ffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x2823, 0x7f06) 04:37:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0x1c}}, 0x0) 04:37:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23b4}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x4}}, 0x1c}}, 0x0) 04:37:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x66, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) [ 2749.903858][ T8034] loop3: detected capacity change from 0 to 128 04:37:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x5}}, 0x1c}}, 0x0) 04:37:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 04:37:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xfffe, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23b5}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x6}}, 0x1c}}, 0x0) 04:37:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0x1c}}, 0x0) 04:37:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 04:37:37 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x3f00, 0x7f06) 04:37:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}, 0x1c}}, 0x0) 04:37:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23b6}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0xa}}, 0x1c}}, 0x0) 04:37:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x67, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0xc}}, 0x1c}}, 0x0) 04:37:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}, 0x1c}}, 0x0) [ 2750.966545][ T8066] loop3: detected capacity change from 0 to 128 04:37:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x20000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23b7}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0xf}}, 0x1c}}, 0x0) 04:37:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, 0x1c}}, 0x0) 04:37:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x10}}, 0x1c}}, 0x0) 04:37:38 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x4000, 0x7f06) 04:37:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x1c}}, 0x0) 04:37:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x60}}, 0x1c}}, 0x0) 04:37:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23b8}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x68, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x0) 04:37:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}}, 0x1c}}, 0x0) [ 2751.953427][ T8094] loop3: detected capacity change from 0 to 128 04:37:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x40000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 04:37:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}, 0x1c}}, 0x0) 04:37:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23b9}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x4}}, 0x1c}}, 0x0) 04:37:39 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x7001, 0x7f06) 04:37:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x0) 04:37:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x5}}, 0x1c}}, 0x0) 04:37:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23ba}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x69, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 04:37:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x6}}, 0x1c}}, 0x0) [ 2752.981586][ T8123] loop3: detected capacity change from 0 to 128 04:37:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x1c}}, 0x0) 04:37:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 04:37:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x101000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23bb}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0xa}}, 0x1c}}, 0x0) 04:37:40 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x8008, 0x7f06) 04:37:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x1c}}, 0x0) 04:37:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0xc}}, 0x1c}}, 0x0) 04:37:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23bc}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x6a, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0xf}}, 0x1c}}, 0x0) 04:37:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x1c}}, 0x0) 04:37:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x10}}, 0x1c}}, 0x0) 04:37:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23bd}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2753.991050][ T8154] loop3: detected capacity change from 0 to 128 04:37:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x1ce000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x60}}, 0x1c}}, 0x0) 04:37:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0x1c}}, 0x0) 04:37:41 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xfbff, 0x7f06) 04:37:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23be}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x0) 04:37:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 04:37:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x6b, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 04:37:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0x1c}}, 0x0) 04:37:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x1c}}, 0x0) [ 2754.987772][ T8178] loop3: detected capacity change from 0 to 128 04:37:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23bf}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x1c}}, 0x0) 04:37:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}, 0x1c}}, 0x0) 04:37:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xe01c00, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:42 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xfffb, 0x7f06) 04:37:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23c0}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0x1c}}, 0x0) 04:37:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}, 0x1c}}, 0x0) [ 2756.057480][ T8205] loop3: detected capacity change from 0 to 128 04:37:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x6c, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 04:37:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, 0x1c}}, 0x0) 04:37:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23c1}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0xa}}, 0x1c}}, 0x0) 04:37:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x1c}}, 0x0) 04:37:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0xc}}, 0x1c}}, 0x0) 04:37:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x1000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:43 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x1517f, 0x7f06) 04:37:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23c2}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0xf}}, 0x1c}}, 0x0) 04:37:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}}, 0x1c}}, 0x0) 04:37:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x6d, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}, 0x1c}}, 0x0) 04:37:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x1c}}, 0x0) 04:37:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23c3}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x0) 04:37:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x60}}, 0x1c}}, 0x0) [ 2757.228896][ T8239] loop3: detected capacity change from 0 to 128 04:37:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x0) 04:37:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x2000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:44 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x20000, 0x7f06) 04:37:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 04:37:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 04:37:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23c4}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x6e, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x1c}}, 0x0) 04:37:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x1c}}, 0x0) 04:37:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x1c}}, 0x0) 04:37:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x1c}}, 0x0) 04:37:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23c5}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2758.215777][ T8263] loop3: detected capacity change from 0 to 128 04:37:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x1c}}, 0x0) 04:37:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x2040000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0x1c}}, 0x0) 04:37:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x6f, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0x1c}}, 0x0) 04:37:45 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x40000, 0x7f06) 04:37:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23c6}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 04:37:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) [ 2759.196067][ T8292] loop3: detected capacity change from 0 to 128 04:37:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23c7}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}, 0x1c}}, 0x0) 04:37:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}, 0x1c}}, 0x0) 04:37:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0x1c}}, 0x0) 04:37:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x3000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:46 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x60000, 0x7f06) 04:37:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, 0x1c}}, 0x0) 04:37:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}, 0x1c}}, 0x0) 04:37:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23c8}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x70, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}, 0x1c}}, 0x0) 04:37:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x1c}}, 0x0) [ 2760.182926][ T8319] loop3: detected capacity change from 0 to 128 04:37:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}, 0x1c}}, 0x0) 04:37:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23c9}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, 0x1c}}, 0x0) 04:37:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x1c}}, 0x0) 04:37:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x4000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:47 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x80000, 0x7f06) 04:37:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x0) 04:37:47 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}}, 0x1c}}, 0x0) 04:37:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23ca}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x71, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 04:37:47 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}, 0x1c}}, 0x0) 04:37:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x1c}}, 0x0) 04:37:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23cb}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:47 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}, 0x1c}}, 0x0) [ 2761.252614][ T8349] loop3: detected capacity change from 0 to 128 04:37:47 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}}, 0x1c}}, 0x0) 04:37:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x5000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:48 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}}, 0x1c}}, 0x0) 04:37:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x1c}}, 0x0) 04:37:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23cc}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:48 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xa0000, 0x7f06) 04:37:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x72, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:48 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}}, 0x1c}}, 0x0) 04:37:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0x1c}}, 0x0) 04:37:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) 04:37:48 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}}, 0x1c}}, 0x0) [ 2762.246486][ T8378] loop3: detected capacity change from 0 to 128 04:37:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}, 0x1c}}, 0x0) 04:37:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23cd}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x6000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:48 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}}, 0x1c}}, 0x0) 04:37:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}, 0x1c}}, 0x0) 04:37:49 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xc0000, 0x7f06) 04:37:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23ce}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}, 0x1c}}, 0x0) 04:37:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, 0x1c}}, 0x0) 04:37:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x73, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x1c}}, 0x0) 04:37:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400}}, 0x1c}}, 0x0) 