x1}, 0xe) listen(r0, 0x0) [ 543.408808][ T26] audit: type=1400 audit(1692449982.076:1080): avc: denied { listen } for pid=25547 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 543.420296][T25548] loop3: detected capacity change from 0 to 8192 12:59:42 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x43, &(0x7f0000000080), 0x4) 12:59:42 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000640)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x14, 0x2, [@TCA_CAKE_AUTORATE={0x12}, @TCA_CAKE_TARGET={0x8}]}}]}, 0x44}}, 0x0) 12:59:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={@empty, 0x0, r1}) 12:59:42 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0x0, 0x1}, 0xe) listen(r0, 0x0) 12:59:42 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) pwritev(r0, &(0x7f0000001c00)=[{&(0x7f0000000240)="80fd0f010153", 0x6}], 0x1, 0x0, 0x0) 12:59:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x10000, &(0x7f0000000000)=ANY=[], 0x1, 0x1213, &(0x7f0000001200)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) open(&(0x7f00000005c0)='./bus\x00', 0x145842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) 12:59:42 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0x0, 0x1}, 0xe) listen(r0, 0x0) 12:59:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={@empty, 0x0, r1}) 12:59:42 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0x0, 0x1}, 0xe) listen(r0, 0x0) 12:59:42 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) pwritev(r0, &(0x7f0000001c00)=[{&(0x7f0000000240)="80fd0f010153", 0x6}], 0x1, 0x0, 0x0) 12:59:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x10000, &(0x7f0000000000)=ANY=[], 0x1, 0x1213, &(0x7f0000001200)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) open(&(0x7f00000005c0)='./bus\x00', 0x145842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) [ 544.226379][T25560] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 12:59:42 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0x0, 0x1}, 0xe) listen(r0, 0x0) [ 544.308999][T25558] loop3: detected capacity change from 0 to 8192 [ 544.369563][T25573] loop0: detected capacity change from 0 to 8192 12:59:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x10000, &(0x7f0000000000)=ANY=[], 0x1, 0x1213, &(0x7f0000001200)="$eJzs3cGLG1UcB/DfdrftNnU3q9ZqF8SHXvQyNjl48rJIC2JAqE1BBWFqExs2m4RNWIiIqyev/hkiPXoQBPEf2IsXz4IX2YvHHsSRZmK3ra2uaDu1fD6X+SUz35n3MmRgwnuZ/Vc/39rsjrNuPokjCwuxNIpI11OkOBKLUfokXrr0w4/PvvX2O29stFrnLqR0fuNi45WU0upz37770bXnv5ucvPTV6jfHY2/tvf1fmj/tnd47s//bxau9ceqN02A4SXm6PBxO8sv9Tjo232u/k487qZi/Oljf7Q9Ho2nKB1dWaqPtznic8sE0bXamaTJMk+1pyj/Ie4OUZVlaqQX/RvvL60VRRBTF0TgWRVEUJ6IWJ+OxWInVqMdaPB5PxJNxKp6K0/F0PBNnZltV3W4AAAAAAAAAAAAAAAAAAAB4tJj/DwAAAAAAAAAAAAAAAAAAANU73Pz/E+b/AwAAAAAAAAAAAAAAAAAAwH3k+f8AAAAAAAAAAAAAAAAAAADwEFguFxdSWo7Y+mynvdMul+X7G93oRT86cTbq8WvMZv+Xyvr8661zZ9PMWry8tTvP7+60F2/PN2Z/J3Brvtid5xtlPt2ePx61W/PNqMepiOLmLg6O37xrfjlefOFG/tMyn0U9vn8/htGPK3Eje5D/uJHSa2+27sivx/rXFZ4XAAAA+A9l6aa73r9n2b3Wl/l/8PvAHffXS7G+VG3fiRhPP9zM+/3OdpXF4rwxFTfjwRQP1SdfTfHH9/6+HeLnLyrs4MLh+3W0+nNxz6Ka6xEP1p+vSwAAAAAAAAAAAPwfHH484NW/2KZ5LeLvR7wCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8zg4cCwAAAAAI87fuzmEDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAArgAAAP//X93enQ==") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) open(&(0x7f00000005c0)='./bus\x00', 0x145842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) 12:59:43 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0xffe}, 0x10) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000100", 0x41d) 12:59:43 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0x0, 0x1}, 0xe) listen(r0, 0x0) 12:59:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x10000, &(0x7f0000000000)=ANY=[], 0x1, 0x1213, &(0x7f0000001200)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) open(&(0x7f00000005c0)='./bus\x00', 0x145842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) 12:59:43 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) pwritev(r0, &(0x7f0000001c00)=[{&(0x7f0000000240)="80fd0f010153", 0x6}], 0x1, 0x0, 0x0) 12:59:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x101) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x4) prlimit64(0x0, 0xb6712b7fd41fa6ae, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) ptrace$peek(0x2, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) socket$nl_generic(0x10, 0x3, 0x10) close(0xffffffffffffffff) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000280)="dee19fa948d8cc21676273307462dd12", 0x10}, {&(0x7f0000000480)="923659e39a694ff4419c4441471d5b458ab6348cf9df6dba39dbfeaa8a0eb05f2f78c5ed79be971d53af1425b8ba22b55461f07e671875b8e61319d2f911ee47f4b8cec4abfe9ad774fe074fcbec62c3c163384800816b85ae46bb8790e6b8162a3c895b92ab1c625b08519ab42feee42f92e52bd3aa22d4d95395b6f57b24302059f874fea8fb823a", 0x89}, {&(0x7f0000000540)="17dc5a7b000f3779699ea1580b33553e1a0af0eca48fab8719be3db6ac5511e2ce77fa703d9d2cce975fc0369c0d424e7f950bf3b0fc90a2a2c0ffff9bb3134c3e165d6a05d16930063e0ed85bbcfb06414111807b884654cf1bace0c12ee0d2c221302ca86aaf20a2d51f905b9f26048e8752b17460d82a20c60db139d4d58096a1d94c7253e5f18fe32a4f72d6f4a79a5ead8881623fb9223bf73118f3cb943ea5081f645678613ec081cb5ffbb3", 0xaf}, {&(0x7f00000003c0)="f7d2eed0f3cfaa6bed931a03be22076c12df76172752fc2a272a5094942b3b", 0x1f}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB=')c@\x00'], 0x20, 0x1}, 0x2004000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0xa7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 12:59:43 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0x0, 0x1}, 0xe) listen(r0, 0x0) 12:59:43 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0xffe}, 0x10) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000100", 0x41d) 12:59:43 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0xffe}, 0x10) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000100", 0x41d) 12:59:43 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x3c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c00000010003904000002000000000000000000", @ANYRES32=r3, @ANYBLOB="03040000f5ffffff1c0012800b00010067656e65766500000c00028005000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503460008003e000000020088a8", 0xffdb, 0x0, 0x0, 0x0) 12:59:43 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000040)=0x5c, 0x4) 12:59:43 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0xffe}, 0x10) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000100", 0x41d) [ 545.199157][T25585] loop0: detected capacity change from 0 to 8192 [ 545.315630][T25583] loop3: detected capacity change from 0 to 8192 12:59:44 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000040)=0x5c, 0x4) 12:59:44 executing program 2: r0 = open(&(0x7f0000000100)='./bus\x00', 0x14507e, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000200000006110600000000000c6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1ad}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000800)={@map=r0, r1, 0x26}, 0x10) 12:59:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x10000, &(0x7f0000000000)=ANY=[], 0x1, 0x1213, &(0x7f0000001200)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) open(&(0x7f00000005c0)='./bus\x00', 0x145842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) 12:59:44 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000040)=0x5c, 0x4) 12:59:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x10000, &(0x7f0000000000)=ANY=[], 0x1, 0x1213, &(0x7f0000001200)="$eJzs3cGLG1UcB/DfdrftNnU3q9ZqF8SHXvQyNjl48rJIC2JAqE1BBWFqExs2m4RNWIiIqyev/hkiPXoQBPEf2IsXz4IX2YvHHsSRZmK3ra2uaDu1fD6X+SUz35n3MmRgwnuZ/Vc/39rsjrNuPokjCwuxNIpI11OkOBKLUfokXrr0w4/PvvX2O29stFrnLqR0fuNi45WU0upz37770bXnv5ucvPTV6jfHY2/tvf1fmj/tnd47s//bxau9ceqN02A4SXm6PBxO8sv9Tjo232u/k487qZi/Oljf7Q9Ho2nKB1dWaqPtznic8sE0bXamaTJMk+1pyj/Ie4OUZVlaqQX/RvvL60VRRBTF0TgWRVEUJ6IWJ+OxWInVqMdaPB5PxJNxKp6K0/F0PBNnZltV3W4AAAAAAAAAAAAAAAAAAAB4tJj/DwAAAAAAAAAAAAAAAAAAANU73Pz/E+b/AwAAAAAAAAAAAAAAAAAAwH3k+f8AAAAAAAAAAAAAAAAAAADwEFguFxdSWo7Y+mynvdMul+X7G93oRT86cTbq8WvMZv+Xyvr8661zZ9PMWry8tTvP7+60F2/PN2Z/J3Brvtid5xtlPt2ePx61W/PNqMepiOLmLg6O37xrfjlefOFG/tMyn0U9vn8/htGPK3Eje5D/uJHSa2+27sivx/rXFZ4XAAAA+A9l6aa73r9n2b3Wl/l/8PvAHffXS7G+VG3fiRhPP9zM+/3OdpXF4rwxFTfjwRQP1SdfTfHH9/6+HeLnLyrs4MLh+3W0+nNxz6Ka6xEP1p+vSwAAAAAAAAAAAPwfHH484NW/2KZ5LeLvR7wCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8zg4cCwAAAAAI87fuzmEDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAArgAAAP//X93enQ==") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) open(&(0x7f00000005c0)='./bus\x00', 