Warning: Permanently added '[localhost]:47399' (ECDSA) to the list of known hosts. 2026/01/15 23:11:07 fuzzer started 2026/01/15 23:11:07 dialing manager at localhost:35245 syzkaller login: [ 50.154236] cgroup: Unknown subsys name 'net' [ 50.224879] cgroup: Unknown subsys name 'cpuset' [ 50.244987] cgroup: Unknown subsys name 'rlimit' 2026/01/15 23:11:19 syscalls: 203 2026/01/15 23:11:19 code coverage: enabled 2026/01/15 23:11:19 comparison tracing: enabled 2026/01/15 23:11:19 extra coverage: enabled 2026/01/15 23:11:19 setuid sandbox: enabled 2026/01/15 23:11:19 namespace sandbox: enabled 2026/01/15 23:11:19 Android sandbox: enabled 2026/01/15 23:11:19 fault injection: enabled 2026/01/15 23:11:19 leak checking: enabled 2026/01/15 23:11:19 net packet injection: enabled 2026/01/15 23:11:19 net device setup: enabled 2026/01/15 23:11:19 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2026/01/15 23:11:19 devlink PCI setup: PCI device 0000:00:10.0 is not available 2026/01/15 23:11:19 USB emulation: enabled 2026/01/15 23:11:19 hci packet injection: enabled 2026/01/15 23:11:19 wifi device emulation: enabled 2026/01/15 23:11:19 802.15.4 emulation: enabled 2026/01/15 23:11:19 fetching corpus: 0, signal 0/0 (executing program) 2026/01/15 23:11:20 starting 8 fuzzer processes 23:11:20 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0xed, 0x1, 0x3f, 0x1, 0x0, 0x100000000, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x600000, 0x0, @perf_config_ext={0x3}, 0x200, 0x9, 0x2, 0x1, 0x2, 0x0, 0x7, 0x0, 0x80, 0x0, 0x7fff}) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1, 0x20, 0x7b, 0x0, 0x5eb, 0x92001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf0f2, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x40000, 0x3ff, 0x1, 0x0, 0x5acb, 0xba, 0x8, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x1, 0x20, 0x3, 0x0, 0x7f, 0x4, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1e4, 0x4, @perf_config_ext={0x101, 0xffff}, 0x2000, 0x80, 0xb11, 0x4, 0x3ff, 0x5c87, 0x5, 0x0, 0x7ff, 0x0, 0xa6}, 0xffffffffffffffff, 0xa, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000002, 0x4000010, r0, 0x4) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x80, 0xfc, 0x8, 0x7, 0x0, 0x8000, 0x62, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6000, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x4, 0x1, 0x1, 0x20, 0x2, 0x0, 0x1f, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000400), 0x109000, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x20, 0x1f, 0x9c, 0x0, 0xa, 0x40008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000340)}, 0x0, 0x18, 0x8, 0x2, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x1}, r2, 0xa, r0, 0x9) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x5, 0x3f, 0x2, 0x3f, 0x0, 0x9, 0x80000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x18e9, 0x3f, 0x6, 0x3, 0xffffffff, 0x89, 0x200, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x0) socketpair(0x21, 0xa, 0x4, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$packet(r3, &(0x7f0000000540)=""/131, 0x83, 0x2040, &(0x7f0000000600)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000680)={0x9af0, 0x5b4, 0x8, 0x7}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8011) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e22, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}, 0x0, 0x0, 0x4f, 0x0, "59d71ac28975e0526729bcae336ddc5a226a4c372aed14dc659d7c330df976101cafec0e7a3d498fbf75a7e73dc04b080354250c2ef21490a433cfe6b2bfe903bfe20f7aff0b6ac1bc8b2c101b950668"}, 0xd8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000008c0)={0x1, 0x80, 0x59, 0x9, 0x3f, 0x6, 0x0, 0xeea, 0x40, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75, 0x0, @perf_config_ext={0x1ff, 0x7}, 0x3490, 0xfffffffffffffff4, 0x8, 0x8, 0x0, 0xffff8000, 0x4, 0x0, 0x400, 0x0, 0x5c35}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000940), &(0x7f0000000980)=0x14) accept$packet(r5, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) 23:11:20 executing program 7: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4044010}, 0xc1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7fff}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0xd3}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4000041) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x3, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x28100, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x9}]}, 0x4c}}, 0x4800) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x64, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x400d0}, 0x4000) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x44, r5, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000091}, 0x91) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4810}, 0x0) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r1, 0x408, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x14050}, 0x2000c055) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0xd1}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r7, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x38, r6, 0x300, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x94}, 0x845) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f0000000d00)={'wpan4\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r8, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x58, r5, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r9}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000004) 23:11:20 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}}, 0x240400d4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48004}, 0x885) r1 = clone3(&(0x7f0000000540)={0x200010800, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0xd}, &(0x7f0000000400)=""/43, 0x2b, &(0x7f0000000440)=""/192, &(0x7f0000000500)=[0xffffffffffffffff], 0x1}, 0x58) wait4(r2, &(0x7f00000005c0), 0x8, &(0x7f0000000600)) r3 = pidfd_open(r1, 0x0) process_mrelease(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x35, 0x0, "0e10f22863d7e5d2dd29ec07e4c76a5d83e613c06d87f00b0c9c371e12f253a147bef404b4c19c8a87f51603353fef74bfec73e0ad8b16376c3eb788f90fb2f2c83c32aedc41621da8d377fb129a0a84"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000800), 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000840)=@ccm_128={{0x304}, "4afcc0165c43df32", "915e4392a40ff28a85e4440489dc81ab", "3fae7ea6", "346e52d6b99297b1"}, 0x28) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) sendmsg$AUDIT_USER(r5, &(0x7f0000000b00)={&(0x7f0000000980), 0xc, &(0x7f0000000ac0)={&(0x7f00000009c0)={0xf0, 0x3ed, 0xb06, 0x70bd29, 0x25dfdbfb, "71021228acc4a6312c70f9aa7b5fab3047fae0d835b8766876d82e2afdb2f803f989ed00861bea634dacc8c59ce1f39f5cf7e071fae59b6079363e0c2f896d35a31cfedf6704e5ee159e7cca1b2d4c6b4b3e04518ed367d547b46cc1c2327f661d5c4e75f51df702ce7f80bb07bdefe10301681f662b66174e2e82da4f68b2afb96a32611a78efd32d4e7063ff292001a8c8036ffb2f47cd055979d92e4bd55514a4d6824ad2b3460afdc0ccde24666f478ac6a11297a72dca92bd78dd481e49e7eddee3335bb507f55306b3354acd7fd306e2088f20fc5e6be55a79ef75", ["", "", "", ""]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x488c0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000b40)='htcp\x00', 0x5) socketpair(0x26, 0x800, 0x9, &(0x7f0000000b80)) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000c00), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000cc0)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x20101000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, r6, 0x201, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x884) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x2c, r6, 0x200, 0x70bd25, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000880}, 0x40c1) 23:11:20 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) r8 = accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) read$char_usb(r0, &(0x7f00000008c0)=""/131, 0x83) r10 = accept$packet(r8, 0x0, &(0x7f0000000980)) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) connect$packet(r10, &(0x7f0000000a40)={0x11, 0x7, r11, 0x1, 0x8}, 0x14) accept4$packet(r4, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000ac0)=0x14, 0x80800) pipe2(&(0x7f0000000b00), 0x80000) 23:11:20 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"1242df624590531b17ac8ee915e6b73a", 0x0, r0, {0x0, 0x400}, {0x3f, 0x4}, 0xff, [0x200, 0x2, 0x5, 0x28b2, 0x4, 0x4, 0x7, 0x5, 0x40, 0x7, 0x100, 0x81, 0x40, 0x107, 0x5, 0x101]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x6, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e20, 0x10001, @mcast2, 0x1}}, 0x0, 0x0, 0x1e, 0x0, "e46429e104fec92646ba066bcde8f859b21c1428bd3bf0b3977f8f2445867126c1b56f98ab9d48ef04b625081bf49233584eba8c02a8ff6a2c71d8f60a406534c3998bf965dabc23e654e43aa950d1a6"}, 0xd8) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000300)={"498e003672bf84a06e2086e0b12bbbe1", r1, r1, {0x4, 0x4c}, {0x20, 0x100}, 0x5, [0x2000000000000, 0x6, 0xfffffffffffffff8, 0x7f, 0x3, 0x1, 0xffffffff80000000, 0x9, 0x7, 0x7, 0x9, 0xfffffffffffffc00, 0x8001, 0x7, 0x1, 0x7f]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000400)={"33683405069f77b537f22f1dae09beeb", r0, r4, {0x7a4e, 0xffff}, {0x1, 0x6}, 0x100000001, [0x1, 0x9f, 0x2, 0x6, 0x0, 0x4, 0x0, 0x4, 0xffff, 0x8, 0x1, 0x8, 0x80000000, 0x2, 0x9]}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000500), 0x400280, 0x0) sendmsg$AUDIT_GET_FEATURE(r5, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3fb, 0x4, 0x70bd29, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4048040}, 0x4040000) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000640), 0x2208c0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r6, 0x80089418, &(0x7f0000000680)) r7 = openat$cgroup_pressure(r5, &(0x7f00000006c0)='cpu.pressure\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000700), 0x4) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f0000000740)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000780)={"bf1db8e365f84571e9e478bbc5895482", r4, r8, {0x0, 0x20}, {0x2, 0x10000000}, 0x5, [0xffffffff, 0x1, 0x1, 0x1ff, 0x0, 0x3ff9, 0xffffffffffffff40, 0x9, 0x7ff, 0x9, 0x871, 0xf8, 0xc4, 0x50000000000, 0x58, 