04:37:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23cf}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x255d}}, 0x1c}}, 0x0) [ 2763.280348][ T8413] loop3: detected capacity change from 0 to 128 04:37:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x6040000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}, 0x1c}}, 0x0) 04:37:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23d0}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x0) 04:37:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788}}, 0x1c}}, 0x0) 04:37:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23d1}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:50 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xe0000, 0x7f06) 04:37:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x74, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888}}, 0x1c}}, 0x0) 04:37:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 04:37:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5865}}, 0x1c}}, 0x0) [ 2764.317096][ T8442] loop3: detected capacity change from 0 to 128 04:37:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23d2}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x7000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d25}}, 0x1c}}, 0x0) 04:37:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x1c}}, 0x0) 04:37:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23d3}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x1c}}, 0x0) 04:37:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}, 0x1c}}, 0x0) 04:37:51 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xfffff, 0x7f06) 04:37:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0x1c}}, 0x0) 04:37:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558}}, 0x1c}}, 0x0) 04:37:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23d4}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x75, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) [ 2765.345527][ T8480] loop3: detected capacity change from 0 to 128 04:37:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x8000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}}, 0x1c}}, 0x0) 04:37:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23d5}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}, 0x1c}}, 0x0) 04:37:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}, 0x1c}}, 0x0) 04:37:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847}}, 0x1c}}, 0x0) 04:37:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848}}, 0x1c}}, 0x0) 04:37:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, 0x1c}}, 0x0) 04:37:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23d6}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:52 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x100000, 0x7f06) 04:37:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x76, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}}, 0x1c}}, 0x0) [ 2766.379440][ T8510] loop3: detected capacity change from 0 to 128 04:37:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x1c}}, 0x0) 04:37:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}}, 0x1c}}, 0x0) 04:37:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23d7}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x9000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, 0x1c}}, 0x0) 04:37:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}, 0x1c}}, 0x0) 04:37:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}, 0x1c}}, 0x0) 04:37:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x151}}, 0x1c}}, 0x0) 04:37:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23d8}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:53 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x200000, 0x7f06) 04:37:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}}, 0x1c}}, 0x0) 04:37:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23d9}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}}, 0x1c}}, 0x0) 04:37:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x77, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}}, 0x1c}}, 0x0) [ 2767.484981][ T8545] loop3: detected capacity change from 0 to 128 04:37:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xa000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}, 0x1c}}, 0x0) 04:37:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}}, 0x1c}}, 0x0) 04:37:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23da}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}}, 0x1c}}, 0x0) 04:37:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}}, 0x1c}}, 0x0) 04:37:54 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x1000000, 0x7f06) 04:37:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23db}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}}, 0x1c}}, 0x0) 04:37:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}, 0x1c}}, 0x0) 04:37:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x78, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103e}}, 0x1c}}, 0x0) [ 2768.502393][ T8571] loop3: detected capacity change from 0 to 128 04:37:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xb000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}, 0x1c}}, 0x0) 04:37:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10}}, 0x1c}}, 0x0) 04:37:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23dc}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788}}, 0x1c}}, 0x0) 04:37:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}}, 0x1c}}, 0x0) 04:37:55 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x2000000, 0x7f06) 04:37:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888}}, 0x1c}}, 0x0) 04:37:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}}, 0x1c}}, 0x0) 04:37:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23dd}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x79, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5101}}, 0x1c}}, 0x0) [ 2769.506315][ T8602] loop3: detected capacity change from 0 to 128 04:37:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xc000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x1c}}, 0x0) 04:37:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5865}}, 0x1c}}, 0x0) 04:37:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23de}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}, 0x1c}}, 0x0) 04:37:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}}, 0x1c}}, 0x0) 04:37:56 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x2040000, 0x7f06) 04:37:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558}}, 0x1c}}, 0x0) 04:37:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}}, 0x1c}}, 0x0) 04:37:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23df}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x7a, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000}}, 0x1c}}, 0x0) [ 2770.466177][ T8627] loop3: detected capacity change from 0 to 128 04:37:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xd000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}}, 0x1c}}, 0x0) 04:37:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x255d0000}}, 0x1c}}, 0x0) 04:37:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23e0}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}}, 0x1c}}, 0x0) 04:37:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847}}, 0x1c}}, 0x0) 04:37:57 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x3000000, 0x7f06) 04:37:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848}}, 0x1c}}, 0x0) 04:37:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65580000}}, 0x1c}}, 0x0) 04:37:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23e1}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x7b, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000}}, 0x1c}}, 0x0) [ 2771.475898][ T8657] loop3: detected capacity change from 0 to 128 04:37:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xe000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}}, 0x1c}}, 0x0) 04:37:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000}}, 0x1c}}, 0x0) 04:37:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23e2}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000}}, 0x1c}}, 0x0) 04:37:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}}, 0x1c}}, 0x0) 04:37:58 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x4000000, 0x7f06) 04:37:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}}, 0x1c}}, 0x0) 04:37:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23e3}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, 0x1c}}, 0x0) 04:37:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x7c, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeaffffff}}, 0x1c}}, 0x0) [ 2772.558873][ T8686] loop3: detected capacity change from 0 to 128 04:37:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xf000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:37:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1510000}}, 0x1c}}, 0x0) 04:37:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff}}, 0x1c}}, 0x0) 04:37:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23e4}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}, 0x1c}}, 0x0) 04:37:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}}, 0x1c}}, 0x0) 04:37:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23e5}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:37:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}, 0x1c}}, 0x0) 04:37:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}}, 0x1c}}, 0x0) 04:37:59 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x5000000, 0x7f06) 04:37:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x7d, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:37:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}, 0x1c}}, 0x0) [ 2773.617502][ T8716] loop3: detected capacity change from 0 to 128 04:38:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x10000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}}, 0x1c}}, 0x0) 04:38:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffea}}, 0x1c}}, 0x0) 04:38:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23e6}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}}, 0x1c}}, 0x0) 04:38:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0}}, 0x1c}}, 0x0) 04:38:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}, 0x1c}}, 0x0) 04:38:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}, 0x1c}}, 0x0) 04:38:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23e7}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:00 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x6000000, 0x7f06) 04:38:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}}, 0x1c}}, 0x0) 04:38:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x9}}, 0x0) [ 2774.703141][ T8746] loop3: detected capacity change from 0 to 128 04:38:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x11000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23e8}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x7e, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x1c}}, 0x0) 04:38:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0xf}}, 0x0) 04:38:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}}, 0x1c}}, 0x0) 04:38:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x10}}, 0x0) 04:38:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}}, 0x1c}}, 0x0) 04:38:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x12}}, 0x0) 04:38:02 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x6040000, 0x7f06) 04:38:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23e9}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103e0000}}, 0x1c}}, 0x0) [ 2775.771999][ T8774] loop3: detected capacity change from 0 to 128 04:38:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x12000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:02 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x140}}, 0x0) 04:38:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}}, 0x1c}}, 0x0) 04:38:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x82, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23ea}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65580000}}, 0x1c}}, 0x0) 04:38:02 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0xec0}}, 0x0) 04:38:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000}}, 0x1c}}, 0x0) 04:38:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23eb}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:03 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x7000000, 0x7f06) 04:38:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000}}, 0x1c}}, 0x0) 04:38:03 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x33fe0}}, 0x0) [ 2776.776520][ T8801] loop3: detected capacity change from 0 to 128 04:38:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x13000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23ec}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000}}, 