0x145842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) [ 545.661969][T25612] loop0: detected capacity change from 0 to 8192 [ 545.683594][T25614] loop3: detected capacity change from 0 to 8192 12:59:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x101) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x4) prlimit64(0x0, 0xb6712b7fd41fa6ae, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) ptrace$peek(0x2, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) socket$nl_generic(0x10, 0x3, 0x10) close(0xffffffffffffffff) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000280)="dee19fa948d8cc21676273307462dd12", 0x10}, {&(0x7f0000000480)="923659e39a694ff4419c4441471d5b458ab6348cf9df6dba39dbfeaa8a0eb05f2f78c5ed79be971d53af1425b8ba22b55461f07e671875b8e61319d2f911ee47f4b8cec4abfe9ad774fe074fcbec62c3c163384800816b85ae46bb8790e6b8162a3c895b92ab1c625b08519ab42feee42f92e52bd3aa22d4d95395b6f57b24302059f874fea8fb823a", 0x89}, {&(0x7f0000000540)="17dc5a7b000f3779699ea1580b33553e1a0af0eca48fab8719be3db6ac5511e2ce77fa703d9d2cce975fc0369c0d424e7f950bf3b0fc90a2a2c0ffff9bb3134c3e165d6a05d16930063e0ed85bbcfb06414111807b884654cf1bace0c12ee0d2c221302ca86aaf20a2d51f905b9f26048e8752b17460d82a20c60db139d4d58096a1d94c7253e5f18fe32a4f72d6f4a79a5ead8881623fb9223bf73118f3cb943ea5081f645678613ec081cb5ffbb3", 0xaf}, {&(0x7f00000003c0)="f7d2eed0f3cfaa6bed931a03be22076c12df76172752fc2a272a5094942b3b", 0x1f}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB=')c@\x00'], 0x20, 0x1}, 0x2004000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0xa7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 12:59:44 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000040)=0x5c, 0x4) 12:59:44 executing program 2: r0 = open(&(0x7f0000000100)='./bus\x00', 0x14507e, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000200000006110600000000000c6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1ad}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000800)={@map=r0, r1, 0x26}, 0x10) 12:59:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') lseek(r0, 0x40, 0x0) getdents(r0, 0xffffffffffffffff, 0x18) 12:59:44 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x81) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x1d12, 0x8) sendmsg$unix(r0, &(0x7f0000002580)={&(0x7f0000000000)=@abs, 0x6e, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 12:59:44 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x3c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c00000010003904000002000000000000000000", @ANYRES32=r3, @ANYBLOB="03040000f5ffffff1c0012800b00010067656e65766500000c00028005000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503460008003e000000020088a8", 0xffdb, 0x0, 0x0, 0x0) 12:59:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') lseek(r0, 0x40, 0x0) getdents(r0, 0xffffffffffffffff, 0x18) 12:59:44 executing program 2: r0 = open(&(0x7f0000000100)='./bus\x00', 0x14507e, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000200000006110600000000000c6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1ad}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000800)={@map=r0, r1, 0x26}, 0x10) 12:59:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x101) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x4) prlimit64(0x0, 0xb6712b7fd41fa6ae, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) ptrace$peek(0x2, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) socket$nl_generic(0x10, 0x3, 0x10) close(0xffffffffffffffff) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000280)="dee19fa948d8cc21676273307462dd12", 0x10}, {&(0x7f0000000480)="923659e39a694ff4419c4441471d5b458ab6348cf9df6dba39dbfeaa8a0eb05f2f78c5ed79be971d53af1425b8ba22b55461f07e671875b8e61319d2f911ee47f4b8cec4abfe9ad774fe074fcbec62c3c163384800816b85ae46bb8790e6b8162a3c895b92ab1c625b08519ab42feee42f92e52bd3aa22d4d95395b6f57b24302059f874fea8fb823a", 0x89}, {&(0x7f0000000540)="17dc5a7b000f3779699ea1580b33553e1a0af0eca48fab8719be3db6ac5511e2ce77fa703d9d2cce975fc0369c0d424e7f950bf3b0fc90a2a2c0ffff9bb3134c3e165d6a05d16930063e0ed85bbcfb06414111807b884654cf1bace0c12ee0d2c221302ca86aaf20a2d51f905b9f26048e8752b17460d82a20c60db139d4d58096a1d94c7253e5f18fe32a4f72d6f4a79a5ead8881623fb9223bf73118f3cb943ea5081f645678613ec081cb5ffbb3", 0xaf}, {&(0x7f00000003c0)="f7d2eed0f3cfaa6bed931a03be22076c12df76172752fc2a272a5094942b3b", 0x1f}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB=')c@\x00'], 0x20, 0x1}, 0x2004000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0xa7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 12:59:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') lseek(r0, 0x40, 0x0) getdents(r0, 0xffffffffffffffff, 0x18) 12:59:44 executing program 2: r0 = open(&(0x7f0000000100)='./bus\x00', 0x14507e, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000200000006110600000000000c6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1ad}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000800)={@map=r0, r1, 0x26}, 0x10) 12:59:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') lseek(r0, 0x40, 0x0) getdents(r0, 0xffffffffffffffff, 0x18) 12:59:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x101) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x4) prlimit64(0x0, 0xb6712b7fd41fa6ae, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) ptrace$peek(0x2, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) socket$nl_generic(0x10, 0x3, 0x10) close(0xffffffffffffffff) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000280)="dee19fa948d8cc21676273307462dd12", 0x10}, {&(0x7f0000000480)="923659e39a694ff4419c4441471d5b458ab6348cf9df6dba39dbfeaa8a0eb05f2f78c5ed79be971d53af1425b8ba22b55461f07e671875b8e61319d2f911ee47f4b8cec4abfe9ad774fe074fcbec62c3c163384800816b85ae46bb8790e6b8162a3c895b92ab1c625b08519ab42feee42f92e52bd3aa22d4d95395b6f57b24302059f874fea8fb823a", 0x89}, {&(0x7f0000000540)="17dc5a7b000f3779699ea1580b33553e1a0af0eca48fab8719be3db6ac5511e2ce77fa703d9d2cce975fc0369c0d424e7f950bf3b0fc90a2a2c0ffff9bb3134c3e165d6a05d16930063e0ed85bbcfb06414111807b884654cf1bace0c12ee0d2c221302ca86aaf20a2d51f905b9f26048e8752b17460d82a20c60db139d4d58096a1d94c7253e5f18fe32a4f72d6f4a79a5ead8881623fb9223bf73118f3cb943ea5081f645678613ec081cb5ffbb3", 0xaf}, {&(0x7f00000003c0)="f7d2eed0f3cfaa6bed931a03be22076c12df76172752fc2a272a5094942b3b", 0x1f}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB=')c@\x00'], 0x20, 0x1}, 0x2004000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0xa7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 12:59:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x101) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x4) prlimit64(0x0, 0xb6712b7fd41fa6ae, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) ptrace$peek(0x2, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) socket$nl_generic(0x10, 0x3, 0x10) close(0xffffffffffffffff) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000280)="dee19fa948d8cc21676273307462dd12", 0x10}, {&(0x7f0000000480)="923659e39a694ff4419c4441471d5b458ab6348cf9df6dba39dbfeaa8a0eb05f2f78c5ed79be971d53af1425b8ba22b55461f07e671875b8e61319d2f911ee47f4b8cec4abfe9ad774fe074fcbec62c3c163384800816b85ae46bb8790e6b8162a3c895b92ab1c625b08519ab42feee42f92e52bd3aa22d4d95395b6f57b24302059f874fea8fb823a", 0x89}, {&(0x7f0000000540)="17dc5a7b000f3779699ea1580b33553e1a0af0eca48fab8719be3db6ac5511e2ce77fa703d9d2cce975fc0369c0d424e7f950bf3b0fc90a2a2c0ffff9bb3134c3e165d6a05d16930063e0ed85bbcfb06414111807b884654cf1bace0c12ee0d2c221302ca86aaf20a2d51f905b9f26048e8752b17460d82a20c60db139d4d58096a1d94c7253e5f18fe32a4f72d6f4a79a5ead8881623fb9223bf73118f3cb943ea5081f645678613ec081cb5ffbb3", 0xaf}, {&(0x7f00000003c0)="f7d2eed0f3cfaa6bed931a03be22076c12df76172752fc2a272a5094942b3b", 0x1f}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB=')c@\x00'], 