0x8]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r6, 0xc0c89425, &(0x7f0000000880)={"9956c1db96ed1ec45cf7a017c7012953", r0, r2, {0x8, 0x80}, {0x640, 0x3}, 0x7, [0x0, 0x7, 0x3ff, 0x2, 0x4, 0x3f, 0xab33, 0x7, 0x1ff, 0x3, 0x2, 0x7, 0x3, 0x0, 0x1, 0x955]}) r9 = socket(0x15, 0x2, 0x4) syz_genetlink_get_family_id$wireguard(&(0x7f0000000980), r9) openat$sr(0xffffffffffffff9c, &(0x7f00000009c0), 0x10040, 0x0) [ 61.271009] audit: type=1400 audit(1768518680.373:7): avc: denied { execmem } for pid=273 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 23:11:20 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) r1 = accept4$packet(r0, 0x0, &(0x7f0000001080), 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001140)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000001240)=0xe8) recvfrom$packet(r1, &(0x7f00000010c0)=""/78, 0x4e, 0x21, &(0x7f0000001280)={0x11, 0xf6, r2, 0x1, 0x5, 0x6, @broadcast}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r3, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001300)=0x14, 0x0) sendmsg$AUDIT_USER(r0, &(0x7f00000014c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001480)={&(0x7f0000001380)={0xf8, 0x3ed, 0x20, 0x70bd2c, 0x25dfdbff, "0c0349f7d4b20ce63403e1de7d754f6e41b969f1155ab52dd615e37650869b52ce14706452c46557614b56e55cb1c1501fa7d97af914cd9b8736a62f559f1740c23b516d74d7f987a16784e86d42f9c9e1428f4e60653b6f4665df81eea9065a20e6e10689b4158f91e507737868c4e7921ba6e98c3f27c72e6a17d888256e54260519b77514ed7f017243f0d1d0cc7e9641ac018253fec0168132c00a8d6a465313b5a408f255452fdcefefd5d8b4d12051ab2623b2df6478aec158b48212011cf10980104e4a5d268d1aeb0ee40c64a43645e7e82011388af35294aa50d1e41db8616e158f8494", ["", "", "", "", "", "", "", "", ""]}, 0xf8}, 0x1, 0x0, 0x0, 0x8080}, 0x4) bind$packet(r3, &(0x7f0000001500)={0x11, 0xf6, r4, 0x1, 0x8}, 0x14) openat$cgroup_int(r0, &(0x7f0000001540)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000001580), &(0x7f00000015c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000001600)={0x0, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000001700)={'wg2\x00', 0x0}) sendto$packet(r3, &(0x7f0000001640)="0806973848a138de3c8430aa8fef21089f586181b45cb7bc04642cc384176e6d69edbabf24ec0e004dde5e7c1cb47d338d3ea1c4f5a9ac4a5c9a8d723e007b8e19b4f1455635460828d791459f7ae904734f2c2420e1be3aae8f3f1c0ec698eebfb7acdb8ef8509f5fcdb6c10d690f38ca09ac2f67312398d6", 0x79, 0x20040801, &(0x7f0000001740)={0x11, 0x9, r6, 0x1, 0x1, 0x6, @local}, 0x14) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000001780), 0xac081, 0x0) openat$cgroup_pressure(r7, &(0x7f00000017c0)='io.pressure\x00', 0x2, 0x0) openat$cgroup_procs(r7, &(0x7f0000001800)='tasks\x00', 0x2, 0x0) r8 = accept$packet(r5, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001880)=0x14) getpeername$packet(r1, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000019c0)={r9, 0x1, 0x6, @remote}, 0x10) 23:11:20 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) bind$packet(r2, &(0x7f0000000740)={0x11, 0x4, r4, 0x1, 0xb1, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in6={{0xa, 0x4e23, 0x1, @private0, 0xffff}}, 0x0, 0x0, 0x10, 0x0, "7efd4c82421304799b540736dc3d1c70f2feeaa25f39ba369bc3c9874941aa983057b14b4f2800ddb62bfb29e7f1c118b8a24e19901683a47b3bef0a466ccea00067f76ad564640e59abc244af08ad82"}, 0xd8) accept4$packet(r2, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14, 0x80800) pipe2(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x180000) getsockname$packet(r5, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000980)=0x14) r6 = openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) recvfrom$packet(r6, &(0x7f0000000a00)=""/146, 0x92, 0x182, &(0x7f0000000ac0)={0x11, 0x4, r3, 0x1, 0x5, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}, 0x14) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:11:20 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000016c0), 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0xffff, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001780)="66856d34ca550d90368d7270101adf4be276e063379777f4c566c0582a68b9ae4631e2da7225a166cd09a2b5f620bedfa00825c924a8445976e7c3ade10175daa6527d4a4dc39a0a7d775d0e4c3d1850d7cbe27d2034ade206af5acc48c424dbfff07514f7cc1117d21c49680757e2959141e7788bc3c2d7e052c3ade33040bd6cdfde342d51f8e53b652fb81237f5d566f65d28142f8a2059f15a5bba742a0d9e0796a99764065bea2b0094a33431f2cf742bec82d439b7164cbb1f197c", 0xbe, 0xf5}, {&(0x7f0000001840)="d17795edd43721d494a068ed81715686349410a5d79a775282f816fb2bb7af7b0debdfd3b2316b938de1b3a448cfb9b91bd5394564ba14f05b95af16a759775fa9f17c7f1efdee0e56b7cde0f11452ade11261ecbcd72d58fb6fe7bf80d0ffa424763537d875c2e4ce9fe1ec50a3d26b6a4e932b6d907bdd0a390ecbc957dcf1417845db198141e4ae3767a53b545a8133ba041aa835efdc8de0fae79cb3a35776e8ea5b70509af1248f33d7fd33b803", 0xb0, 0x80000001}, {&(0x7f0000001900)="5b1c22e9c7080d1d13474d157ab27026fd1f4d53832be33b5330b9d7ea2bdd299374128f63ad4cf8b481888ec1fa521b062ee9", 0x33, 0xf35}, {&(0x7f0000001940)="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", 0xfd, 0x100000}, {&(0x7f0000001a40)="e062810b747bc65f5703e06cc3a241346105593cc8cbbd42bd1da280ef602470346375165484ab281362e10b28e66732c0bfd8b4615c3b96dd73df287264e9d4a67fbf", 0x43, 0x7fff}], 0x400, &(0x7f0000001b40)={[{@fat=@tz_utc}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@tz_utc}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x5}}, {@fat=@dmask}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000001c00)=@gcm_256={{0x304}, "5387cafab1126784", "ef1d0499737e2da2466211d3f87d4b842a9907c69659a8e1bdb6181496afc23e", "ade94c58", "a6c4412e1fd84f0e"}, 0x38) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000001c40)="1d8d3f6c64b6f608eed9dc9734064b3d", 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000001c80)) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r6, &(0x7f0000001dc0)={&(0x7f0000001d00)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001d80)={&(0x7f0000001d40)={0x2c, 0x3f7, 0x20, 0x70bd2a, 0x25dfdbff, {0x7, 0xd, './file1', './file0/file0'}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0xc840}, 0x0) [ 62.421531] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 62.423340] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 62.427536] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 62.429197] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 62.432140] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 62.433765] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 62.439565] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 62.444438] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 62.445664] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 62.455415] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 62.535731] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 62.539893] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 62.546298] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 62.547689] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 62.552680] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 62.556774] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 62.558449] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 62.558635] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 62.562318] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 62.563508] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 62.565959] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 62.566378] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 62.568717] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 62.570550] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 62.572471] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 62.577497] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 62.581455] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 62.583121] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 62.584781] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 62.589069] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 62.591389] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 62.591719] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 62.594183] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 62.598035] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 62.599666] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 62.652783] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 62.665520] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 62.670520] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 62.691873] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 62.694093] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 64.506617] Bluetooth: hci1: command tx timeout [ 64.508076] Bluetooth: hci0: command tx timeout [ 64.634305] Bluetooth: hci5: command tx timeout [ 64.634985] Bluetooth: hci2: command tx timeout [ 64.697333] Bluetooth: hci3: command tx timeout [ 64.699418] Bluetooth: hci4: command tx timeout [ 64.699884] Bluetooth: hci6: command tx timeout [ 64.762335] Bluetooth: hci7: command tx timeout [ 66.554333] Bluetooth: hci0: command tx timeout [ 66.554748] Bluetooth: hci1: command tx timeout [ 66.681343] Bluetooth: hci2: command tx timeout [ 66.681749] Bluetooth: hci5: command tx timeout [ 66.745354] Bluetooth: hci6: command tx timeout [ 66.745758] Bluetooth: hci4: command tx timeout [ 66.746127] Bluetooth: hci3: command tx timeout [ 66.810277] Bluetooth: hci7: command tx timeout [ 68.602310] Bluetooth: hci1: command tx timeout [ 68.602729] Bluetooth: hci0: command tx timeout [ 68.729330] Bluetooth: hci5: command tx timeout [ 68.729731] Bluetooth: hci2: command tx timeout [ 68.794321] Bluetooth: hci3: command tx timeout [ 68.794709] Bluetooth: hci4: command tx timeout [ 68.795083] Bluetooth: hci6: command tx timeout [ 68.858321] Bluetooth: hci7: command tx timeout [ 70.650329] Bluetooth: hci0: command tx timeout [ 70.650371] Bluetooth: hci1: command tx timeout [ 70.778588] Bluetooth: hci2: command tx timeout [ 70.778964] Bluetooth: hci5: command tx timeout [ 70.842317] Bluetooth: hci6: command tx timeout [ 70.842392] Bluetooth: hci4: command tx timeout [ 70.842740] Bluetooth: hci3: command tx timeout [ 70.906585] Bluetooth: hci7: command tx timeout [ 95.139181] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 95.139874] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 95.278587] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 95.279217] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 95.920163] audit: type=1400 audit(1768518715.022:8): avc: denied { open } for pid=3740 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 95.983905] audit: type=1400 audit(1768518715.086:9): avc: denied { kernel } for pid=3740 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 96.312991] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 96.313650] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 96.415880] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 96.416491] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 96.774621] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 96.775215] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 96.956694] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 96.957868] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.313769] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.314437] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.364140] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.368521] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.497029] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.498300] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.518783] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.519431] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.647347] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.647996] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.714321] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.715917] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.851795] loop6: detected capacity change from 0 to 264192 [ 97.854464] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 97.923786] loop6: detected capacity change from 0 to 264192 [ 97.924702] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 97.990585] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.991205] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 98.025784] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 98.026423] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 98.129655] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 98.130296] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 98.184811] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 98.185998] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 23:12:08 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"1242df624590531b17ac8ee915e6b73a", 0x0, r0, {0x0, 0x400}, {0x3f, 0x4}, 0xff, [0x200, 0x2, 0x5, 0x28b2, 0x4, 0x4, 0x7, 0x5, 0x40, 0x7, 0x100, 0x81, 0x40, 0x107, 0x5, 0x101]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x6, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e20, 0x10001, @mcast2, 0x1}}, 0x0, 0x0, 0x1e, 0x0, "e46429e104fec92646ba066bcde8f859b21c1428bd3bf0b3977f8f2445867126c1b56f98ab9d48ef04b625081bf49233584eba8c02a8ff6a2c71d8f60a406534c3998bf965dabc23e654e43aa950d1a6"}, 0xd8) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000300)={"498e003672bf84a06e2086e0b12bbbe1", r1, r1, {0x4, 0x4c}, {0x20, 0x100}, 0x5, [0x2000000000000, 0x6, 0xfffffffffffffff8, 0x7f, 0x3, 0x1, 0xffffffff80000000, 0x9, 0x7, 0x7, 0x9, 0xfffffffffffffc00, 0x8001, 0x7, 0x1, 0x7f]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000400)={"33683405069f77b537f22f1dae09beeb", r0, r4, {0x7a4e, 0xffff}, {0x1, 0x6}, 0x100000001, [0x1, 0x9f, 0x2, 0x6, 0x0, 0x4, 0x0, 0x4, 0xffff, 0x8, 0x1, 0x8, 0x80000000, 0x2, 0x9]}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000500), 0x400280, 0x0) sendmsg$AUDIT_GET_FEATURE(r5, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3fb, 0x4, 0x70bd29, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4048040}, 0x4040000) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000640), 0x2208c0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r6, 0x80089418, &(0x7f0000000680)) r7 = openat$cgroup_pressure(r5, &(0x7f00000006c0)='cpu.pressure\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000700), 0x4) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f0000000740)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000780)={"bf1db8e365f84571e9e478bbc5895482", r4, r8, {0x0, 0x20}, {0x2, 0x10000000}, 0x5, [0xffffffff, 0x1, 0x1, 0x1ff, 0x0, 0x3ff9, 0xffffffffffffff40, 0x9, 0x7ff, 0x9, 0x871, 0xf8, 0xc4, 0x50000000000, 0x58, 0x8]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r6, 0xc0c89425, &(0x7f0000000880)={"9956c1db96ed1ec45cf7a017c7012953", r0, r2, {0x8, 0x80}, {0x640, 0x3}, 0x7, [0x0, 0x7, 0x3ff, 0x2, 0x4, 0x3f, 0xab33, 0x7, 0x1ff, 0x3, 0x2, 0x7, 0x3, 0x0, 0x1, 0x955]}) r9 = socket(0x15, 0x2, 0x4) syz_genetlink_get_family_id$wireguard(&(0x7f0000000980), r9) openat$sr(0xffffffffffffff9c, &(0x7f00000009c0), 0x10040, 0x0) 23:12:08 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) r1 = accept4$packet(r0, 0x0, &(0x7f0000001080), 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001140)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000001240)=0xe8) recvfrom$packet(r1, &(0x7f00000010c0)=""/78, 0x4e, 0x21, &(0x7f0000001280)={0x11, 0xf6, r2, 0x1, 0x5, 0x6, @broadcast}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r3, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001300)=0x14, 0x0) sendmsg$AUDIT_USER(r0, &(0x7f00000014c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001480)={&(0x7f0000001380)={0xf8, 0x3ed, 0x20, 0x70bd2c, 0x25dfdbff, "0c0349f7d4b20ce63403e1de7d754f6e41b969f1155ab52dd615e37650869b52ce14706452c46557614b56e55cb1c1501fa7d97af914cd9b8736a62f559f1740c23b516d74d7f987a16784e86d42f9c9e1428f4e60653b6f4665df81eea9065a20e6e10689b4158f91e507737868c4e7921ba6e98c3f27c72e6a17d888256e54260519b77514ed7f017243f0d1d0cc7e9641ac018253fec0168132c00a8d6a465313b5a408f255452fdcefefd5d8b4d12051ab2623b2df6478aec158b48212011cf10980104e4a5d268d1aeb0ee40c64a43645e7e82011388af35294aa50d1e41db8616e158f8494", ["", "", "", "", "", "", "", "", ""]}, 0xf8}, 0x1, 0x0, 0x0, 0x8080}, 0x4) bind$packet(r3, &(0x7f0000001500)={0x11, 0xf6, r4, 0x1, 0x8}, 0x14) openat$cgroup_int(r0, &(0x7f0000001540)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000001580), &(0x7f00000015c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000001600)={0x0, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000001700)={'wg2\x00', 0x0}) sendto$packet(r3, &(0x7f0000001640)="0806973848a138de3c8430aa8fef21089f586181b45cb7bc04642cc384176e6d69edbabf24ec0e004dde5e7c1cb47d338d3ea1c4f5a9ac4a5c9a8d723e007b8e19b4f1455635460828d791459f7ae904734f2c2420e1be3aae8f3f1c0ec698eebfb7acdb8ef8509f5fcdb6c10d690f38ca09ac2f67312398d6", 0x79, 0x20040801, &(0x7f0000001740)={0x11, 0x9, r6, 0x1, 0x1, 0x6, @local}, 0x14) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000001780), 0xac081, 0x0) openat$cgroup_pressure(r7, &(0x7f00000017c0)='io.pressure\x00', 0x2, 0x0) openat$cgroup_procs(r7, &(0x7f0000001800)='tasks\x00', 0x2, 0x0) r8 = accept$packet(r5, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001880)=0x14) getpeername$packet(r1, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000019c0)={r9, 0x1, 0x6, @remote}, 0x10) 23:12:08 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) bind$packet(r2, &(0x7f0000000740)={0x11, 0x4, r4, 0x1, 0xb1, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in6={{0xa, 0x4e23, 0x1, @private0, 0xffff}}, 0x0, 0x0, 0x10, 0x0, "7efd4c82421304799b540736dc3d1c70f2feeaa25f39ba369bc3c9874941aa983057b14b4f2800ddb62bfb29e7f1c118b8a24e19901683a47b3bef0a466ccea00067f76ad564640e59abc244af08ad82"}, 0xd8) accept4$packet(r2, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14, 0x80800) pipe2(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x180000) getsockname$packet(r5, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000980)=0x14) r6 = openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) recvfrom$packet(r6, &(0x7f0000000a00)=""/146, 0x92, 0x182, &(0x7f0000000ac0)={0x11, 0x4, r3, 0x1, 0x5, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}, 0x14) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:08 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0xed, 0x1, 0x3f, 0x1, 0x0, 0x100000000, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x600000, 0x0, @perf_config_ext={0x3}, 0x200, 0x9, 0x2, 0x1, 0x2, 0x0, 0x7, 0x0, 0x80, 0x0, 0x7fff}) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1, 0x20, 0x7b, 0x0, 0x5eb, 0x92001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf0f2, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x40000, 0x3ff, 0x1, 0x0, 0x5acb, 0xba, 0x8, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x1, 0x20, 0x3, 0x0, 0x7f, 0x4, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1e4, 0x4, @perf_config_ext={0x101, 0xffff}, 0x2000, 0x80, 0xb11, 0x4, 0x3ff, 0x5c87, 0x5, 0x0, 0x7ff, 0x0, 0xa6}, 0xffffffffffffffff, 0xa, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000002, 0x4000010, r0, 0x4) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x80, 0xfc, 0x8, 0x7, 0x0, 0x8000, 0x62, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6000, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x4, 0x1, 0x1, 0x20, 0x2, 0x0, 0x1f, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000400), 0x109000, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x20, 0x1f, 0x9c, 0x0, 0xa, 0x40008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000340)}, 0x0, 0x18, 0x8, 0x2, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x1}, r2, 0xa, r0, 0x9) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x5, 0x3f, 0x2, 0x3f, 0x0, 0x9, 0x80000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x18e9, 0x3f, 0x6, 0x3, 0xffffffff, 0x89, 0x200, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x0) socketpair(0x21, 0xa, 0x4, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$packet(r3, &(0x7f0000000540)=""/131, 0x83, 0x2040, &(0x7f0000000600)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000680)={0x9af0, 0x5b4, 0x8, 