0x1c}}, 0x0) 04:38:03 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0xfffffdef}}, 0x0) 04:38:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x83, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}}, 0x1c}}, 0x0) 04:38:03 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0xffffff81}}, 0x0) 04:38:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23ed}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeaffffff}}, 0x1c}}, 0x0) 04:38:04 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x8000000, 0x7f06) 04:38:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x2}, 0x0) 04:38:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff}}, 0x1c}}, 0x0) [ 2777.866220][ T8828] loop3: detected capacity change from 0 to 128 04:38:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}}, 0x1c}}, 0x0) 04:38:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23ee}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x500}, 0x0) 04:38:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x84, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x14000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}}, 0x1c}}, 0x0) 04:38:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}, 0x1c}}, 0x0) 04:38:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x2}, 0x0) 04:38:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23ef}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffea}}, 0x1c}}, 0x0) 04:38:05 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x3}, 0x0) 04:38:05 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x8800000, 0x7f06) 04:38:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x15000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23f0}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0}}, 0x1c}}, 0x0) 04:38:05 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x4}, 0x0) 04:38:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}, 0x1c}}, 0x0) 04:38:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x85, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) [ 2778.928054][ T8855] loop3: detected capacity change from 0 to 128 04:38:05 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x5}, 0x0) 04:38:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0xf}}, 0x0) 04:38:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x10}}, 0x0) 04:38:05 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x6}, 0x0) 04:38:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23f1}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:06 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x9000000, 0x7f06) 04:38:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x12}}, 0x0) 04:38:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x8}, 0x0) 04:38:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23f2}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x16000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x86, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x14}}, 0x0) 04:38:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x9}, 0x0) 04:38:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x140}}, 0x0) 04:38:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23f3}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2780.185905][ T8894] loop3: detected capacity change from 0 to 128 04:38:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0xec0}}, 0x0) 04:38:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xa}, 0x0) 04:38:07 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xa000000, 0x7f06) 04:38:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xc}, 0x0) 04:38:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x33fe0}}, 0x0) 04:38:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23f4}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x17000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x87, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0xfffffdef}}, 0x0) 04:38:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xf}, 0x0) [ 2781.209013][ T8922] loop3: detected capacity change from 0 to 128 04:38:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0xffffff81}}, 0x0) 04:38:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x10}, 0x0) 04:38:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23f5}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x2}, 0x0) 04:38:08 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xb000000, 0x7f06) 04:38:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x14}, 0x0) 04:38:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23f6}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x300}, 0x0) 04:38:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x18000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x88, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x60}, 0x0) 04:38:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x2}, 0x0) [ 2782.179641][ T8949] loop3: detected capacity change from 0 to 128 04:38:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23f7}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x4}, 0x0) 04:38:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x300}, 0x0) 04:38:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x5}, 0x0) 04:38:09 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xc000000, 0x7f06) 04:38:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x500}, 0x0) 04:38:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23f8}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x6}, 0x0) 04:38:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x19000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x89, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x600}, 0x0) 04:38:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x8}, 0x0) 04:38:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x900}, 0x0) [ 2783.181774][ T8977] loop3: detected capacity change from 0 to 128 04:38:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xa00}, 0x0) 04:38:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xa}, 0x0) 04:38:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xc}, 0x0) 04:38:10 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xd000000, 0x7f06) 04:38:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23f9}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xc00}, 0x0) 04:38:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xf}, 0x0) 04:38:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x8a, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x1a000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x10}, 0x0) 04:38:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xf00}, 0x0) 04:38:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x60}, 0x0) [ 2784.176360][ T9004] loop3: detected capacity change from 0 to 128 04:38:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23fa}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x1400}, 0x0) 04:38:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x151}, 0x0) 04:38:11 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xf000000, 0x7f06) 04:38:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x255d}, 0x0) 04:38:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x500}, 0x0) 04:38:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23fb}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x8b, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x1b000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x600}, 0x0) 04:38:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x4788}, 0x0) [ 2785.182057][ T9032] loop3: detected capacity change from 0 to 128 04:38:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23fc}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x4888}, 0x0) 04:38:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xa00}, 0x0) 04:38:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x5865}, 0x0) 04:38:12 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xfffffff, 0x7f06) 04:38:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xc00}, 0x0) 04:38:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x5d25}, 0x0) 04:38:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23fd}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x8c, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x1c000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xf00}, 0x0) 04:38:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x6000}, 0x0) 04:38:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x103e}, 0x0) 04:38:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23fe}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x6558}, 0x0) [ 2786.197303][ T9062] loop3: detected capacity change from 0 to 128 04:38:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x3e10}, 0x0) 04:38:13 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x10000000, 0x7f06) 04:38:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x8100}, 0x0) 04:38:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x23ff}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x4788}, 0x0) 04:38:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x1d000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x8d, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x4888}, 0x0) 04:38:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x8847}, 0x0) 04:38:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x5101}, 0x0) 04:38:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2400}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x8848}, 0x0) [ 2787.229448][ T9090] loop3: detected capacity change from 0 to 128 04:38:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x5865}, 0x0) 04:38:14 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x11000000, 0x7f06) 04:38:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2401}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x34000}, 0x0) 04:38:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x6000}, 0x0) 04:38:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x1e000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x8e, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x400300}, 0x0) 04:38:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x6558}, 0x0) 04:38:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x8100}, 0x0) 04:38:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x1000000}, 0x0) 04:38:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2402}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2788.243088][ T9118] loop3: detected capacity change from 0 to 128 04:38:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x8847}, 0x0) 04:38:15 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x12000000, 0x7f06) 04:38:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x2000000}, 0x0) 04:38:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x8848}, 0x0) 04:38:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2403}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x1f000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x8f, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x3000000}, 0x0) 04:38:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x34000}, 0x0) 04:38:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2404}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x4000000}, 0x0) [ 2789.297464][ T9147] loop3: detected capacity change from 0 to 128 04:38:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x400300}, 0x0) 04:38:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2405}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:16 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x20000000, 0x7f06) 04:38:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x5000000}, 0x0) 04:38:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x1000000}, 0x0) 04:38:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2406}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x90, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x20000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x6000000}, 0x0) 04:38:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x1510000}, 0x0) [ 2790.265287][ T9174] loop3: detected capacity change from 0 to 128 04:38:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x2000000}, 0x0) 04:38:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x8000000}, 0x0) 04:38:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2407}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x4000000}, 0x0) 04:38:17 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x22000000, 0x7f06) 04:38:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x9000000}, 0x0) 04:38:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x5000000}, 0x0) 04:38:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2408}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x91, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x20200fff, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xa000000}, 