0x20, 0x1}, 0x2004000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0xa7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 12:59:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x101) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x4) prlimit64(0x0, 0xb6712b7fd41fa6ae, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) ptrace$peek(0x2, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) socket$nl_generic(0x10, 0x3, 0x10) close(0xffffffffffffffff) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000280)="dee19fa948d8cc21676273307462dd12", 0x10}, {&(0x7f0000000480)="923659e39a694ff4419c4441471d5b458ab6348cf9df6dba39dbfeaa8a0eb05f2f78c5ed79be971d53af1425b8ba22b55461f07e671875b8e61319d2f911ee47f4b8cec4abfe9ad774fe074fcbec62c3c163384800816b85ae46bb8790e6b8162a3c895b92ab1c625b08519ab42feee42f92e52bd3aa22d4d95395b6f57b24302059f874fea8fb823a", 0x89}, {&(0x7f0000000540)="17dc5a7b000f3779699ea1580b33553e1a0af0eca48fab8719be3db6ac5511e2ce77fa703d9d2cce975fc0369c0d424e7f950bf3b0fc90a2a2c0ffff9bb3134c3e165d6a05d16930063e0ed85bbcfb06414111807b884654cf1bace0c12ee0d2c221302ca86aaf20a2d51f905b9f26048e8752b17460d82a20c60db139d4d58096a1d94c7253e5f18fe32a4f72d6f4a79a5ead8881623fb9223bf73118f3cb943ea5081f645678613ec081cb5ffbb3", 0xaf}, {&(0x7f00000003c0)="f7d2eed0f3cfaa6bed931a03be22076c12df76172752fc2a272a5094942b3b", 0x1f}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB=')c@\x00'], 0x20, 0x1}, 0x2004000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0xa7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 12:59:45 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x3c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c00000010003904000002000000000000000000", @ANYRES32=r3, @ANYBLOB="03040000f5ffffff1c0012800b00010067656e65766500000c00028005000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503460008003e000000020088a8", 0xffdb, 0x0, 0x0, 0x0) 12:59:45 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x3c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c00000010003904000002000000000000000000", @ANYRES32=r3, @ANYBLOB="03040000f5ffffff1c0012800b00010067656e65766500000c00028005000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503460008003e000000020088a8", 0xffdb, 0x0, 0x0, 0x0) 12:59:47 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x3c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c00000010003904000002000000000000000000", @ANYRES32=r3, @ANYBLOB="03040000f5ffffff1c0012800b00010067656e65766500000c00028005000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503460008003e000000020088a8", 0xffdb, 0x0, 0x0, 0x0) 12:59:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x101) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x4) prlimit64(0x0, 0xb6712b7fd41fa6ae, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) ptrace$peek(0x2, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) socket$nl_generic(0x10, 0x3, 0x10) close(0xffffffffffffffff) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000280)="dee19fa948d8cc21676273307462dd12", 0x10}, {&(0x7f0000000480)="923659e39a694ff4419c4441471d5b458ab6348cf9df6dba39dbfeaa8a0eb05f2f78c5ed79be971d53af1425b8ba22b55461f07e671875b8e61319d2f911ee47f4b8cec4abfe9ad774fe074fcbec62c3c163384800816b85ae46bb8790e6b8162a3c895b92ab1c625b08519ab42feee42f92e52bd3aa22d4d95395b6f57b24302059f874fea8fb823a", 0x89}, {&(0x7f0000000540)="17dc5a7b000f3779699ea1580b33553e1a0af0eca48fab8719be3db6ac5511e2ce77fa703d9d2cce975fc0369c0d424e7f950bf3b0fc90a2a2c0ffff9bb3134c3e165d6a05d16930063e0ed85bbcfb06414111807b884654cf1bace0c12ee0d2c221302ca86aaf20a2d51f905b9f26048e8752b17460d82a20c60db139d4d58096a1d94c7253e5f18fe32a4f72d6f4a79a5ead8881623fb9223bf73118f3cb943ea5081f645678613ec081cb5ffbb3", 0xaf}, {&(0x7f00000003c0)="f7d2eed0f3cfaa6bed931a03be22076c12df76172752fc2a272a5094942b3b", 0x1f}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB=')c@\x00'], 0x20, 0x1}, 0x2004000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0xa7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 12:59:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x101) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x4) prlimit64(0x0, 0xb6712b7fd41fa6ae, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) ptrace$peek(0x2, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) socket$nl_generic(0x10, 0x3, 0x10) close(0xffffffffffffffff) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000280)="dee19fa948d8cc21676273307462dd12", 0x10}, {&(0x7f0000000480)="923659e39a694ff4419c4441471d5b458ab6348cf9df6dba39dbfeaa8a0eb05f2f78c5ed79be971d53af1425b8ba22b55461f07e671875b8e61319d2f911ee47f4b8cec4abfe9ad774fe074fcbec62c3c163384800816b85ae46bb8790e6b8162a3c895b92ab1c625b08519ab42feee42f92e52bd3aa22d4d95395b6f57b24302059f874fea8fb823a", 0x89}, {&(0x7f0000000540)="17dc5a7b000f3779699ea1580b33553e1a0af0eca48fab8719be3db6ac5511e2ce77fa703d9d2cce975fc0369c0d424e7f950bf3b0fc90a2a2c0ffff9bb3134c3e165d6a05d16930063e0ed85bbcfb06414111807b884654cf1bace0c12ee0d2c221302ca86aaf20a2d51f905b9f26048e8752b17460d82a20c60db139d4d58096a1d94c7253e5f18fe32a4f72d6f4a79a5ead8881623fb9223bf73118f3cb943ea5081f645678613ec081cb5ffbb3", 0xaf}, {&(0x7f00000003c0)="f7d2eed0f3cfaa6bed931a03be22076c12df76172752fc2a272a5094942b3b", 0x1f}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB=')c@\x00'], 0x20, 0x1}, 0x2004000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0xa7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 12:59:47 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x101) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x4) prlimit64(0x0, 0xb6712b7fd41fa6ae, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) ptrace$peek(0x2, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) socket$nl_generic(0x10, 0x3, 0x10) close(0xffffffffffffffff) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000280)="dee19fa948d8cc21676273307462dd12", 0x10}, {&(0x7f0000000480)="923659e39a694ff4419c4441471d5b458ab6348cf9df6dba39dbfeaa8a0eb05f2f78c5ed79be971d53af1425b8ba22b55461f07e671875b8e61319d2f911ee47f4b8cec4abfe9ad774fe074fcbec62c3c163384800816b85ae46bb8790e6b8162a3c895b92ab1c625b08519ab42feee42f92e52bd3aa22d4d95395b6f57b24302059f874fea8fb823a", 0x89}, {&(0x7f0000000540)="17dc5a7b000f3779699ea1580b33553e1a0af0eca48fab8719be3db6ac5511e2ce77fa703d9d2cce975fc0369c0d424e7f950bf3b0fc90a2a2c0ffff9bb3134c3e165d6a05d16930063e0ed85bbcfb06414111807b884654cf1bace0c12ee0d2c221302ca86aaf20a2d51f905b9f26048e8752b17460d82a20c60db139d4d58096a1d94c7253e5f18fe32a4f72d6f4a79a5ead8881623fb9223bf73118f3cb943ea5081f645678613ec081cb5ffbb3", 0xaf}, {&(0x7f00000003c0)="f7d2eed0f3cfaa6bed931a03be22076c12df76172752fc2a272a5094942b3b", 0x1f}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB=')c@\x00'], 0x20, 0x1}, 0x2004000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0xa7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 549.718156][T25686] ================================================================== [ 549.726246][T25686] BUG: KCSAN: data-race in shmem_add_to_page_cache / shmem_get_folio_gfp [ 549.734735][T25686] [ 549.737038][T25686] read-write to 0xffff8881250c0870 of 8 bytes by task 25680 on cpu 0: [ 549.745167][T25686] shmem_add_to_page_cache+0x40a/0x510 [ 549.750607][T25686] shmem_get_folio_gfp+0x923/0x1200 [ 549.755783][T25686] shmem_fault+0xe6/0x3f0 [ 549.760093][T25686] handle_mm_fault+0x1224/0x2c10 [ 549.765188][T25686] exc_page_fault+0x24d/0x650 [ 549.769851][T25686] asm_exc_page_fault+0x26/0x30 [ 549.774683][T25686] rep_movs_alternative+0x30/0xb0 [ 549.779694][T25686] _copy_from_user+0x80/0xd0 [ 549.784265][T25686] copy_msghdr_from_user+0x54/0x2a0 [ 549.789446][T25686] do_recvmmsg+0x290/0x720 [ 549.793851][T25686] __x64_sys_recvmmsg+0xe2/0x160 [ 549.798770][T25686] do_syscall_64+0x41/0xc0 [ 549.803164][T25686] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 549.809040][T25686] [ 549.811344][T25686] read to 0xffff8881250c0870 of 8 bytes by task 25686 on cpu 1: [ 549.818947][T25686] shmem_get_folio_gfp+0xe1e/0x1200 [ 549.824125][T25686] shmem_fault+0xe6/0x3f0 [ 549.828436][T25686] handle_mm_fault+0x1224/0x2c10 [ 549.833369][T25686] __get_user_pages+0x42e/0xd20 [ 549.838208][T25686] __mm_populate+0x23b/0x360 [ 549.842834][T25686] __se_sys_remap_file_pages+0x447/0x580 [ 549.848458][T25686] __x64_sys_remap_file_pages+0x67/0x80 [ 549.854017][T25686] do_syscall_64+0x41/0xc0 [ 549.858415][T25686] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 549.864298][T25686] [ 549.866599][T25686] value changed: 0x00000000000000fd -> 0x00000000000000fe [ 549.873685][T25686] [ 549.875989][T25686] Reported by Kernel Concurrency Sanitizer on: [ 549.882111][T25686] CPU: 1 PID: 25686 Comm: syz-executor.0 Not tainted 6.5.0-rc6-syzkaller-00225-gaa9ea98cca3a #0 [ 549.892503][T25686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 549.902540][T25686] ================================================================== 12:59:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x101) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x4) prlimit64(0x0, 0xb6712b7fd41fa6ae, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(r4, 0x10, &(0x7f00000000c0)) ptrace$peek(0x2, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) socket$nl_generic(0x10, 0x3, 0x10) close(0xffffffffffffffff) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r5) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000280)="dee19fa948d8cc21676273307462dd12", 0x10}, {&(0x7f0000000480)="923659e39a694ff4419c4441471d5b458ab6348cf9df6dba39dbfeaa8a0eb05f2f78c5ed79be971d53af1425b8ba22b55461f07e671875b8e61319d2f911ee47f4b8cec4abfe9ad774fe074fcbec62c3c163384800816b85ae46bb8790e6b8162a3c895b92ab1c625b08519ab42feee42f92e52bd3aa22d4d95395b6f57b24302059f874fea8fb823a", 0x89}, {&(0x7f0000000540)="17dc5a7b000f3779699ea1580b33553e1a0af0eca48fab8719be3db6ac5511e2ce77fa703d9d2cce975fc0369c0d424e7f950bf3b0fc90a2a2c0ffff9bb3134c3e165d6a05d16930063e0ed85bbcfb06414111807b884654cf1bace0c12ee0d2c221302ca86aaf20a2d51f905b9f26048e8752b17460d82a20c60db139d4d58096a1d94c7253e5f18fe32a4f72d6f4a79a5ead8881623fb9223bf73118f3cb943ea5081f645678613ec081cb5ffbb3", 0xaf}, {&(0x7f00000003c0)="f7d2eed0f3cfaa6bed931a03be22076c12df76172752fc2a272a5094942b3b", 0x1f}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB=')c@\x00'], 0x20, 0x1}, 0x2004000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0xa7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 12:59:48 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f0000000580)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x2, 0x1, 0xa8}], {0x95, 0x0, 0x70}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f0000000580)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x2, 0x1, 0xa8}], {0x95, 0x0, 0x70}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}]}, 0x20}}, 0x0) 12:59:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}]}, 0x20}}, 0x0) 12:59:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f0000000580)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x2, 0x1, 0xa8}], {0x95, 0x0, 0x70}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}]}, 0x20}}, 0x0) 12:59:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f0000000580)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x2, 0x1, 0xa8}], {0x95, 0x0, 0x70}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:49 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x3c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c00000010003904000002000000000000000000", @ANYRES32=r3, @ANYBLOB="03040000f5ffffff1c0012800b00010067656e65766500000c00028005000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503460008003e000000020088a8", 0xffdb, 0x0, 0x0, 0x0) 12:59:49 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x3c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c00000010003904000002000000000000000000", @ANYRES32=r3, @ANYBLOB="03040000f5ffffff1c0012800b00010067656e65766500000c00028005000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503460008003e000000020088a8", 0xffdb, 0x0, 0x0, 0x0) 12:59:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}]}, 0x20}}, 0x0) 12:59:49 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x3c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c00000010003904000002000000000000000000", @ANYRES32=r3, @ANYBLOB="03040000f5ffffff1c0012800b00010067656e65766500000c00028005000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503460008003e000000020088a8", 0xffdb, 0x0, 0x0, 0x0) 12:59:49 executing program 1: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, 0x0, 0x0) write$nci(r0, 0x0, 0x0) r1 = open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r1, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xa, 0x11, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={0x14, 0x10, 0x701, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r2) 12:59:49 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x0, 0x0, 0x0, 0x40}, 0x48) 12:59:49 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x3c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c00000010003904000002000000000000000000", @ANYRES32=r3, @ANYBLOB="03040000f5ffffff1c0012800b00010067656e65766500000c00028005000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503460008003e000000020088a8", 0xffdb, 0x0, 0x0, 0x0) 12:59:49 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 12:59:49 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x0, 0x0, 0x0, 0x40}, 0x48) 12:59:49 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x8}, 0xe) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x76, &(0x7f0000000240)={r1}, 0x8) 12:59:49 executing program 1: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, 0x0, 0x0) write$nci(r0, 0x0, 0x0) r1 = open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r1, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xa, 0x11, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={0x14, 0x10, 0x701, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r2) 12:59:49 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 12:59:49 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x8}, 0xe) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x76, &(0x7f0000000240)={r1}, 0x8) 12:59:50 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x3c}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c00000010003904000002000000000000000000", @ANYRES32=r3, @ANYBLOB="03040000f5ffffff1c0012800b00010067656e65766500000c00028005000d0001"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="0503460008003e000000020088a8", 0xffdb, 0x0, 0x0, 0x0) 12:59:50 executing program 1: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, 0x0, 0x0) write$nci(r0, 0x0, 0x0) r1 = open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r1, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xa, 0x11, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={0x14, 0x10, 0x701, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r2) 12:59:50 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 12:59:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x0, 0x0, 0x0, 0x40}, 0x48) 12:59:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x8}, 0xe) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x76, &(0x7f0000000240)={r1}, 0x8) 12:59:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x0, 0x0, 0x0, 0x40}, 0x48) 12:59:50 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 12:59:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, 0x8}, 0xe) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x76, &(0x7f0000000240)={r1}, 0x8) 12:59:50 executing program 1: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, 0x0, 0x0) write$nci(r0, 0x0, 0x0) r1 = open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r1, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xa, 0x11, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={0x14, 0x10, 0x701, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r2) 12:59:50 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 12:59:50 executing program 0: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, 0x0, 0x0) write$nci(r0, 0x0, 0x0) r1 = open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r1, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xa, 0x11, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={0x14, 0x10, 0x701, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r2) 