0x7}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8011) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e22, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}, 0x0, 0x0, 0x4f, 0x0, "59d71ac28975e0526729bcae336ddc5a226a4c372aed14dc659d7c330df976101cafec0e7a3d498fbf75a7e73dc04b080354250c2ef21490a433cfe6b2bfe903bfe20f7aff0b6ac1bc8b2c101b950668"}, 0xd8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000008c0)={0x1, 0x80, 0x59, 0x9, 0x3f, 0x6, 0x0, 0xeea, 0x40, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75, 0x0, @perf_config_ext={0x1ff, 0x7}, 0x3490, 0xfffffffffffffff4, 0x8, 0x8, 0x0, 0xffff8000, 0x4, 0x0, 0x400, 0x0, 0x5c35}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000940), &(0x7f0000000980)=0x14) accept$packet(r5, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) 23:12:08 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) r8 = accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) read$char_usb(r0, &(0x7f00000008c0)=""/131, 0x83) r10 = accept$packet(r8, 0x0, &(0x7f0000000980)) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) connect$packet(r10, &(0x7f0000000a40)={0x11, 0x7, r11, 0x1, 0x8}, 0x14) accept4$packet(r4, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000ac0)=0x14, 0x80800) pipe2(&(0x7f0000000b00), 0x80000) 23:12:08 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000016c0), 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0xffff, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001780)="66856d34ca550d90368d7270101adf4be276e063379777f4c566c0582a68b9ae4631e2da7225a166cd09a2b5f620bedfa00825c924a8445976e7c3ade10175daa6527d4a4dc39a0a7d775d0e4c3d1850d7cbe27d2034ade206af5acc48c424dbfff07514f7cc1117d21c49680757e2959141e7788bc3c2d7e052c3ade33040bd6cdfde342d51f8e53b652fb81237f5d566f65d28142f8a2059f15a5bba742a0d9e0796a99764065bea2b0094a33431f2cf742bec82d439b7164cbb1f197c", 0xbe, 0xf5}, {&(0x7f0000001840)="d17795edd43721d494a068ed81715686349410a5d79a775282f816fb2bb7af7b0debdfd3b2316b938de1b3a448cfb9b91bd5394564ba14f05b95af16a759775fa9f17c7f1efdee0e56b7cde0f11452ade11261ecbcd72d58fb6fe7bf80d0ffa424763537d875c2e4ce9fe1ec50a3d26b6a4e932b6d907bdd0a390ecbc957dcf1417845db198141e4ae3767a53b545a8133ba041aa835efdc8de0fae79cb3a35776e8ea5b70509af1248f33d7fd33b803", 0xb0, 0x80000001}, {&(0x7f0000001900)="5b1c22e9c7080d1d13474d157ab27026fd1f4d53832be33b5330b9d7ea2bdd299374128f63ad4cf8b481888ec1fa521b062ee9", 0x33, 0xf35}, {&(0x7f0000001940)="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", 0xfd, 0x100000}, {&(0x7f0000001a40)="e062810b747bc65f5703e06cc3a241346105593cc8cbbd42bd1da280ef602470346375165484ab281362e10b28e66732c0bfd8b4615c3b96dd73df287264e9d4a67fbf", 0x43, 0x7fff}], 0x400, &(0x7f0000001b40)={[{@fat=@tz_utc}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@tz_utc}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x5}}, {@fat=@dmask}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000001c00)=@gcm_256={{0x304}, "5387cafab1126784", "ef1d0499737e2da2466211d3f87d4b842a9907c69659a8e1bdb6181496afc23e", "ade94c58", "a6c4412e1fd84f0e"}, 0x38) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000001c40)="1d8d3f6c64b6f608eed9dc9734064b3d", 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000001c80)) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r6, &(0x7f0000001dc0)={&(0x7f0000001d00)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001d80)={&(0x7f0000001d40)={0x2c, 0x3f7, 0x20, 0x70bd2a, 0x25dfdbff, {0x7, 0xd, './file1', './file0/file0'}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0xc840}, 0x0) 23:12:08 executing program 7: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4044010}, 0xc1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7fff}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0xd3}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4000041) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x3, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x28100, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x9}]}, 0x4c}}, 0x4800) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x64, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x400d0}, 0x4000) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x44, r5, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000091}, 0x91) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4810}, 0x0) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r1, 0x408, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x14050}, 0x2000c055) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0xd1}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r7, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x38, r6, 0x300, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x94}, 0x845) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f0000000d00)={'wpan4\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r8, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x58, r5, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r9}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000004) 23:12:08 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}}, 0x240400d4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48004}, 0x885) r1 = clone3(&(0x7f0000000540)={0x200010800, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0xd}, &(0x7f0000000400)=""/43, 0x2b, &(0x7f0000000440)=""/192, &(0x7f0000000500)=[0xffffffffffffffff], 0x1}, 0x58) wait4(r2, &(0x7f00000005c0), 0x8, &(0x7f0000000600)) r3 = pidfd_open(r1, 0x0) process_mrelease(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x35, 0x0, "0e10f22863d7e5d2dd29ec07e4c76a5d83e613c06d87f00b0c9c371e12f253a147bef404b4c19c8a87f51603353fef74bfec73e0ad8b16376c3eb788f90fb2f2c83c32aedc41621da8d377fb129a0a84"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000800), 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000840)=@ccm_128={{0x304}, "4afcc0165c43df32", "915e4392a40ff28a85e4440489dc81ab", "3fae7ea6", "346e52d6b99297b1"}, 0x28) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) [ 109.334537] loop6: detected capacity change from 0 to 264192 sendmsg$AUDIT_USER(r5, &(0x7f0000000b00)={&(0x7f0000000980), 0xc, &(0x7f0000000ac0)={&(0x7f00000009c0)={0xf0, 0x3ed, 0xb06, 0x70bd29, 0x25dfdbfb, "71021228acc4a6312c70f9aa7b5fab3047fae0d835b8766876d82e2afdb2f803f989ed00861bea634dacc8c59ce1f39f5cf7e071fae59b6079363e0c2f896d35a31cfedf6704e5ee159e7cca1b2d4c6b4b3e04518ed367d547b46cc1c2327f661d5c4e75f51df702ce7f80bb07bdefe10301681f662b66174e2e82da4f68b2afb96a32611a78efd32d4e7063ff292001a8c8036ffb2f47cd055979d92e4bd55514a4d6824ad2b3460afdc0ccde24666f478ac6a11297a72dca92bd78dd481e49e7eddee3335bb507f55306b3354acd7fd306e2088f20fc5e6be55a79ef75", ["", "", "", ""]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x488c0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000b40)='htcp\x00', 0x5) socketpair(0x26, 0x800, 0x9, &(0x7f0000000b80)) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000c00), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000cc0)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x20101000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, r6, 0x201, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x884) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x2c, r6, 0x200, 0x70bd25, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000880}, 0x40c1) [ 109.361681] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 23:12:08 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) bind$packet(r2, &(0x7f0000000740)={0x11, 0x4, r4, 0x1, 0xb1, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in6={{0xa, 0x4e23, 0x1, @private0, 0xffff}}, 0x0, 0x0, 0x10, 0x0, "7efd4c82421304799b540736dc3d1c70f2feeaa25f39ba369bc3c9874941aa983057b14b4f2800ddb62bfb29e7f1c118b8a24e19901683a47b3bef0a466ccea00067f76ad564640e59abc244af08ad82"}, 0xd8) accept4$packet(r2, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14, 0x80800) pipe2(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x180000) getsockname$packet(r5, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000980)=0x14) r6 = openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) recvfrom$packet(r6, &(0x7f0000000a00)=""/146, 0x92, 0x182, &(0x7f0000000ac0)={0x11, 0x4, r3, 0x1, 0x5, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}, 0x14) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:16 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) bind$packet(r2, &(0x7f0000000740)={0x11, 0x4, r4, 0x1, 0xb1, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in6={{0xa, 0x4e23, 0x1, @private0, 0xffff}}, 0x0, 0x0, 0x10, 0x0, "7efd4c82421304799b540736dc3d1c70f2feeaa25f39ba369bc3c9874941aa983057b14b4f2800ddb62bfb29e7f1c118b8a24e19901683a47b3bef0a466ccea00067f76ad564640e59abc244af08ad82"}, 0xd8) accept4$packet(r2, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14, 0x80800) pipe2(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x180000) getsockname$packet(r5, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000980)=0x14) r6 = openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) recvfrom$packet(r6, &(0x7f0000000a00)=""/146, 0x92, 0x182, &(0x7f0000000ac0)={0x11, 0x4, r3, 0x1, 0x5, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}, 0x14) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:16 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) r1 = accept4$packet(r0, 0x0, &(0x7f0000001080), 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001140)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000001240)=0xe8) recvfrom$packet(r1, &(0x7f00000010c0)=""/78, 0x4e, 0x21, &(0x7f0000001280)={0x11, 0xf6, r2, 0x1, 0x5, 0x6, @broadcast}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r3, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001300)=0x14, 0x0) sendmsg$AUDIT_USER(r0, &(0x7f00000014c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001480)={&(0x7f0000001380)={0xf8, 0x3ed, 0x20, 0x70bd2c, 0x25dfdbff, "0c0349f7d4b20ce63403e1de7d754f6e41b969f1155ab52dd615e37650869b52ce14706452c46557614b56e55cb1c1501fa7d97af914cd9b8736a62f559f1740c23b516d74d7f987a16784e86d42f9c9e1428f4e60653b6f4665df81eea9065a20e6e10689b4158f91e507737868c4e7921ba6e98c3f27c72e6a17d888256e54260519b77514ed7f017243f0d1d0cc7e9641ac018253fec0168132c00a8d6a465313b5a408f255452fdcefefd5d8b4d12051ab2623b2df6478aec158b48212011cf10980104e4a5d268d1aeb0ee40c64a43645e7e82011388af35294aa50d1e41db8616e158f8494", ["", "", "", "", "", "", "", "", ""]}, 