0x0) 04:38:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x6000000}, 0x0) 04:38:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xc000000}, 0x0) 04:38:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x8000000}, 0x0) [ 2791.259592][ T9203] loop3: detected capacity change from 0 to 128 04:38:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2409}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xa000000}, 0x0) 04:38:18 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x27230000, 0x7f06) 04:38:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xc000000}, 0x0) 04:38:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xf000000}, 0x0) 04:38:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x240a}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x92, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x21000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xf000000}, 0x0) 04:38:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x10000000}, 0x0) 04:38:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x240b}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x10000000}, 0x0) 04:38:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x14000000}, 0x0) [ 2792.241272][ T9232] loop3: detected capacity change from 0 to 128 04:38:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x103e0000}, 0x0) 04:38:19 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x28030000, 0x7f06) 04:38:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x60000000}, 0x0) 04:38:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x240c}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:19 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x255d0000}, 0x0) 04:38:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x93, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x22000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x65580000}, 0x0) 04:38:19 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x60000000}, 0x0) 04:38:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x240d}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2793.155257][ T9259] loop3: detected capacity change from 0 to 128 04:38:19 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x65580000}, 0x0) 04:38:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x81000000}, 0x0) 04:38:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x88470000}, 0x0) 04:38:20 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x28230000, 0x7f06) 04:38:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x81000000}, 0x0) 04:38:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x88480000}, 0x0) 04:38:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x240e}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x94, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x23000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x88a8ffff}, 0x0) 04:38:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x88470000}, 0x0) 04:38:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x240f}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2794.151857][ T9285] loop3: detected capacity change from 0 to 128 04:38:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xeaffffff}, 0x0) 04:38:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x88480000}, 0x0) 04:38:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x24000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x88a8ffff}, 0x0) 04:38:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xf0ffffff}, 0x0) 04:38:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2410}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:21 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x3f000000, 0x7f06) 04:38:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x95, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xeaffffff}, 0x0) 04:38:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xfeffffff}, 0x0) 04:38:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xffffa888}, 0x0) 04:38:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xf0ffffff}, 0x0) 04:38:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2411}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2795.195796][ T9314] loop3: detected capacity change from 0 to 128 04:38:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xfeffffff}, 0x0) 04:38:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x25000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xffffff7f}, 0x0) 04:38:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xffffa888}, 0x0) 04:38:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2412}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:22 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x40000000, 0x7f06) 04:38:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xffffffea}, 0x0) 04:38:22 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xffffff7f}, 0x0) 04:38:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2413}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x96, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xfffffff0}, 0x0) 04:38:22 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xffffffea}, 0x0) 04:38:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xfffffffe}, 0x0) [ 2796.207358][ T9350] loop3: detected capacity change from 0 to 128 04:38:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2414}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:22 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xfffffff0}, 0x0) 04:38:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x26000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x40030000000000}, 0x0) 04:38:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xfffffffe}, 0x0) 04:38:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x100000000000000}, 0x0) 04:38:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2415}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:23 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x70010000, 0x7f06) 04:38:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x97, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x151000000000000}, 0x0) 04:38:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x40030000000000}, 0x0) 04:38:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x200000000000000}, 0x0) [ 2797.223686][ T9375] loop3: detected capacity change from 0 to 128 04:38:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x400000000000000}, 0x0) 04:38:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x100000000000000}, 0x0) 04:38:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2416}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x500000000000000}, 0x0) 04:38:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x27000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x200000000000000}, 0x0) 04:38:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x600000000000000}, 0x0) 04:38:24 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x7f510100, 0x7f06) 04:38:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x300000000000000}, 0x0) 04:38:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2417}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x800000000000000}, 0x0) 04:38:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x98, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xa00000000000000}, 0x0) 04:38:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x400000000000000}, 0x0) 04:38:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xc00000000000000}, 0x0) 04:38:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2418}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2798.342438][ T9412] loop3: detected capacity change from 0 to 128 04:38:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x500000000000000}, 0x0) 04:38:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xf00000000000000}, 0x0) 04:38:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x28000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:25 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xf4ffffff, 0x7f06) 04:38:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2419}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x1000000000000000}, 0x0) 04:38:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x600000000000000}, 0x0) 04:38:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x99, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x103e000000000000}, 0x0) 04:38:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x800000000000000}, 0x0) 04:38:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x6000000000000000}, 0x0) 04:38:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x900000000000000}, 0x0) [ 2799.416216][ T9441] loop3: detected capacity change from 0 to 128 04:38:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x241a}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x6558000000000000}, 0x0) 04:38:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x29000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:26 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xfbffffff, 0x7f06) 04:38:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xa00000000000000}, 0x0) 04:38:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x241b}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x8100000000000000}, 0x0) 04:38:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x9a, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xc00000000000000}, 0x0) 04:38:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x8847000000000000}, 0x0) 04:38:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x8848000000000000}, 0x0) [ 2800.503730][ T9468] loop3: detected capacity change from 0 to 128 04:38:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x88a8ffff00000000}, 0x0) 04:38:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x241c}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xf00000000000000}, 0x0) 04:38:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x2a000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:27 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xffefffff, 0x7f06) 04:38:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x1000000000000000}, 0x0) 04:38:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xeaffffff00000000}, 0x0) 04:38:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x241d}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x9b, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xf0ffffff00000000}, 0x0) 04:38:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x1400000000000000}, 0x0) [ 2801.465934][ T9489] loop3: detected capacity change from 0 to 128 04:38:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xfeffffff00000000}, 0x0) 04:38:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xffffff7f00000000}, 0x0) 04:38:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x255d000000000000}, 0x0) 04:38:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x241e}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0xffffffff00000000}, 0x0) 04:38:28 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xfffdffff, 0x7f06) 04:38:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x6000000000000000}, 0x0) 04:38:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x2b000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x241f}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x2}, 0x0) 04:38:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x9c, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x4}, 0x0) 04:38:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x6558000000000000}, 0x0) 04:38:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x5}, 0x0) [ 2802.449942][ T9515] loop3: detected capacity change from 0 to 128 04:38:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2420}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x8100000000000000}, 0x0) 04:38:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x6}, 0x0) 04:38:29 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xffff0f00, 0x7f06) 04:38:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x8847000000000000}, 0x0) 04:38:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8}, 0x0) 04:38:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2421}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x9d, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x2c000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xa}, 0x0) 04:38:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x8848000000000000}, 0x0) 04:38:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xc}, 0x0) [ 2803.428609][ T9554] loop3: detected capacity change from 0 to 128 04:38:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2422}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x88a8ffff00000000}, 0x0) 04:38:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xf}, 