12:59:50 executing program 3: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000040)={0x0, 0x8}, 0x10) 12:59:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000440)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @random="b7a3f602addd"}]}, 0x40}}, 0x0) 12:59:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@newlink={0x38, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x40483}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) bind$packet(r0, &(0x7f0000000440)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="98d40000849d"}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="4103092cc1f7480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 12:59:50 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0x75d3, 0x4) 12:59:50 executing program 3: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000040)={0x0, 0x8}, 0x10) 12:59:50 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 12:59:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000440)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @random="b7a3f602addd"}]}, 0x40}}, 0x0) 12:59:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@newlink={0x38, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x40483}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) bind$packet(r0, &(0x7f0000000440)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="98d40000849d"}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="4103092cc1f7480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 12:59:50 executing program 0: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, 0x0, 0x0) write$nci(r0, 0x0, 0x0) r1 = open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r1, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xa, 0x11, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={0x14, 0x10, 0x701, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r2) 12:59:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000440)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @random="b7a3f602addd"}]}, 0x40}}, 0x0) 12:59:50 executing program 3: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000040)={0x0, 0x8}, 0x10) 12:59:50 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 12:59:50 executing program 0: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, 0x0, 0x0) write$nci(r0, 0x0, 0x0) r1 = open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r1, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) open(0x0, 0x802, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xa, 0x11, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={0x14, 0x10, 0x701, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r2) 12:59:50 executing program 3: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000040)={0x0, 0x8}, 0x10) 12:59:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@newlink={0x38, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x40483}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) bind$packet(r0, &(0x7f0000000440)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="98d40000849d"}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="4103092cc1f7480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 12:59:51 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0x75d3, 0x4) 12:59:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000440)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @random="b7a3f602addd"}]}, 0x40}}, 0x0) 12:59:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000440)={@void, @void, @eth={@broadcast, @broadcast, @val, {@ipv6={0x86dd, @udp={0x0, 0x6, "2321a1", 0x10, 0x4, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}}, 0x4e) 12:59:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}]}}, 0x0, 0x3a, 0x0, 0x1}, 0x20) 12:59:51 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x38, 0x2) 12:59:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@newlink={0x38, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x40483}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x38}}, 0x0) bind$packet(r0, &(0x7f0000000440)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="98d40000849d"}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="4103092cc1f7480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 12:59:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}]}}, 0x0, 0x3a, 0x0, 0x1}, 0x20) 12:59:51 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x10) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6611) 12:59:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ICV_LEN={0x5, 0x3, 0xf}]}}}]}, 0x3c}}, 0x0) 12:59:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x6c, r1, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x6c}}, 0x0) 12:59:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}]}}, 0x0, 0x3a, 0x0, 0x1}, 0x20) 12:59:51 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x10) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6611) [ 552.681899][T25826] tipc: Started in network mode [ 552.686858][T25826] tipc: Node identity 00000000000000000000ffffe0000002, cluster identity 4711 [ 552.695854][T25826] tipc: Enabling of bearer rejected, failed to enable media 12:59:52 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0x75d3, 0x4) 12:59:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}]}}, 0x0, 0x3a, 0x0, 0x1}, 0x20) 12:59:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ICV_LEN={0x5, 0x3, 0xf}]}}}]}, 0x3c}}, 0x0) 12:59:52 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x10) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6611) 12:59:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x6c, r1, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x6c}}, 0x0) 12:59:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000440)={@void, @void, @eth={@broadcast, @broadcast, @val, {@ipv6={0x86dd, @udp={0x0, 0x6, "2321a1", 0x10, 0x4, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}}, 0x4e) 12:59:52 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x10) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6611) 12:59:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ICV_LEN={0x5, 0x3, 0xf}]}}}]}, 0x3c}}, 0x0) 12:59:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000440)={@void, @void, @eth={@broadcast, @broadcast, @val, {@ipv6={0x86dd, @udp={0x0, 0x6, "2321a1", 0x10, 0x4, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}}, 0x4e) 12:59:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001180)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}]}]}, 0x24}}, 0x0) 12:59:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x6c, r1, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x6c}}, 0x0) 12:59:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001180)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}]}]}, 0x24}}, 0x0) [ 553.503179][T25837] tipc: Enabling of bearer rejected, failed to enable media [ 553.557871][T25852] tipc: Enabling of bearer rejected, failed to enable media 12:59:53 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0x75d3, 0x4) 12:59:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ICV_LEN={0x5, 0x3, 0xf}]}}}]}, 0x3c}}, 0x0) 12:59:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001180)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}]}]}, 0x24}}, 0x0) 12:59:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x6c, r1, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x6c}}, 0x0) 12:59:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000440)={@void, @void, @eth={@broadcast, @broadcast, @val, {@ipv6={0x86dd, @udp={0x0, 0x6, "2321a1", 0x10, 0x4, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}}, 0x4e) 12:59:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000440)={@void, @void, @eth={@broadcast, @broadcast, @val, {@ipv6={0x86dd, @udp={0x0, 0x6, "2321a1", 0x10, 0x4, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}}, 0x4e) 12:59:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001180)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}]}]}, 0x24}}, 0x0) 12:59:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x3e}]}, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:53 