0xf8}, 0x1, 0x0, 0x0, 0x8080}, 0x4) bind$packet(r3, &(0x7f0000001500)={0x11, 0xf6, r4, 0x1, 0x8}, 0x14) openat$cgroup_int(r0, &(0x7f0000001540)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000001580), &(0x7f00000015c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000001600)={0x0, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000001700)={'wg2\x00', 0x0}) sendto$packet(r3, &(0x7f0000001640)="0806973848a138de3c8430aa8fef21089f586181b45cb7bc04642cc384176e6d69edbabf24ec0e004dde5e7c1cb47d338d3ea1c4f5a9ac4a5c9a8d723e007b8e19b4f1455635460828d791459f7ae904734f2c2420e1be3aae8f3f1c0ec698eebfb7acdb8ef8509f5fcdb6c10d690f38ca09ac2f67312398d6", 0x79, 0x20040801, &(0x7f0000001740)={0x11, 0x9, r6, 0x1, 0x1, 0x6, @local}, 0x14) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000001780), 0xac081, 0x0) openat$cgroup_pressure(r7, &(0x7f00000017c0)='io.pressure\x00', 0x2, 0x0) openat$cgroup_procs(r7, &(0x7f0000001800)='tasks\x00', 0x2, 0x0) r8 = accept$packet(r5, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001880)=0x14) getpeername$packet(r1, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000019c0)={r9, 0x1, 0x6, @remote}, 0x10) 23:12:16 executing program 7: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4044010}, 0xc1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7fff}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0xd3}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4000041) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x3, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x28100, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x9}]}, 0x4c}}, 0x4800) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x64, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x400d0}, 0x4000) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x44, r5, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000091}, 0x91) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4810}, 0x0) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r1, 0x408, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x14050}, 0x2000c055) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0xd1}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r7, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x38, r6, 0x300, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x94}, 0x845) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f0000000d00)={'wpan4\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r8, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x58, r5, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r9}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000004) 23:12:16 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"1242df624590531b17ac8ee915e6b73a", 0x0, r0, {0x0, 0x400}, {0x3f, 0x4}, 0xff, [0x200, 0x2, 0x5, 0x28b2, 0x4, 0x4, 0x7, 0x5, 0x40, 0x7, 0x100, 0x81, 0x40, 0x107, 0x5, 0x101]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x6, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e20, 0x10001, @mcast2, 0x1}}, 0x0, 0x0, 0x1e, 0x0, "e46429e104fec92646ba066bcde8f859b21c1428bd3bf0b3977f8f2445867126c1b56f98ab9d48ef04b625081bf49233584eba8c02a8ff6a2c71d8f60a406534c3998bf965dabc23e654e43aa950d1a6"}, 0xd8) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000300)={"498e003672bf84a06e2086e0b12bbbe1", r1, r1, {0x4, 0x4c}, {0x20, 0x100}, 0x5, [0x2000000000000, 0x6, 0xfffffffffffffff8, 0x7f, 0x3, 0x1, 0xffffffff80000000, 0x9, 0x7, 0x7, 0x9, 0xfffffffffffffc00, 0x8001, 0x7, 0x1, 0x7f]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000400)={"33683405069f77b537f22f1dae09beeb", r0, r4, {0x7a4e, 0xffff}, {0x1, 0x6}, 0x100000001, [0x1, 0x9f, 0x2, 0x6, 0x0, 0x4, 0x0, 0x4, 0xffff, 0x8, 0x1, 0x8, 0x80000000, 0x2, 0x9]}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000500), 0x400280, 0x0) sendmsg$AUDIT_GET_FEATURE(r5, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3fb, 0x4, 0x70bd29, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4048040}, 0x4040000) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000640), 0x2208c0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r6, 0x80089418, &(0x7f0000000680)) r7 = openat$cgroup_pressure(r5, &(0x7f00000006c0)='cpu.pressure\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000700), 0x4) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f0000000740)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000780)={"bf1db8e365f84571e9e478bbc5895482", r4, r8, {0x0, 0x20}, {0x2, 0x10000000}, 0x5, [0xffffffff, 0x1, 0x1, 0x1ff, 0x0, 0x3ff9, 0xffffffffffffff40, 0x9, 0x7ff, 0x9, 0x871, 0xf8, 0xc4, 0x50000000000, 0x58, 0x8]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r6, 0xc0c89425, &(0x7f0000000880)={"9956c1db96ed1ec45cf7a017c7012953", r0, r2, {0x8, 0x80}, {0x640, 0x3}, 0x7, [0x0, 0x7, 0x3ff, 0x2, 0x4, 0x3f, 0xab33, 0x7, 0x1ff, 0x3, 0x2, 0x7, 0x3, 0x0, 0x1, 0x955]}) r9 = socket(0x15, 0x2, 0x4) syz_genetlink_get_family_id$wireguard(&(0x7f0000000980), r9) openat$sr(0xffffffffffffff9c, &(0x7f00000009c0), 0x10040, 0x0) 23:12:16 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0xed, 0x1, 0x3f, 0x1, 0x0, 0x100000000, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x600000, 0x0, @perf_config_ext={0x3}, 0x200, 0x9, 0x2, 0x1, 0x2, 0x0, 0x7, 0x0, 0x80, 0x0, 0x7fff}) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1, 0x20, 0x7b, 0x0, 0x5eb, 0x92001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf0f2, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x40000, 0x3ff, 0x1, 0x0, 0x5acb, 0xba, 0x8, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x1, 0x20, 0x3, 0x0, 0x7f, 0x4, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1e4, 0x4, @perf_config_ext={0x101, 0xffff}, 0x2000, 0x80, 0xb11, 0x4, 0x3ff, 0x5c87, 0x5, 0x0, 0x7ff, 0x0, 0xa6}, 0xffffffffffffffff, 0xa, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000002, 0x4000010, r0, 0x4) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x80, 0xfc, 0x8, 0x7, 0x0, 0x8000, 0x62, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6000, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x4, 0x1, 0x1, 0x20, 0x2, 0x0, 0x1f, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000400), 0x109000, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x20, 0x1f, 0x9c, 0x0, 0xa, 0x40008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000340)}, 0x0, 0x18, 0x8, 0x2, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x1}, r2, 0xa, r0, 0x9) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x5, 0x3f, 0x2, 0x3f, 0x0, 0x9, 0x80000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x18e9, 0x3f, 0x6, 0x3, 0xffffffff, 0x89, 0x200, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x0) socketpair(0x21, 0xa, 0x4, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$packet(r3, &(0x7f0000000540)=""/131, 0x83, 0x2040, &(0x7f0000000600)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000680)={0x9af0, 0x5b4, 0x8, 0x7}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8011) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e22, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}, 0x0, 0x0, 0x4f, 0x0, "59d71ac28975e0526729bcae336ddc5a226a4c372aed14dc659d7c330df976101cafec0e7a3d498fbf75a7e73dc04b080354250c2ef21490a433cfe6b2bfe903bfe20f7aff0b6ac1bc8b2c101b950668"}, 0xd8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000008c0)={0x1, 0x80, 0x59, 0x9, 0x3f, 0x6, 0x0, 0xeea, 0x40, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75, 0x0, @perf_config_ext={0x1ff, 0x7}, 0x3490, 0xfffffffffffffff4, 0x8, 0x8, 0x0, 0xffff8000, 0x4, 0x0, 0x400, 0x0, 0x5c35}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000940), &(0x7f0000000980)=0x14) accept$packet(r5, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) 23:12:16 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000016c0), 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0xffff, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001780)="66856d34ca550d90368d7270101adf4be276e063379777f4c566c0582a68b9ae4631e2da7225a166cd09a2b5f620bedfa00825c924a8445976e7c3ade10175daa6527d4a4dc39a0a7d775d0e4c3d1850d7cbe27d2034ade206af5acc48c424dbfff07514f7cc1117d21c49680757e2959141e7788bc3c2d7e052c3ade33040bd6cdfde342d51f8e53b652fb81237f5d566f65d28142f8a2059f15a5bba742a0d9e0796a99764065bea2b0094a33431f2cf742bec82d439b7164cbb1f197c", 0xbe, 0xf5}, {&(0x7f0000001840)="d17795edd43721d494a068ed81715686349410a5d79a775282f816fb2bb7af7b0debdfd3b2316b938de1b3a448cfb9b91bd5394564ba14f05b95af16a759775fa9f17c7f1efdee0e56b7cde0f11452ade11261ecbcd72d58fb6fe7bf80d0ffa424763537d875c2e4ce9fe1ec50a3d26b6a4e932b6d907bdd0a390ecbc957dcf1417845db198141e4ae3767a53b545a8133ba041aa835efdc8de0fae79cb3a35776e8ea5b70509af1248f33d7fd33b803", 0xb0, 0x80000001}, {&(0x7f0000001900)="5b1c22e9c7080d1d13474d157ab27026fd1f4d53832be33b5330b9d7ea2bdd299374128f63ad4cf8b481888ec1fa521b062ee9", 0x33, 0xf35}, {&(0x7f0000001940)="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", 0xfd, 0x100000}, {&(0x7f0000001a40)="e062810b747bc65f5703e06cc3a241346105593cc8cbbd42bd1da280ef602470346375165484ab281362e10b28e66732c0bfd8b4615c3b96dd73df287264e9d4a67fbf", 0x43, 0x7fff}], 0x400, &(0x7f0000001b40)={[{@fat=@tz_utc}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@tz_utc}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x5}}, {@fat=@dmask}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000001c00)=@gcm_256={{0x304}, "5387cafab1126784", "ef1d0499737e2da2466211d3f87d4b842a9907c69659a8e1bdb6181496afc23e", "ade94c58", "a6c4412e1fd84f0e"}, 0x38) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000001c40)="1d8d3f6c64b6f608eed9dc9734064b3d", 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000001c80)) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r6, &(0x7f0000001dc0)={&(0x7f0000001d00)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001d80)={&(0x7f0000001d40)={0x2c, 0x3f7, 0x20, 0x70bd2a, 0x25dfdbff, {0x7, 0xd, './file1', './file0/file0'}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0xc840}, 