0x0) 04:38:30 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xffffefff, 0x7f06) 04:38:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xeaffffff00000000}, 0x0) 04:38:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x10}, 0x0) 04:38:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2423}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x2d000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x9e, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x60}, 0x0) 04:38:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x151}, 0x0) 04:38:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x500}, 0x0) [ 2804.443086][ T9583] loop3: detected capacity change from 0 to 128 04:38:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2424}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xf0ffffff00000000}, 0x0) 04:38:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x600}, 0x0) 04:38:31 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xfffffdff, 0x7f06) 04:38:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xa00}, 0x0) 04:38:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xfeffffff00000000}, 0x0) 04:38:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2425}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x9f, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x2e000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xffffff7f00000000}, 0x0) 04:38:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xc00}, 0x0) [ 2805.450205][ T9609] loop3: detected capacity change from 0 to 128 04:38:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2426}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0xffffffff00000000}, 0x0) 04:38:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xf00}, 0x0) 04:38:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x103e}, 0x0) 04:38:32 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xffffff0f, 0x7f06) 04:38:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x2}, 0x0) 04:38:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x3e10}, 0x0) 04:38:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2427}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xa0, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x2f000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x3}, 0x0) 04:38:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x4788}, 0x0) 04:38:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x4}, 0x0) 04:38:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x4888}, 0x0) [ 2806.412056][ T9634] loop3: detected capacity change from 0 to 128 04:38:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2428}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x5101}, 0x0) 04:38:33 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xfffffff4, 0x7f06) 04:38:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x5}, 0x0) 04:38:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2429}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x5865}, 0x0) 04:38:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xa1, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x6000}, 0x0) 04:38:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x30000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x6}, 0x0) 04:38:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x6558}, 0x0) 04:38:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8}, 0x0) [ 2807.461195][ T9663] loop3: detected capacity change from 0 to 128 04:38:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x9}, 0x0) 04:38:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8100}, 0x0) 04:38:34 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xfffffffb, 0x7f06) 04:38:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x242a}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xa}, 0x0) 04:38:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8847}, 0x0) 04:38:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x31000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xa2, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8848}, 0x0) 04:38:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xc}, 0x0) [ 2808.459036][ T9695] loop3: detected capacity change from 0 to 128 04:38:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xf}, 0x0) 04:38:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x34000}, 0x0) 04:38:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x10}, 0x0) 04:38:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x242b}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:35 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x80000000000, 0x7f06) 04:38:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x400300}, 0x0) 04:38:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x14}, 0x0) 04:38:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x242c}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x32000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xa3, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x60}, 0x0) 04:38:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x1000000}, 0x0) [ 2809.436463][ T9721] loop3: detected capacity change from 0 to 128 04:38:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x300}, 0x0) 04:38:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x242d}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x1510000}, 0x0) 04:38:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x500}, 0x0) 04:38:36 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x800800000000, 0x7f06) 04:38:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x2000000}, 0x0) 04:38:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x242e}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x600}, 0x0) 04:38:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x33000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) [ 2810.447147][ T9749] loop3: detected capacity change from 0 to 128 04:38:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xa4, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x4000000}, 0x0) 04:38:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x900}, 0x0) 04:38:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x242f}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x5000000}, 0x0) 04:38:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xa00}, 0x0) 04:38:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x6000000}, 0x0) 04:38:37 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x1000000000000, 0x7f06) 04:38:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2430}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xc00}, 0x0) 04:38:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8000000}, 0x0) 04:38:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x34000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) [ 2811.492836][ T9777] loop3: detected capacity change from 0 to 128 04:38:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xa5, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xa000000}, 0x0) 04:38:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xf00}, 0x0) 04:38:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2431}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xc000000}, 0x0) 04:38:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x1400}, 0x0) 04:38:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x255d}, 0x0) 04:38:38 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x2000000000000, 0x7f06) 04:38:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xf000000}, 0x0) 04:38:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2432}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x4788}, 0x0) 04:38:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x35000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) [ 2812.488933][ T9805] loop3: detected capacity change from 0 to 128 04:38:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x4888}, 0x0) 04:38:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2433}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xa6, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x10000000}, 0x0) 04:38:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x103e0000}, 0x0) 04:38:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x5865}, 0x0) 04:38:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x5d25}, 0x0) 04:38:39 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x4000000000000, 0x7f06) 04:38:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x60000000}, 0x0) 04:38:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x6000}, 0x0) 04:38:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2434}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x36000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x65580000}, 0x0) 04:38:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x6558}, 0x0) [ 2813.510670][ T9834] loop3: detected capacity change from 0 to 128 04:38:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xa7, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x81000000}, 0x0) 04:38:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8100}, 0x0) 04:38:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2435}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x88470000}, 0x0) 04:38:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x88480000}, 0x0) 04:38:40 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x6000000000000, 0x7f06) 04:38:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8847}, 0x0) 04:38:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2436}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x37000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8848}, 0x0) 04:38:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x88a8ffff}, 0x0) [ 2814.550225][ T9864] loop3: detected capacity change from 0 to 128 04:38:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xeaffffff}, 0x0) 04:38:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x34000}, 0x0) 04:38:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2437}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xa8, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xf0ffffff}, 0x0) 04:38:41 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x7ffffffffffff, 0x7f06) 04:38:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x400300}, 0x0) 04:38:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xfeffffff}, 0x0) 04:38:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2438}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x38000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x1000000}, 0x0) 04:38:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xffffa888}, 0x0) 04:38:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x2000000}, 0x0) 04:38:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 2815.577926][ T9892] loop3: detected capacity change from 0 to 128 04:38:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x3000000}, 0x0) 04:38:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xa9, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2439}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:42 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x8000000000000, 0x7f06) 04:38:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xffffffea}, 0x0) 04:38:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x4000000}, 0x0) 04:38:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x243a}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x39000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x5000000}, 0x0) 04:38:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xfffffff0}, 0x0) 04:38:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x243b}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xfffffffe}, 0x0) 04:38:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x6000000}, 0x0) [ 2816.712245][ T9920] loop3: detected capacity change from 0 to 128 04:38:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xaa, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x40030000000000}, 0x0) 04:38:44 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xa000000000000, 0x7f06) 04:38:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8000000}, 0x0) 04:38:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x243c}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x100000000000000}, 0x0) 04:38:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x3a000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x9000000}, 0x0) 04:38:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x151000000000000}, 0x0) 04:38:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xa000000}, 0x0) 04:38:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x243d}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2817.727607][ T9946] loop3: detected capacity change from 0 to 128 04:38:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x200000000000000}, 0x0) 