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1452fe, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCINQ(r1, 0x5452, &(0x7f0000000280)) [ 554.345826][T25860] tipc: Enabling of bearer rejected, failed to enable media 12:59:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x3e}]}, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000440)={@void, @void, @eth={@broadcast, @broadcast, @val, {@ipv6={0x86dd, @udp={0x0, 0x6, "2321a1", 0x10, 0x4, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}}, 0x4e) 12:59:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x61, 0x1e]}}, &(0x7f0000000080)=""/241, 0x36, 0xf1, 0x1}, 0x20) 12:59:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x3e}]}, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000440)={@void, @void, @eth={@broadcast, @broadcast, @val, {@ipv6={0x86dd, @udp={0x0, 0x6, "2321a1", 0x10, 0x4, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}}, 0x4e) 12:59:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x61, 0x1e]}}, &(0x7f0000000080)=""/241, 0x36, 0xf1, 0x1}, 0x20) 12:59:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001100010000005c99971935c8254ac0721d"], 0x20}}, 0x0) 12:59:53 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1452fe, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCINQ(r1, 0x5452, &(0x7f0000000280)) 12:59:53 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r1, 0x0, '\x00\x00\b', "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"}}, 0x110) 12:59:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x3e}]}, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:59:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x61, 0x1e]}}, &(0x7f0000000080)=""/241, 0x36, 0xf1, 0x1}, 0x20) 12:59:53 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r1, 0x0, '\x00\x00\b', "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"}}, 0x110) 12:59:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x61, 0x1e]}}, &(0x7f0000000080)=""/241, 0x36, 0xf1, 0x1}, 0x20) 12:59:53 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) read$usbmon(r0, &(0x7f0000000100)=""/49, 0x31) 12:59:53 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1452fe, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCINQ(r1, 0x5452, &(0x7f0000000280)) 12:59:53 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) read$usbmon(r0, &(0x7f0000000100)=""/49, 0x31) [ 555.257357][T25884] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.337961][T25884] bridge_slave_0 (unregistering): left allmulticast mode [ 555.345059][T25884] bridge_slave_0 (unregistering): left promiscuous mode [ 555.352270][T25884] bridge0: port 1(bridge_slave_0) entered disabled state 12:59:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001100010000005c99971935c8254ac0721d"], 0x20}}, 0x0) 12:59:54 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1452fe, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCINQ(r1, 0x5452, &(0x7f0000000280)) 12:59:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) read$usbmon(r0, &(0x7f0000000100)=""/49, 0x31) 12:59:54 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) read$usbmon(r0, &(0x7f0000000100)=""/49, 0x31) 12:59:54 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r1, 0x0, '\x00\x00\b', "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"}}, 0x110) 12:59:54 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000100)={'c', ' *:* ', 'w\x00'}, 0x8) 12:59:54 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r1, 0x0, '\x00\x00\b', "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"}}, 0x110) 12:59:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) read$usbmon(r0, &(0x7f0000000100)=""/49, 0x31) 12:59:54 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) read$usbmon(r0, &(0x7f0000000100)=""/49, 0x31) 12:59:54 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000100)={'c', ' *:* ', 'w\x00'}, 0x8) 12:59:54 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000100)={'c', ' *:* ', 'w\x00'}, 0x8) 12:59:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001100010000005c99971935c8254ac0721d"], 0x20}}, 0x0) 12:59:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@mpls_delroute={0x24, 0x18, 0x9, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x8}]}, 0x24}}, 0x0) 12:59:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 12:59:54 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) read$usbmon(r0, &(0x7f0000000100)=""/49, 0x31) 12:59:54 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000100)={'c', ' *:* ', 'w\x00'}, 0x8) 12:59:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@mpls_delroute={0x24, 0x18, 0x9, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x8}]}, 0x24}}, 0x0) 12:59:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001100010000005c99971935c8254ac0721d"], 0x20}}, 0x0) 12:59:54 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000100)={'c', ' *:* ', 'w\x00'}, 0x8) 12:59:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000040000000000080000100850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0xc, &(0x7f0000000640)=0x4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=@bridge_getlink={0x20, 0x12, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x48120}}, 0x20}}, 0x0) 12:59:54 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000100)={'c', ' *:* ', 'w\x00'}, 0x8) 12:59:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@mpls_delroute={0x24, 0x18, 0x9, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x8}]}, 0x24}}, 0x0) 12:59:54 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000100)={'c', ' *:* ', 'w\x00'}, 0x8) [ 555.577904][T25942] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25942 comm=syz-executor.5 12:59:54 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000009980)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000080)="d3", 0x1}], 0x1}}], 0x1, 0x20008878) 12:59:54 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x2, &(0x7f0000000000)=ANY=[], 0x8, 0x2d6, &(0x7f00000004c0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) 12:59:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 12:59:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000040000000000080000100850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0xc, &(0x7f0000000640)=0x4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=@bridge_getlink={0x20, 0x12, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x48120}}, 0x20}}, 0x0) 12:59:54 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000009980)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000080)="d3", 0x1}], 0x1}}], 0x1, 0x20008878) 12:59:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@mpls_delroute={0x24, 0x18, 0x9, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x8}]}, 0x24}}, 0x0) 12:59:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 12:59:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000040000000000080000100850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0xc, &(0x7f0000000640)=0x4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=@bridge_getlink={0x20, 0x12, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x48120}}, 0x20}}, 0x0) 12:59:54 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 12:59:54 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000009980)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000080)="d3", 0x1}], 0x1}}], 0x1, 0x20008878) 12:59:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000040000000000080000100850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0xc, &(0x7f0000000640)=0x4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=@bridge_getlink={0x20, 0x12, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x48120}}, 0x20}}, 0x0) 12:59:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) [ 555.683331][T25961] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25961 comm=syz-executor.5 [ 555.711915][T25967] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25967 comm=syz-executor.4 12:59:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 12:59:54 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000009980)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000080)="d3", 0x1}], 0x1}}], 0x1, 0x20008878) 