0x0) 23:12:16 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}}, 0x240400d4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48004}, 0x885) r1 = clone3(&(0x7f0000000540)={0x200010800, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0xd}, &(0x7f0000000400)=""/43, 0x2b, &(0x7f0000000440)=""/192, &(0x7f0000000500)=[0xffffffffffffffff], 0x1}, 0x58) wait4(r2, &(0x7f00000005c0), 0x8, &(0x7f0000000600)) r3 = pidfd_open(r1, 0x0) process_mrelease(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x35, 0x0, "0e10f22863d7e5d2dd29ec07e4c76a5d83e613c06d87f00b0c9c371e12f253a147bef404b4c19c8a87f51603353fef74bfec73e0ad8b16376c3eb788f90fb2f2c83c32aedc41621da8d377fb129a0a84"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000800), 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000840)=@ccm_128={{0x304}, "4afcc0165c43df32", "915e4392a40ff28a85e4440489dc81ab", "3fae7ea6", "346e52d6b99297b1"}, 0x28) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) sendmsg$AUDIT_USER(r5, &(0x7f0000000b00)={&(0x7f0000000980), 0xc, &(0x7f0000000ac0)={&(0x7f00000009c0)={0xf0, 0x3ed, 0xb06, 0x70bd29, 0x25dfdbfb, "71021228acc4a6312c70f9aa7b5fab3047fae0d835b8766876d82e2afdb2f803f989ed00861bea634dacc8c59ce1f39f5cf7e071fae59b6079363e0c2f896d35a31cfedf6704e5ee159e7cca1b2d4c6b4b3e04518ed367d547b46cc1c2327f661d5c4e75f51df702ce7f80bb07bdefe10301681f662b66174e2e82da4f68b2afb96a32611a78efd32d4e7063ff292001a8c8036ffb2f47cd055979d92e4bd55514a4d6824ad2b3460afdc0ccde24666f478ac6a11297a72dca92bd78dd481e49e7eddee3335bb507f55306b3354acd7fd306e2088f20fc5e6be55a79ef75", ["", "", "", ""]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x488c0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000b40)='htcp\x00', 0x5) socketpair(0x26, 0x800, 0x9, &(0x7f0000000b80)) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000c00), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000cc0)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x20101000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, r6, 0x201, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x884) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x2c, r6, 0x200, 0x70bd25, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000880}, 0x40c1) 23:12:16 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) r8 = accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) read$char_usb(r0, &(0x7f00000008c0)=""/131, 0x83) r10 = accept$packet(r8, 0x0, &(0x7f0000000980)) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) connect$packet(r10, &(0x7f0000000a40)={0x11, 0x7, r11, 0x1, 0x8}, 0x14) accept4$packet(r4, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000ac0)=0x14, 0x80800) pipe2(&(0x7f0000000b00), 0x80000) [ 117.729772] loop6: detected capacity change from 0 to 264192 [ 117.736149] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 23:12:16 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000016c0), 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0xffff, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001780)="66856d34ca550d90368d7270101adf4be276e063379777f4c566c0582a68b9ae4631e2da7225a166cd09a2b5f620bedfa00825c924a8445976e7c3ade10175daa6527d4a4dc39a0a7d775d0e4c3d1850d7cbe27d2034ade206af5acc48c424dbfff07514f7cc1117d21c49680757e2959141e7788bc3c2d7e052c3ade33040bd6cdfde342d51f8e53b652fb81237f5d566f65d28142f8a2059f15a5bba742a0d9e0796a99764065bea2b0094a33431f2cf742bec82d439b7164cbb1f197c", 0xbe, 0xf5}, {&(0x7f0000001840)="d17795edd43721d494a068ed81715686349410a5d79a775282f816fb2bb7af7b0debdfd3b2316b938de1b3a448cfb9b91bd5394564ba14f05b95af16a759775fa9f17c7f1efdee0e56b7cde0f11452ade11261ecbcd72d58fb6fe7bf80d0ffa424763537d875c2e4ce9fe1ec50a3d26b6a4e932b6d907bdd0a390ecbc957dcf1417845db198141e4ae3767a53b545a8133ba041aa835efdc8de0fae79cb3a35776e8ea5b70509af1248f33d7fd33b803", 0xb0, 0x80000001}, {&(0x7f0000001900)="5b1c22e9c7080d1d13474d157ab27026fd1f4d53832be33b5330b9d7ea2bdd299374128f63ad4cf8b481888ec1fa521b062ee9", 0x33, 0xf35}, {&(0x7f0000001940)="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", 0xfd, 0x100000}, {&(0x7f0000001a40)="e062810b747bc65f5703e06cc3a241346105593cc8cbbd42bd1da280ef602470346375165484ab281362e10b28e66732c0bfd8b4615c3b96dd73df287264e9d4a67fbf", 0x43, 0x7fff}], 0x400, &(0x7f0000001b40)={[{@fat=@tz_utc}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@tz_utc}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x5}}, {@fat=@dmask}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000001c00)=@gcm_256={{0x304}, "5387cafab1126784", "ef1d0499737e2da2466211d3f87d4b842a9907c69659a8e1bdb6181496afc23e", "ade94c58", "a6c4412e1fd84f0e"}, 0x38) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000001c40)="1d8d3f6c64b6f608eed9dc9734064b3d", 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000001c80)) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r6, &(0x7f0000001dc0)={&(0x7f0000001d00)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001d80)={&(0x7f0000001d40)={0x2c, 0x3f7, 0x20, 0x70bd2a, 0x25dfdbff, {0x7, 0xd, './file1', './file0/file0'}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0xc840}, 0x0) 23:12:16 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) bind$packet(r2, &(0x7f0000000740)={0x11, 0x4, r4, 0x1, 0xb1, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in6={{0xa, 0x4e23, 0x1, @private0, 0xffff}}, 0x0, 0x0, 0x10, 0x0, "7efd4c82421304799b540736dc3d1c70f2feeaa25f39ba369bc3c9874941aa983057b14b4f2800ddb62bfb29e7f1c118b8a24e19901683a47b3bef0a466ccea00067f76ad564640e59abc244af08ad82"}, 0xd8) accept4$packet(r2, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14, 0x80800) pipe2(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x180000) getsockname$packet(r5, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000980)=0x14) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:16 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) r8 = accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) read$char_usb(r0, &(0x7f00000008c0)=""/131, 0x83) r10 = accept$packet(r8, 0x0, &(0x7f0000000980)) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) connect$packet(r10, &(0x7f0000000a40)={0x11, 0x7, r11, 0x1, 0x8}, 0x14) accept4$packet(r4, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000ac0)=0x14, 0x80800) pipe2(&(0x7f0000000b00), 0x80000) [ 117.903526] loop6: detected capacity change from 0 to 264192 [ 117.908413] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 23:12:17 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) bind$packet(r2, &(0x7f0000000740)={0x11, 0x4, r4, 0x1, 0xb1, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in6={{0xa, 0x4e23, 0x1, @private0, 0xffff}}, 0x0, 0x0, 0x10, 0x0, "7efd4c82421304799b540736dc3d1c70f2feeaa25f39ba369bc3c9874941aa983057b14b4f2800ddb62bfb29e7f1c118b8a24e19901683a47b3bef0a466ccea00067f76ad564640e59abc244af08ad82"}, 0xd8) accept4$packet(r2, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14, 0x80800) pipe2(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x180000) getsockname$packet(r5, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000980)=0x14) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:17 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) bind$packet(r2, &(0x7f0000000740)={0x11, 0x4, r4, 0x1, 0xb1, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in6={{0xa, 0x4e23, 0x1, @private0, 0xffff}}, 0x0, 0x0, 0x10, 0x0, "7efd4c82421304799b540736dc3d1c70f2feeaa25f39ba369bc3c9874941aa983057b14b4f2800ddb62bfb29e7f1c118b8a24e19901683a47b3bef0a466ccea00067f76ad564640e59abc244af08ad82"}, 0xd8) accept4$packet(r2, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14, 0x80800) pipe2(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x180000) getsockname$packet(r5, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000980)=0x14) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:17 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) r1 = accept4$packet(r0, 0x0, &(0x7f0000001080), 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001140)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000001240)=0xe8) recvfrom$packet(r1, &(0x7f00000010c0)=""/78, 0x4e, 0x21, &(0x7f0000001280)={0x11, 0xf6, r2, 0x1, 0x5, 0x6, @broadcast}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r3, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001300)=0x14, 0x0) sendmsg$AUDIT_USER(r0, &(0x7f00000014c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001480)={&(0x7f0000001380)={0xf8, 0x3ed, 0x20, 0x70bd2c, 0x25dfdbff, "0c0349f7d4b20ce63403e1de7d754f6e41b969f1155ab52dd615e37650869b52ce14706452c46557614b56e55cb1c1501fa7d97af914cd9b8736a62f559f1740c23b516d74d7f987a16784e86d42f9c9e1428f4e60653b6f4665df81eea9065a20e6e10689b4158f91e507737868c4e7921ba6e98c3f27c72e6a17d888256e54260519b77514ed7f017243f0d1d0cc7e9641ac018253fec0168132c00a8d6a465313b5a408f255452fdcefefd5d8b4d12051ab2623b2df6478aec158b48212011cf10980104e4a5d268d1aeb0ee40c64a43645e7e82011388af35294aa50d1e41db8616e158f8494", ["", "", "", "", "", "", "", "", ""]}, 0xf8}, 0x1, 0x0, 0x0, 0x8080}, 0x4) bind$packet(r3, &(0x7f0000001500)={0x11, 0xf6, r4, 0x1, 0x8}, 0x14) openat$cgroup_int(r0, &(0x7f0000001540)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000001580), &(0x7f00000015c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000001600)={0x0, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000001700)={'wg2\x00', 0x0}) sendto$packet(r3, &(0x7f0000001640)="0806973848a138de3c8430aa8fef21089f586181b45cb7bc04642cc384176e6d69edbabf24ec0e004dde5e7c1cb47d338d3ea1c4f5a9ac4a5c9a8d723e007b8e19b4f1455635460828d791459f7ae904734f2c2420e1be3aae8f3f1c0ec698eebfb7acdb8ef8509f5fcdb6c10d690f38ca09ac2f67312398d6", 0x79, 0x20040801, &(0x7f0000001740)={0x11, 0x9, r6, 0x1, 0x1, 0x6, @local}, 0x14) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000001780), 0xac081, 0x0) openat$cgroup_pressure(r7, &(0x7f00000017c0)='io.pressure\x00', 0x2, 0x0) openat$cgroup_procs(r7, &(0x7f0000001800)='tasks\x00', 0x2, 0x0) r8 = accept$packet(r5, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001880)=0x14) getpeername$packet(r1, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000019c0)={r9, 0x1, 0x6, @remote}, 0x10) 23:12:17 