04:38:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xab, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xc000000}, 0x0) 04:38:45 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xc000000000000, 0x7f06) 04:38:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x400000000000000}, 0x0) 04:38:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x243e}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xf000000}, 0x0) 04:38:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x3b000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x500000000000000}, 0x0) 04:38:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x10000000}, 0x0) 04:38:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x600000000000000}, 0x0) [ 2818.836017][ T9974] loop3: detected capacity change from 0 to 128 04:38:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x243f}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x800000000000000}, 0x0) 04:38:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xac, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x14000000}, 0x0) 04:38:46 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xe000000000000, 0x7f06) 04:38:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xa00000000000000}, 0x0) 04:38:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2440}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x255d0000}, 0x0) 04:38:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x3c000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x60000000}, 0x0) 04:38:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xc00000000000000}, 0x0) [ 2819.857527][T10002] loop3: detected capacity change from 0 to 128 04:38:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xf00000000000000}, 0x0) 04:38:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2441}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x65580000}, 0x0) 04:38:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xad, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x1000000000000000}, 0x0) 04:38:47 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x10000000000000, 0x7f06) 04:38:47 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x81000000}, 0x0) 04:38:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2442}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x103e000000000000}, 0x0) 04:38:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x3d000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x6000000000000000}, 0x0) 04:38:47 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x88470000}, 0x0) 04:38:47 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x88480000}, 0x0) 04:38:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x2443}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x6558000000000000}, 0x0) [ 2820.902253][T10030] loop3: detected capacity change from 0 to 128 04:38:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xae, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:47 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x88a8ffff}, 0x0) 04:38:48 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x20000000000000, 0x7f06) 04:38:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8100000000000000}, 0x0) 04:38:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:48 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xeaffffff}, 0x0) 04:38:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x3e000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8847000000000000}, 0x0) 04:38:48 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xf0ffffff}, 0x0) 04:38:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8848000000000000}, 0x0) 04:38:48 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xfeffffff}, 0x0) [ 2821.843520][T10058] loop3: detected capacity change from 0 to 128 04:38:48 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xffffa888}, 0x0) 04:38:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xaf, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x2}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xffffff7f}, 0x0) 04:38:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x88a8ffff00000000}, 0x0) 04:38:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x3}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:49 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x100000000000000, 0x7f06) 04:38:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x3f000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xeaffffff00000000}, 0x0) 04:38:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xffffffea}, 0x0) 04:38:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 04:38:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 2822.935905][T10087] loop3: detected capacity change from 0 to 128 04:38:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xfeffffff00000000}, 0x0) 04:38:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xb0, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xfffffffe}, 0x0) 04:38:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 04:38:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x8}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 04:38:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x0) 04:38:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x40030000000000}, 0x0) 04:38:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x300}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:50 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x200000000000000, 0x7f06) 04:38:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x40000000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x2}, 0x0) 04:38:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x100000000000000}, 0x0) [ 2824.058340][T10122] loop3: detected capacity change from 0 to 128 04:38:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xb1, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 04:38:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x200000000000000}, 0x0) 04:38:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x1000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x0) 04:38:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x300000000000000}, 0x0) 04:38:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x6}, 0x0) 04:38:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x400000000000000}, 0x0) 04:38:51 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x204000000000000, 0x7f06) 04:38:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x0) 04:38:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x500000000000000}, 0x0) 04:38:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x2000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2825.028827][T10155] loop3: detected capacity change from 0 to 128 04:38:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xb2, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xf30c0000, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x600000000000000}, 0x0) 04:38:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xa}, 0x0) 04:38:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x3000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xc}, 0x0) 04:38:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x800000000000000}, 0x0) 04:38:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x900000000000000}, 0x0) 04:38:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xf}, 0x0) 04:38:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xa00000000000000}, 0x0) 04:38:52 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x300000000000000, 0x7f06) 04:38:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x8000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2826.115959][T10183] loop3: detected capacity change from 0 to 128 04:38:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xb3, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 04:38:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xc00000000000000}, 0x0) 04:38:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0xfeffffff}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xfeffffff, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x60}, 0x0) 04:38:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xf00000000000000}, 0x0) 04:38:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x1000000000000000}, 0x0) 04:38:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x151}, 0x0) 04:38:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x1400000000000000}, 0x0) 04:38:53 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x400000000000000, 0x7f06) 04:38:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x500}, 0x0) [ 2827.180878][T10213] loop3: detected capacity change from 0 to 128 04:38:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0xfffffffe}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x255d000000000000}, 0x0) 04:38:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x600}, 0x0) 04:38:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xb4, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xff0f2020, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 04:38:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x6000000000000000}, 0x0) 04:38:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x6558000000000000}, 0x0) 04:38:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xc00}, 0x0) 04:38:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8100000000000000}, 0x0) 04:38:54 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x500000000000000, 0x7f06) 04:38:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 04:38:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8847000000000000}, 0x0) 04:38:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2828.284403][T10245] loop3: detected capacity change from 0 to 128 04:38:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xb5, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x103e}, 0x0) 04:38:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xffffff7f, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x8848000000000000}, 0x0) 04:38:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x2}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x3e10}, 0x0) 04:38:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x88a8ffff00000000}, 0x0) 04:38:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x4788}, 0x0) 04:38:55 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x600000000000000, 0x7f06) 04:38:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xeaffffff00000000}, 0x0) 04:38:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x4888}, 0x0) 04:38:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x3}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2829.251720][T10274] loop3: detected capacity change from 0 to 128 04:38:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xb6, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x5101}, 0x0) 04:38:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xfffffffe, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 04:38:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x8}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x5865}, 0x0) 04:38:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 04:38:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xfeffffff00000000}, 0x0) 04:38:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x6558}, 0x0) 04:38:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 04:38:56 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x604000000000000, 0x7f06) 04:38:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x300}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2830.374537][T10303] loop3: detected capacity change from 0 to 128 04:38:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xb7, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 04:38:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x8100}, 0x0) 04:38:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0xffffffff, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x1000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x0) 04:38:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x8847}, 0x0) 04:38:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x2}, 0x0) 04:38:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x8848}, 0x0) 04:38:57 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x700000000000000, 0x7f06) 04:38:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x3}, 0x0) 04:38:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x34000}, 0x0) [ 2831.447324][T10332] loop3: detected capacity change from 0 to 128 04:38:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xb8, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x2000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 04:38:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 04:38:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 