12:59:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) [ 555.791348][T25977] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25977 comm=syz-executor.2 [ 555.825844][T25984] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25984 comm=syz-executor.3 12:59:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 12:59:54 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 12:59:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 12:59:54 executing program 1: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000007c0)={0x38, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0xfffffffffffffd38}]}]}, 0x38}}, 0x0) [ 555.839023][T25989] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25989 comm=syz-executor.4 [ 555.853299][T25991] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25991 comm=syz-executor.5 12:59:54 executing program 1: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000007c0)={0x38, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0xfffffffffffffd38}]}]}, 0x38}}, 0x0) 12:59:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 12:59:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) [ 555.908184][T25997] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 555.918553][T25999] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25999 comm=syz-executor.0 [ 555.935750][T26000] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26000 comm=syz-executor.2 12:59:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 12:59:54 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 12:59:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) [ 555.972663][T26002] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26002 comm=syz-executor.4 12:59:54 executing program 4: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000007c0)={0x38, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0xfffffffffffffd38}]}]}, 0x38}}, 0x0) 12:59:54 executing program 1: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000007c0)={0x38, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0xfffffffffffffd38}]}]}, 0x38}}, 0x0) [ 556.017118][T26012] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:59:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net\x00') fstat(r0, &(0x7f0000003500)) 12:59:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)={0xf4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xb3, 0x33, @data_frame={@no_qos=@type01={{}, {}, @device_b, @initial, @broadcast}, @random="3000c938b93be3e9f2630dc26040697592979405c85e069c0723f24e9630ffd3d913f247b90a0a129e3f6c96fa8441785adba6c71b5d336a178bcbc814bb3f42a249b6549497e1ca41b393444d29a797694117dc391b604341a3c29a507f1d385ecdbdde2bdee7787eac09811da9c08e7b566d9ed07bb9e6d0f733d8893c6f7e1e3fdc749578e24ef68c1b18145d2f1722fbbfe0704e16"}}]}, 0xf4}}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24004011, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x0, 0x3, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000007140)={'batadv_slave_0\x00'}) sendmmsg$inet(r3, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @loopback}, 0x8) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400), 0x20a02, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000013c0), r5) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000006b40)='wg2\x00', 0x4) sendmmsg$inet6(r2, 0x0, 0x0, 0x20084004) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x6, &(0x7f0000006bc0)=0x1fa, 0x4) sendmmsg$inet6(r1, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 12:59:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003480)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000080)=[{&(0x7f00000001c0)="b8", 0x1}], 0x1}}], 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xc, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r2}, 0x8) 12:59:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv4_delrule={0x3c, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8}, [@FRA_DST={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @FRA_DST={0x8, 0x1, @local}, @FRA_DST={0x8, 0x1, @multicast1}, @FRA_DST={0x8, 0x1, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48084}, 0x0) 12:59:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv4_delrule={0x3c, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8}, [@FRA_DST={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @FRA_DST={0x8, 0x1, @local}, @FRA_DST={0x8, 0x1, @multicast1}, @FRA_DST={0x8, 0x1, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48084}, 0x0) 12:59:54 executing program 4: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000007c0)={0x38, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0xfffffffffffffd38}]}]}, 0x38}}, 0x0) 12:59:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net\x00') fstat(r0, &(0x7f0000003500)) 12:59:54 executing program 3: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "a31b1a", 0x20, 0x3c, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, {[@hopopts={0x0, 0x3, '\x00', [@enc_lim, @pad1, @hao={0xc9, 0x10, @dev}]}]}}}}}, 0x0) 12:59:54 executing program 1: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000007c0)={0x38, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0xfffffffffffffd38}]}]}, 0x38}}, 0x0) [ 556.087946][T26025] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 556.115649][T26034] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:59:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net\x00') fstat(r0, &(0x7f0000003500)) 12:59:54 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000000000008500000007000000c5000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002380), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000023c0)={'veth1_to_batadv\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f0000002400)={0x30, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x30}}, 0x0) 12:59:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv4_delrule={0x3c, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8}, [@FRA_DST={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @FRA_DST={0x8, 0x1, @local}, @FRA_DST={0x8, 0x1, @multicast1}, @FRA_DST={0x8, 0x1, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48084}, 0x0) 12:59:54 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net\x00') fstat(r0, &(0x7f0000003500)) [ 556.166259][T26040] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 556.184252][T26044] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:59:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003480)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000080)=[{&(0x7f00000001c0)="b8", 0x1}], 0x1}}], 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xc, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r2}, 0x8) 12:59:55 executing program 4: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000007c0)={0x38, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0xfffffffffffffd38}]}]}, 0x38}}, 0x0) 12:59:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv4_delrule={0x3c, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8}, [@FRA_DST={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @FRA_DST={0x8, 0x1, @local}, @FRA_DST={0x8, 0x1, @multicast1}, @FRA_DST={0x8, 0x1, @empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48084}, 0x0) 12:59:55 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:55 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000000000008500000007000000c5000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002380), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000023c0)={'veth1_to_batadv\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f0000002400)={0x30, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x30}}, 0x0) 12:59:55 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000000000008500000007000000c5000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002380), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000023c0)={'veth1_to_batadv\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f0000002400)={0x30, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x30}}, 0x0) 12:59:55 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:55 