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) r8 = accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) read$char_usb(r0, &(0x7f00000008c0)=""/131, 0x83) r10 = accept$packet(r8, 0x0, &(0x7f0000000980)) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) connect$packet(r10, &(0x7f0000000a40)={0x11, 0x7, r11, 0x1, 0x8}, 0x14) pipe2(&(0x7f0000000b00), 0x80000) 23:12:17 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000016c0), 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0xffff, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001780)="66856d34ca550d90368d7270101adf4be276e063379777f4c566c0582a68b9ae4631e2da7225a166cd09a2b5f620bedfa00825c924a8445976e7c3ade10175daa6527d4a4dc39a0a7d775d0e4c3d1850d7cbe27d2034ade206af5acc48c424dbfff07514f7cc1117d21c49680757e2959141e7788bc3c2d7e052c3ade33040bd6cdfde342d51f8e53b652fb81237f5d566f65d28142f8a2059f15a5bba742a0d9e0796a99764065bea2b0094a33431f2cf742bec82d439b7164cbb1f197c", 0xbe, 0xf5}, {&(0x7f0000001840)="d17795edd43721d494a068ed81715686349410a5d79a775282f816fb2bb7af7b0debdfd3b2316b938de1b3a448cfb9b91bd5394564ba14f05b95af16a759775fa9f17c7f1efdee0e56b7cde0f11452ade11261ecbcd72d58fb6fe7bf80d0ffa424763537d875c2e4ce9fe1ec50a3d26b6a4e932b6d907bdd0a390ecbc957dcf1417845db198141e4ae3767a53b545a8133ba041aa835efdc8de0fae79cb3a35776e8ea5b70509af1248f33d7fd33b803", 0xb0, 0x80000001}, {&(0x7f0000001900)="5b1c22e9c7080d1d13474d157ab27026fd1f4d53832be33b5330b9d7ea2bdd299374128f63ad4cf8b481888ec1fa521b062ee9", 0x33, 0xf35}, {&(0x7f0000001940)="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", 0xfd, 0x100000}, {&(0x7f0000001a40)="e062810b747bc65f5703e06cc3a241346105593cc8cbbd42bd1da280ef602470346375165484ab281362e10b28e66732c0bfd8b4615c3b96dd73df287264e9d4a67fbf", 0x43, 0x7fff}], 0x400, &(0x7f0000001b40)={[{@fat=@tz_utc}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@tz_utc}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x5}}, {@fat=@dmask}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000001c00)=@gcm_256={{0x304}, "5387cafab1126784", "ef1d0499737e2da2466211d3f87d4b842a9907c69659a8e1bdb6181496afc23e", "ade94c58", "a6c4412e1fd84f0e"}, 0x38) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000001c40)="1d8d3f6c64b6f608eed9dc9734064b3d", 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000001c80)) openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) 23:12:17 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) bind$packet(r2, &(0x7f0000000740)={0x11, 0x4, r4, 0x1, 0xb1, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in6={{0xa, 0x4e23, 0x1, @private0, 0xffff}}, 0x0, 0x0, 0x10, 0x0, "7efd4c82421304799b540736dc3d1c70f2feeaa25f39ba369bc3c9874941aa983057b14b4f2800ddb62bfb29e7f1c118b8a24e19901683a47b3bef0a466ccea00067f76ad564640e59abc244af08ad82"}, 0xd8) accept4$packet(r2, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14, 0x80800) pipe2(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x180000) getsockname$packet(r5, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000980)=0x14) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:17 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0xed, 0x1, 0x3f, 0x1, 0x0, 0x100000000, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x600000, 0x0, @perf_config_ext={0x3}, 0x200, 0x9, 0x2, 0x1, 0x2, 0x0, 0x7, 0x0, 0x80, 0x0, 0x7fff}) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1, 0x20, 0x7b, 0x0, 0x5eb, 0x92001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf0f2, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x40000, 0x3ff, 0x1, 0x0, 0x5acb, 0xba, 0x8, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x1, 0x20, 0x3, 0x0, 0x7f, 0x4, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1e4, 0x4, @perf_config_ext={0x101, 0xffff}, 0x2000, 0x80, 0xb11, 0x4, 0x3ff, 0x5c87, 0x5, 0x0, 0x7ff, 0x0, 0xa6}, 0xffffffffffffffff, 0xa, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000002, 0x4000010, r0, 0x4) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x80, 0xfc, 0x8, 0x7, 0x0, 0x8000, 0x62, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6000, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x4, 0x1, 0x1, 0x20, 0x2, 0x0, 0x1f, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000400), 0x109000, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x20, 0x1f, 0x9c, 0x0, 0xa, 0x40008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000340)}, 0x0, 0x18, 0x8, 0x2, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x1}, r2, 0xa, r0, 0x9) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x5, 0x3f, 0x2, 0x3f, 0x0, 0x9, 0x80000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x18e9, 0x3f, 0x6, 0x3, 0xffffffff, 0x89, 0x200, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x0) socketpair(0x21, 0xa, 0x4, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$packet(r3, &(0x7f0000000540)=""/131, 0x83, 0x2040, &(0x7f0000000600)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000680)={0x9af0, 0x5b4, 0x8, 0x7}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8011) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e22, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}, 0x0, 0x0, 0x4f, 0x0, "59d71ac28975e0526729bcae336ddc5a226a4c372aed14dc659d7c330df976101cafec0e7a3d498fbf75a7e73dc04b080354250c2ef21490a433cfe6b2bfe903bfe20f7aff0b6ac1bc8b2c101b950668"}, 0xd8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000008c0)={0x1, 0x80, 0x59, 0x9, 0x3f, 0x6, 0x0, 0xeea, 0x40, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75, 0x0, @perf_config_ext={0x1ff, 0x7}, 0x3490, 0xfffffffffffffff4, 0x8, 0x8, 0x0, 0xffff8000, 0x4, 0x0, 0x400, 0x0, 0x5c35}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000940), &(0x7f0000000980)=0x14) accept$packet(r5, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) [ 118.173085] loop6: detected capacity change from 0 to 264192 [ 118.174609] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 23:12:26 executing program 7: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4044010}, 0xc1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7fff}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0xd3}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4000041) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x3, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x28100, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x9}]}, 0x4c}}, 0x4800) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x64, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x400d0}, 0x4000) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x44, r5, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000091}, 0x91) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4810}, 0x0) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r1, 0x408, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x14050}, 0x2000c055) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0xd1}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r7, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x38, r6, 0x300, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x94}, 0x845) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f0000000d00)={'wpan4\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r8, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x58, r5, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r9}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000004) 23:12:26 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}}, 0x240400d4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48004}, 0x885) r1 = clone3(&(0x7f0000000540)={0x200010800, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0xd}, &(0x7f0000000400)=""/43, 0x2b, &(0x7f0000000440)=""/192, &(0x7f0000000500)=[0xffffffffffffffff], 0x1}, 0x58) wait4(r2, &(0x7f00000005c0), 0x8, &(0x7f0000000600)) r3 = pidfd_open(r1, 0x0) process_mrelease(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x35, 0x0, "0e10f22863d7e5d2dd29ec07e4c76a5d83e613c06d87f00b0c9c371e12f253a147bef404b4c19c8a87f51603353fef74bfec73e0ad8b16376c3eb788f90fb2f2c83c32aedc41621da8d377fb129a0a84"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000800), 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000840)=@ccm_128={{0x304}, "4afcc0165c43df32", "915e4392a40ff28a85e4440489dc81ab", "3fae7ea6", "346e52d6b99297b1"}, 0x28) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) sendmsg$AUDIT_USER(r5, &(0x7f0000000b00)={&(0x7f0000000980), 0xc, &(0x7f0000000ac0)={&(0x7f00000009c0)={0xf0, 0x3ed, 0xb06, 0x70bd29, 0x25dfdbfb, "71021228acc4a6312c70f9aa7b5fab3047fae0d835b8766876d82e2afdb2f803f989ed00861bea634dacc8c59ce1f39f5cf7e071fae59b6079363e0c2f896d35a31cfedf6704e5ee159e7cca1b2d4c6b4b3e04518ed367d547b46cc1c2327f661d5c4e75f51df702ce7f80bb07bdefe10301681f662b66174e2e82da4f68b2afb96a32611a78efd32d4e7063ff292001a8c8036ffb2f47cd055979d92e4bd55514a4d6824ad2b3460afdc0ccde24666f478ac6a11297a72dca92bd78dd481e49e7eddee3335bb507f55306b3354acd7fd306e2088f20fc5e6be55a79ef75", ["", "", "", ""]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x488c0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000b40)='htcp\x00', 0x5) socketpair(0x26, 0x800, 0x9, &(0x7f0000000b80)) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000c00), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000cc0)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x20101000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, r6, 0x201, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x884) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x2c, r6, 0x200, 0x70bd25, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000880}, 0x40c1) 23:12:26 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) r8 = accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) read$char_usb(r0, &(0x7f00000008c0)=""/131, 0x83) r10 = accept$packet(r8, 0x0, &(0x7f0000000980)) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) connect$packet(r10, &(0x7f0000000a40)={0x11, 0x7, r11, 0x1, 0x8}, 0x14) pipe2(&(0x7f0000000b00), 0x80000) 23:12:26 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) r1 = accept4$packet(r0, 0x0, &(0x7f0000001080), 