04:38:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x1510000}, 0x0) 04:38:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x0) 04:38:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x6}, 0x0) 04:38:58 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x800000000000000, 0x7f06) 04:38:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 04:38:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x0) 04:38:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x3000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xb9, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 04:38:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x9}, 0x0) [ 2832.538543][T10364] loop3: detected capacity change from 0 to 128 04:38:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x2, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 04:38:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xa}, 0x0) 04:38:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xc}, 0x0) 04:38:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 04:38:59 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x900000000000000, 0x7f06) 04:38:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xf}, 0x0) 04:38:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 04:38:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x8000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xba, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:38:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 04:38:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2833.460053][T10390] loop3: detected capacity change from 0 to 128 04:38:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x3, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:38:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) 04:38:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0xfeffffff}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:38:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x0) 04:38:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x60}, 0x0) 04:39:00 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xa00000000000000, 0x7f06) 04:39:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 04:39:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x300}, 0x0) 04:39:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0xfffffffe}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xbb, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 04:39:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x500}, 0x0) [ 2834.616820][T10421] loop3: detected capacity change from 0 to 128 04:39:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x4, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x600}, 0x0) 04:39:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x103e0000}, 0x0) 04:39:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 04:39:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x900}, 0x0) 04:39:01 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xb00000000000000, 0x7f06) 04:39:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x65580000}, 0x0) 04:39:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 04:39:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xbc, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) 04:39:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xc00}, 0x0) [ 2835.536667][T10442] loop3: detected capacity change from 0 to 128 04:39:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x5, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x88470000}, 0x0) 04:39:02 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 04:39:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x2}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x88480000}, 0x0) 04:39:02 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xc00000000000000, 0x7f06) 04:39:02 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x1400}, 0x0) 04:39:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) 04:39:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x3}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xbd, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xeaffffff}, 0x0) 04:39:02 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x255d}, 0x0) [ 2836.536316][T10478] loop3: detected capacity change from 0 to 128 04:39:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 04:39:03 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x4788}, 0x0) 04:39:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x6, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x8}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) 04:39:03 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xd00000000000000, 0x7f06) 04:39:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xffffa888}, 0x0) 04:39:03 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x4888}, 0x0) 04:39:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x300}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xbe, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 04:39:03 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 2837.541459][T10507] loop3: detected capacity change from 0 to 128 04:39:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xffffffea}, 0x0) 04:39:03 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x5d25}, 0x0) 04:39:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x7, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x1000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 04:39:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x6558}, 0x0) 04:39:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 04:39:04 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xf00000000000000, 0x7f06) 04:39:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x2000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xbf, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) 04:39:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x8100}, 0x0) 04:39:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x2) 04:39:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x4) [ 2838.639174][T10537] loop3: detected capacity change from 0 to 128 04:39:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x8, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x5) 04:39:05 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x8847}, 0x0) 04:39:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x3000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:06 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x1000000000000000, 0x7f06) 04:39:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x6) 04:39:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x8848}, 0x0) 04:39:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x8000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xc0, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x8) 04:39:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 04:39:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xa) [ 2839.738611][T10567] loop3: detected capacity change from 0 to 128 04:39:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x9, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xc) 04:39:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 04:39:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0xfeffffff}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:07 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x1100000000000000, 0x7f06) 04:39:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xf) 04:39:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 04:39:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0xfffffffe}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xc1, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 04:39:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x10) 04:39:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x60) [ 2840.787362][T10594] loop3: detected capacity change from 0 to 128 04:39:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0xa, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 04:39:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x151) 04:39:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:08 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x1200000000000000, 0x7f06) 04:39:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 04:39:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x500) 04:39:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x2}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xc2, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 04:39:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x600) 04:39:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xa00) [ 2841.796837][T10625] loop3: detected capacity change from 0 to 128 04:39:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0xb, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 04:39:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xc00) 04:39:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x3}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:09 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x2000000000000000, 0x7f06) 04:39:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xf00) 04:39:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 04:39:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x8}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xc3, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) 04:39:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x103e) 04:39:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) [ 2842.832807][T10654] loop3: detected capacity change from 0 to 128 04:39:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0xc, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x3e10) 04:39:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) 04:39:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x300}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:10 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x2200000000000000, 0x7f06) 04:39:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x4788) 04:39:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 04:39:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x1000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xc4, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 04:39:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x4888) 04:39:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x14000000}, 0x0) [ 2843.925947][T10683] loop3: detected capacity change from 0 to 128 04:39:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0xd, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x5101) 04:39:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x255d0000}, 0x0) 04:39:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x2000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2844.554549][T10700] ================================================================== [ 2844.562664][T10700] BUG: KCSAN: data-race in mem_cgroup_flush_stats / tick_do_update_jiffies64 [ 2844.571429][T10700] [ 2844.573746][T10700] read-write to 0xffffffff85a079c0 of 8 bytes by interrupt on cpu 1: [ 2844.581798][T10700] tick_do_update_jiffies64+0x112/0x1b0 [ 2844.587349][T10700] tick_sched_timer+0x7b/0x2c0 [ 2844.592111][T10700] __hrtimer_run_queues+0x217/0x700 [ 2844.597316][T10700] hrtimer_interrupt+0x20d/0x7b0 [ 2844.602252][T10700] __sysvec_apic_timer_interrupt+0x73/0x210 [ 2844.608158][T10700] sysvec_apic_timer_interrupt+0x68/0x80 [ 2844.613785][T10700] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2844.619765][T10700] finish_task_switch+0xb6/0x280 [ 2844.624698][T10700] __schedule+0x63b/0x8c0 [ 2844.629026][T10700] __cond_resched+0x28/0x50 [ 2844.633530][T10700] do_recvmmsg+0x565/0x720 [ 2844.637943][T10700] __x64_sys_recvmmsg+0xe2/0x160 [ 2844.642889][T10700] do_syscall_64+0x41/0xc0 [ 2844.647306][T10700] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2844.653201][T10700] [ 2844.655519][T10700] read to 0xffffffff85a079c0 of 8 bytes by task 10700 on cpu 0: [ 2844.663138][T10700] mem_cgroup_flush_stats+0x5d/0xd0 [ 2844.668337][T10700] shrink_node+0x304/0x15c0 [ 2844.672842][T10700] do_try_to_free_pages+0x43d/0xce0 [ 2844.678039][T10700] try_to_free_mem_cgroup_pages+0x1e2/0x480 [ 2844.683931][T10700] try_charge_memcg+0x280/0xd20 [ 2844.688779][T10700] obj_cgroup_charge_pages+0xab/0x130 [ 2844.694155][T10700] __memcg_kmem_charge_page+0x1d5/0x2c0 [ 2844.699704][T10700] __alloc_pages+0x1bb/0x340 [ 2844.704295][T10700] alloc_pages+0x3e1/0x4e0 [ 2844.708711][T10700] __vmalloc_node_range+0x6d2/0xea0 [ 2844.713919][T10700] kvmalloc_node+0x121/0x160 [ 2844.718520][T10700] xt_alloc_table_info+0x3d/0x80 [ 2844.723453][T10700] do_arpt_set_ctl+0x615/0x1390 [ 2844.728311][T10700] nf_setsockopt+0x18d/0x1b0 [ 2844.732911][T10700] ip_setsockopt+0xe6/0x100 [ 2844.737421][T10700] tcp_setsockopt+0x90/0xa0 [ 