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000000000008500000007000000c5000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002380), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000023c0)={'veth1_to_batadv\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f0000002400)={0x30, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x30}}, 0x0) [ 556.957374][T26065] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 12:59:55 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:56 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000000000008500000007000000c5000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002380), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000023c0)={'veth1_to_batadv\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f0000002400)={0x30, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x30}}, 0x0) 12:59:56 executing program 4: r0 = syz_io_uring_setup(0x6305, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000002c0)) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x20) 12:59:56 executing program 1: r0 = creat(&(0x7f0000000a00)='./file0\x00', 0x0) close_range(r0, 0xffffffffffffffff, 0x2) signalfd4(r0, &(0x7f00000000c0), 0x8, 0x0) 12:59:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003480)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000080)=[{&(0x7f00000001c0)="b8", 0x1}], 0x1}}], 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xc, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r2}, 0x8) 12:59:56 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5500000018003f0014fe01b28682c1c402050404001013010e1214123900090035002804030000002d00054000000000060022dc705fbacf6c4e6f17bb198b3edaa60e268679b1a2311f9c0000f75edb6351440a00", 0x55}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 12:59:56 executing program 3: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x800401, &(0x7f00000002c0)=ANY=[@ANYBLOB="636865636b3d7374726963742c646d6f64653d3078303030303030303030303030303030312c636865636b3d72656c617865642c00664f4c818c5041f23a9c9c53b9e6f0ac7fefeca6797b6ef2d92234ae39263f1a2e3d296657ce4d4163dce56182da9ca97def664904e598c44a636dd923a1dea1b90d76a50e80eb046ff4c3c876996e0aab6eb8ee1d031507a6990b95b3bc06601821c09990743b7e04713e5be831e7e84c5ce2068f407f7dc0f02379168dd60d3b12ea7d4df6ae50e23b50c09920"], 0xff, 0x94f, &(0x7f0000001440)="$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") r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000001c0)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x1c}}}, 0x0) 12:59:56 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000000000008500000007000000c5000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002380), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000023c0)={'veth1_to_batadv\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f0000002400)={0x30, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x30}}, 0x0) 12:59:56 executing program 1: r0 = creat(&(0x7f0000000a00)='./file0\x00', 0x0) close_range(r0, 0xffffffffffffffff, 0x2) signalfd4(r0, &(0x7f00000000c0), 0x8, 0x0) 12:59:56 executing program 4: r0 = syz_io_uring_setup(0x6305, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000002c0)) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x20) 12:59:56 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5500000018003f0014fe01b28682c1c402050404001013010e1214123900090035002804030000002d00054000000000060022dc705fbacf6c4e6f17bb198b3edaa60e268679b1a2311f9c0000f75edb6351440a00", 0x55}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 12:59:56 executing program 1: r0 = creat(&(0x7f0000000a00)='./file0\x00', 0x0) close_range(r0, 0xffffffffffffffff, 0x2) signalfd4(r0, &(0x7f00000000c0), 0x8, 0x0) 12:59:56 executing program 4: r0 = syz_io_uring_setup(0x6305, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000002c0)) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x20) 12:59:56 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5500000018003f0014fe01b28682c1c402050404001013010e1214123900090035002804030000002d00054000000000060022dc705fbacf6c4e6f17bb198b3edaa60e268679b1a2311f9c0000f75edb6351440a00", 0x55}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 12:59:56 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000000000008500000007000000c5000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002380), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000023c0)={'veth1_to_batadv\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f0000002400)={0x30, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x30}}, 0x0) 12:59:56 executing program 1: r0 = creat(&(0x7f0000000a00)='./file0\x00', 0x0) close_range(r0, 0xffffffffffffffff, 0x2) signalfd4(r0, &(0x7f00000000c0), 0x8, 0x0) [ 557.831727][T26090] loop3: detected capacity change from 0 to 1764 12:59:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003480)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000080)=[{&(0x7f00000001c0)="b8", 0x1}], 0x1}}], 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xc, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r2}, 0x8) 12:59:57 executing program 4: r0 = syz_io_uring_setup(0x6305, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000002c0)) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x20) 12:59:57 executing program 3: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x800401, &(0x7f00000002c0)=ANY=[@ANYBLOB="636865636b3d7374726963742c646d6f64653d3078303030303030303030303030303030312c636865636b3d72656c617865642c00664f4c818c5041f23a9c9c53b9e6f0ac7fefeca6797b6ef2d92234ae39263f1a2e3d296657ce4d4163dce56182da9ca97def664904e598c44a636dd923a1dea1b90d76a50e80eb046ff4c3c876996e0aab6eb8ee1d031507a6990b95b3bc06601821c09990743b7e04713e5be831e7e84c5ce2068f407f7dc0f02379168dd60d3b12ea7d4df6ae50e23b50c09920"], 0xff, 0x94f, &(0x7f0000001440)="$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") r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000001c0)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x1c}}}, 0x0) 12:59:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001300)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_MACSEC_SCI={0xc, 0x2}]}}}]}, 0x40}}, 0x0) 12:59:57 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5500000018003f0014fe01b28682c1c402050404001013010e1214123900090035002804030000002d00054000000000060022dc705fbacf6c4e6f17bb198b3edaa60e268679b1a2311f9c0000f75edb6351440a00", 0x55}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 12:59:57 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) 12:59:57 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x103542, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) 12:59:57 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) 12:59:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001300)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_MACSEC_SCI={0xc, 0x2}]}}}]}, 0x40}}, 0x0) 12:59:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @counter={{0xc}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_USERDATA={0x5, 0x7, 0x1, 0x0, "b9"}]}], {0x14}}, 0x74}}, 0x0) 12:59:57 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x103542, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) [ 558.699926][T26114] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 558.729629][T26118] loop3: detected capacity change from 0 to 1764 12:59:57 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) [ 558.757087][T26125] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 12:59:58 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) 12:59:58 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x103542, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) 12:59:58 executing program 3: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x800401, &(0x7f00000002c0)=ANY=[@ANYBLOB="636865636b3d7374726963742c646d6f64653d3078303030303030303030303030303030312c636865636b3d72656c617865642c00664f4c818c5041f23a9c9c53b9e6f0ac7fefeca6797b6ef2d92234ae39263f1a2e3d296657ce4d4163dce56182da9ca97def664904e598c44a636dd923a1dea1b90d76a50e80eb046ff4c3c876996e0aab6eb8ee1d031507a6990b95b3bc06601821c09990743b7e04713e5be831e7e84c5ce2068f407f7dc0f02379168dd60d3b12ea7d4df6ae50e23b50c09920"], 0xff, 0x94f, &(0x7f0000001440)="$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