2844.741931][T10700] sock_common_setsockopt+0x61/0x70 [ 2844.747138][T10700] __sys_setsockopt+0x1c9/0x230 [ 2844.752003][T10700] __x64_sys_setsockopt+0x66/0x80 [ 2844.757034][T10700] do_syscall_64+0x41/0xc0 [ 2844.761450][T10700] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2844.767345][T10700] [ 2844.769668][T10700] value changed: 0x000000010003e1cf -> 0x000000010003e1d0 [ 2844.776764][T10700] [ 2844.779084][T10700] Reported by Kernel Concurrency Sanitizer on: [ 2844.785230][T10700] CPU: 0 PID: 10700 Comm: syz-executor.0 Not tainted 6.4.0-syzkaller-08686-ge55e5df193d2 #0 [ 2844.795298][T10700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 2844.805353][T10700] ================================================================== 04:39:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 04:39:11 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x2723000000000000, 0x7f06) 04:39:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x5865) 04:39:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x3000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xc5, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x65580000}, 0x0) [ 2845.018211][T10711] loop3: detected capacity change from 0 to 128 04:39:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) 04:39:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x6000) 04:39:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0xe, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x6558) 04:39:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x88470000}, 0x0) 04:39:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x8000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:12 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x2803000000000000, 0x7f06) 04:39:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x8100) 04:39:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x88480000}, 0x0) 04:39:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xfeffffff}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xc6, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x8847) 04:39:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) 04:39:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x8848) [ 2846.055881][T10743] loop3: detected capacity change from 0 to 128 04:39:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xeaffffff}, 0x0) 04:39:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x34000) 04:39:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0xf, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xfffffffe}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 04:39:13 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x2823000000000000, 0x7f06) 04:39:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x400300) 04:39:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xc7, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x1000000) 04:39:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) 04:39:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x1510000) [ 2847.089669][T10771] loop3: detected capacity change from 0 to 128 04:39:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xffffa888}, 0x0) 04:39:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 04:39:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x10, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x2000000) 04:39:14 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x3f00000000000000, 0x7f06) 04:39:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xffffffea}, 0x0) 04:39:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x2}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x4000000) 04:39:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xc8, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x5000000) 04:39:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 04:39:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) 04:39:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x6000000) [ 2848.136715][T10799] loop3: detected capacity change from 0 to 128 04:39:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x8000000) 04:39:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x2) 04:39:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x11, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:15 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x4000000000000000, 0x7f06) 04:39:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xa000000) 04:39:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x3}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x3) 04:39:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xc9, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xc000000) 04:39:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x4) 04:39:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xf000000) [ 2849.077855][T10827] loop3: detected capacity change from 0 to 128 04:39:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x10000000) 04:39:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x5) 04:39:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x12, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x6) 04:39:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x8}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x103e0000) 04:39:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x8) 04:39:16 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x7001000000000000, 0x7f06) 04:39:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xca, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x60000000) 04:39:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x9) [ 2850.127260][T10856] loop3: detected capacity change from 0 to 128 04:39:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0xa) 04:39:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x65580000) 04:39:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0xc) 04:39:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x13, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x81000000) 04:39:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0xf) 04:39:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x300}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x88470000) 04:39:17 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0x7f51010000000000, 0x7f06) 04:39:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x10) 04:39:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x88480000) 04:39:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="8500000022000000350000000000ba00850000007d000000950000000000000000000000af5d6806f81f06a9cf4ef5e1a1cf5fc6dd8442230e7953f91136aa5f7035175100100163cf09224638e1c74947c4d68dec7b5944b82d42933b8549f8180000e90a847687a1ef1f83dd6c1023158a1086f7d0f9dce43583554bc34eaff877007c01c28fcda2d839e797ad9913b6f859fd7a49a27d38ecee6156c599c7b297de0019b23cf09c0a63977de967bfb3fe241454a04080bf5e9ce021879c820f9b80fe2338a820db941148c40b313532b18ac144e64205a1014a8ad0c5d301d02c4004be5911cc7bf16c8a02b6f573db051357c7e9f32c7a458f129a8d8bc9a5d9054458e6eda991000147c1db038ba3768184040085d333135a91e31bb4cd69d238da3e00ccc67d4b056be3a93c2b02e2d9c3ef84ddd41323cbbbcdd0a88586dc2b4793ec81992ce9c95c40b0347999f95569c078ca27891fdd4f8bf75a3205e20e7f230961ef10fefa620e454652bb67ede3686c8795c4271f7c80615a3f2b4e1182c911db0206000055c274266a6c70b8d24faf36eb13977cfc5f5e9a65265f74241d9b2eb1ce4bb9063802ec1390abf2d4c933ba52935a3baf94c10c986148eea184a08b0d26e2000000000000b343c380f1615a28a151d946787f660ae058894c75a335c16100005d8d06ed9aff4973d3219b4533000008000000008000000000000025a3606dd26208feb50da65397adb00cc13b990b2da6970ba0193cf71ad5eec316d07d926c2e9645b6ac643dc2c2a4346f464989567aadb67f0000000000000fff816e182d51d3407d3e536b86687b70a0bf336a862716faab6aba8a589e21892614494591a19b2b5c6eb6025a8509e69b650bfa00000000000000004e46a1f98709af64e7e7ef9d600fa2f2c5d45dc44035aba79da482602b9abc44000000000000000000000000000000000000007f9e62efc618ecac7967e53dd29f9903cf0ba73b75485043de5e28e9"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x1000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xcb, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x14) 04:39:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x60) [ 2851.228778][T10889] loop3: detected capacity change from 0 to 128 04:39:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x14, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x88a8ffff) 04:39:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x300) 04:39:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x2000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x500) 04:39:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x600) 04:39:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xeaffffff) 04:39:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x3000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:18 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xf4ffffff00000000, 0x7f06) 04:39:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xcc, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xf0ffffff) 04:39:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x900) [ 2852.242710][T10920] loop3: detected capacity change from 0 to 128 04:39:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x15, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xfeffffff) 04:39:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0xa00) 04:39:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x8000000}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xffffa888) 04:39:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0xc00) 04:39:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xffffff7f) 04:39:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0xf00) 04:39:19 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$eJzs3E9oE2kYx/GnTbftdmkTlmVhF3b32e1ld5GhyVlog7QiBiraSLUgTO1EQ8YkZEI0RZoIQi8evPjvrIJIoSAeBKHUgydpkd48eOutB+vJIuJIOq1patpqTZui388hecj7/l7e+ZMheSdkYf/Vc4mYY8TMrDS2NkhjjxRlqUEC0iirivLf+cnnfxw7cfJwOBLpParaFx4IhlS146+poYsT/0xnfzr+sONxi8wETi0shuZnfp35beH9wNm4o3FHk6msmjqcSmXNYdvSketOwlA9YlumY2k86ViZivaYnUqn82omR9rb0hnLcdRM5jVh5TWb0mwmr+YZM55UwzC0vU2wuYncrfDGrdH7S64ri9lnrttSFNe3/GLr1qM21XCGqKfl4++63vF3XRG5Uu8pYRetuai3itjjuWgu6j177eGYxMUWS7rEL++kdI64tyfd5VOl9HghNBmZ+//pE1UNyJhdWMkXclFfZT4ofgl4GY9X9x2K9AbVU5n/QdrW5kPil19E3B5ZGaScD1XNN8u/nWvyhvhl7rSkxJbZqb/fzPeP31jNjwVVD/RH1uV/lJHybrr3uk7HBwAAAAAAAACA7TD0o6rr90apw+VRVW1f1+7lq90fWL++31V1fb5Jfuc2IgAAAAAAu8LJjyZM27YyX1mUvsrXYpxvr7hz6fM7/9m3eZ/Obt9sz4tiei9s1xcUbwf3xDQqi9UfsW/V2Vfjd0q5eFWTcRpW5rdxn4NDLx9sOU7zJ/tnI9M7f1UCAAAAsBPKH/q7pRB7lCsM7rtW7zkBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPC92cZfjs3erNakpeLnu9Wa6r2NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/kQAAD//8cUylc=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xfbffffff00000000, 0x7f06) 04:39:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xffffffea) 04:39:19 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x1400) 04:39:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0xfeffffff}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2853.320697][T10953] loop3: detected capacity change from 0 to 128 04:39:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0x0, 0x0, 0x200, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x16, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) 04:39:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x1fffffbf, 0xcd, 0x0, 0x200, 0x300, 0x300, 0x3f00, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge0\x00', 'ip6gre0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 04:39:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x255d) 04:39:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xfffffff0) 04:39:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0xfffffffe}, 0x28) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) 04:39:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0xfffffffe) 04:39:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x4788) 04:39:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x40030000000000) 04:39:20 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2b7, &(0x7f00000007c0)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddr={0x18, 0x16, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'gretap0\x00', 0x0}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000004880)='cgroup.procs\x00', 0x2, 0x0) writev(r4, &(0x7f0000000280)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r7 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) sendfile(r7, r7, &(0x7f0000000240)=0xfbffffffffffffff, 0x7f06) 04:39:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x4888) 04:39:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@mpls_delroute={0x12, 0x19, 0x1}, 0x1c}}, 0x100000000000000) 04:39:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d}, 0x90) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x80041284, 0xffffffffffffffff) [ 2854.316269][T10982] loop3: detected capacity change from 0 to 128