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001140)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000001240)=0xe8) recvfrom$packet(r1, &(0x7f00000010c0)=""/78, 0x4e, 0x21, &(0x7f0000001280)={0x11, 0xf6, r2, 0x1, 0x5, 0x6, @broadcast}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r3, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001300)=0x14, 0x0) sendmsg$AUDIT_USER(r0, &(0x7f00000014c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001480)={&(0x7f0000001380)={0xf8, 0x3ed, 0x20, 0x70bd2c, 0x25dfdbff, "0c0349f7d4b20ce63403e1de7d754f6e41b969f1155ab52dd615e37650869b52ce14706452c46557614b56e55cb1c1501fa7d97af914cd9b8736a62f559f1740c23b516d74d7f987a16784e86d42f9c9e1428f4e60653b6f4665df81eea9065a20e6e10689b4158f91e507737868c4e7921ba6e98c3f27c72e6a17d888256e54260519b77514ed7f017243f0d1d0cc7e9641ac018253fec0168132c00a8d6a465313b5a408f255452fdcefefd5d8b4d12051ab2623b2df6478aec158b48212011cf10980104e4a5d268d1aeb0ee40c64a43645e7e82011388af35294aa50d1e41db8616e158f8494", ["", "", "", "", "", "", "", "", ""]}, 0xf8}, 0x1, 0x0, 0x0, 0x8080}, 0x4) bind$packet(r3, &(0x7f0000001500)={0x11, 0xf6, r4, 0x1, 0x8}, 0x14) openat$cgroup_int(r0, &(0x7f0000001540)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000001580), &(0x7f00000015c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000001600)={0x0, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000001700)={'wg2\x00', 0x0}) sendto$packet(r3, &(0x7f0000001640)="0806973848a138de3c8430aa8fef21089f586181b45cb7bc04642cc384176e6d69edbabf24ec0e004dde5e7c1cb47d338d3ea1c4f5a9ac4a5c9a8d723e007b8e19b4f1455635460828d791459f7ae904734f2c2420e1be3aae8f3f1c0ec698eebfb7acdb8ef8509f5fcdb6c10d690f38ca09ac2f67312398d6", 0x79, 0x20040801, &(0x7f0000001740)={0x11, 0x9, r6, 0x1, 0x1, 0x6, @local}, 0x14) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000001780), 0xac081, 0x0) openat$cgroup_pressure(r7, &(0x7f00000017c0)='io.pressure\x00', 0x2, 0x0) openat$cgroup_procs(r7, &(0x7f0000001800)='tasks\x00', 0x2, 0x0) accept$packet(r5, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001880)=0x14) getpeername$packet(r1, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) 23:12:26 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000016c0), 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0xffff, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001780)="66856d34ca550d90368d7270101adf4be276e063379777f4c566c0582a68b9ae4631e2da7225a166cd09a2b5f620bedfa00825c924a8445976e7c3ade10175daa6527d4a4dc39a0a7d775d0e4c3d1850d7cbe27d2034ade206af5acc48c424dbfff07514f7cc1117d21c49680757e2959141e7788bc3c2d7e052c3ade33040bd6cdfde342d51f8e53b652fb81237f5d566f65d28142f8a2059f15a5bba742a0d9e0796a99764065bea2b0094a33431f2cf742bec82d439b7164cbb1f197c", 0xbe, 0xf5}, {&(0x7f0000001840)="d17795edd43721d494a068ed81715686349410a5d79a775282f816fb2bb7af7b0debdfd3b2316b938de1b3a448cfb9b91bd5394564ba14f05b95af16a759775fa9f17c7f1efdee0e56b7cde0f11452ade11261ecbcd72d58fb6fe7bf80d0ffa424763537d875c2e4ce9fe1ec50a3d26b6a4e932b6d907bdd0a390ecbc957dcf1417845db198141e4ae3767a53b545a8133ba041aa835efdc8de0fae79cb3a35776e8ea5b70509af1248f33d7fd33b803", 0xb0, 0x80000001}, {&(0x7f0000001900)="5b1c22e9c7080d1d13474d157ab27026fd1f4d53832be33b5330b9d7ea2bdd299374128f63ad4cf8b481888ec1fa521b062ee9", 0x33, 0xf35}, {&(0x7f0000001940)="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", 0xfd, 0x100000}, {&(0x7f0000001a40)="e062810b747bc65f5703e06cc3a241346105593cc8cbbd42bd1da280ef602470346375165484ab281362e10b28e66732c0bfd8b4615c3b96dd73df287264e9d4a67fbf", 0x43, 0x7fff}], 0x400, &(0x7f0000001b40)={[{@fat=@tz_utc}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@tz_utc}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x5}}, {@fat=@dmask}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000001c00)=@gcm_256={{0x304}, "5387cafab1126784", "ef1d0499737e2da2466211d3f87d4b842a9907c69659a8e1bdb6181496afc23e", "ade94c58", "a6c4412e1fd84f0e"}, 0x38) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000001c40)="1d8d3f6c64b6f608eed9dc9734064b3d", 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) 23:12:26 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0xed, 0x1, 0x3f, 0x1, 0x0, 0x100000000, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x600000, 0x0, @perf_config_ext={0x3}, 0x200, 0x9, 0x2, 0x1, 0x2, 0x0, 0x7, 0x0, 0x80, 0x0, 0x7fff}) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1, 0x20, 0x7b, 0x0, 0x5eb, 0x92001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf0f2, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x40000, 0x3ff, 0x1, 0x0, 0x5acb, 0xba, 0x8, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x1, 0x20, 0x3, 0x0, 0x7f, 0x4, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1e4, 0x4, @perf_config_ext={0x101, 0xffff}, 0x2000, 0x80, 0xb11, 0x4, 0x3ff, 0x5c87, 0x5, 0x0, 0x7ff, 0x0, 0xa6}, 0xffffffffffffffff, 0xa, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000002, 0x4000010, r0, 0x4) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x80, 0xfc, 0x8, 0x7, 0x0, 0x8000, 0x62, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6000, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x4, 0x1, 0x1, 0x20, 0x2, 0x0, 0x1f, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000400), 0x109000, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x20, 0x1f, 0x9c, 0x0, 0xa, 0x40008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000340)}, 0x0, 0x18, 0x8, 0x2, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x1}, r2, 0xa, r0, 0x9) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x5, 0x3f, 0x2, 0x3f, 0x0, 0x9, 0x80000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x18e9, 0x3f, 0x6, 0x3, 0xffffffff, 0x89, 0x200, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x0) socketpair(0x21, 0xa, 0x4, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$packet(r3, &(0x7f0000000540)=""/131, 0x83, 0x2040, &(0x7f0000000600)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000680)={0x9af0, 0x5b4, 0x8, 0x7}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8011) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e22, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}, 0x0, 0x0, 0x4f, 0x0, "59d71ac28975e0526729bcae336ddc5a226a4c372aed14dc659d7c330df976101cafec0e7a3d498fbf75a7e73dc04b080354250c2ef21490a433cfe6b2bfe903bfe20f7aff0b6ac1bc8b2c101b950668"}, 0xd8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000008c0)={0x1, 0x80, 0x59, 0x9, 0x3f, 0x6, 0x0, 0xeea, 0x40, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75, 0x0, @perf_config_ext={0x1ff, 0x7}, 0x3490, 0xfffffffffffffff4, 0x8, 0x8, 0x0, 0xffff8000, 0x4, 0x0, 0x400, 0x0, 0x5c35}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000940), &(0x7f0000000980)=0x14) 23:12:26 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"1242df624590531b17ac8ee915e6b73a", 0x0, r0, {0x0, 0x400}, {0x3f, 0x4}, 0xff, [0x200, 0x2, 0x5, 0x28b2, 0x4, 0x4, 0x7, 0x5, 0x40, 0x7, 0x100, 0x81, 0x40, 0x107, 0x5, 0x101]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x6, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e20, 0x10001, @mcast2, 0x1}}, 0x0, 0x0, 0x1e, 0x0, "e46429e104fec92646ba066bcde8f859b21c1428bd3bf0b3977f8f2445867126c1b56f98ab9d48ef04b625081bf49233584eba8c02a8ff6a2c71d8f60a406534c3998bf965dabc23e654e43aa950d1a6"}, 0xd8) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000300)={"498e003672bf84a06e2086e0b12bbbe1", r1, r1, {0x4, 0x4c}, {0x20, 0x100}, 0x5, [0x2000000000000, 0x6, 0xfffffffffffffff8, 0x7f, 0x3, 0x1, 0xffffffff80000000, 0x9, 0x7, 0x7, 0x9, 0xfffffffffffffc00, 0x8001, 0x7, 0x1, 0x7f]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000400)={"33683405069f77b537f22f1dae09beeb", r0, r4, {0x7a4e, 0xffff}, {0x1, 0x6}, 0x100000001, [0x1, 0x9f, 0x2, 0x6, 0x0, 0x4, 0x0, 0x4, 0xffff, 0x8, 0x1, 0x8, 0x80000000, 0x2, 0x9]}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000500), 0x400280, 0x0) sendmsg$AUDIT_GET_FEATURE(r5, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3fb, 0x4, 0x70bd29, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4048040}, 0x4040000) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000640), 0x2208c0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r6, 0x80089418, &(0x7f0000000680)) r7 = openat$cgroup_pressure(r5, &(0x7f00000006c0)='cpu.pressure\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000700), 0x4) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f0000000740)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000780)={"bf1db8e365f84571e9e478bbc5895482", r4, r8, {0x0, 0x20}, {0x2, 0x10000000}, 0x5, [0xffffffff, 0x1, 0x1, 0x1ff, 0x0, 0x3ff9, 0xffffffffffffff40, 0x9, 0x7ff, 0x9, 0x871, 0xf8, 0xc4, 0x50000000000, 0x58, 0x8]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r6, 0xc0c89425, &(0x7f0000000880)={"9956c1db96ed1ec45cf7a017c7012953", r0, r2, {0x8, 0x80}, {0x640, 0x3}, 0x7, [0x0, 0x7, 0x3ff, 0x2, 0x4, 0x3f, 0xab33, 0x7, 0x1ff, 0x3, 0x2, 0x7, 0x3, 0x0, 0x1, 0x955]}) r9 = socket(0x15, 0x2, 0x4) syz_genetlink_get_family_id$wireguard(&(0x7f0000000980), r9) openat$sr(0xffffffffffffff9c, &(0x7f00000009c0), 0x10040, 0x0) 23:12:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) bind$packet(r2, &(0x7f0000000740)={0x11, 0x4, r4, 0x1, 0xb1, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in6={{0xa, 0x4e23, 0x1, @private0, 0xffff}}, 0x0, 0x0, 0x10, 0x0, "7efd4c82421304799b540736dc3d1c70f2feeaa25f39ba369bc3c9874941aa983057b14b4f2800ddb62bfb29e7f1c118b8a24e19901683a47b3bef0a466ccea00067f76ad564640e59abc244af08ad82"}, 0xd8) accept4$packet(r2, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14, 0x80800) pipe2(&(0x7f0000000900), 0x180000) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:26 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) r8 = accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) read$char_usb(r0, &(0x7f00000008c0)=""/131, 0x83) r10 = accept$packet(r8, 0x0, &(0x7f0000000980)) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) connect$packet(r10, &(0x7f0000000a40)={0x11, 0x7, r11, 0x1, 0x8}, 0x14) pipe2(&(0x7f0000000b00), 0x80000) [ 127.549952] loop6: detected capacity change from 0 to 264192 23:12:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) bind$packet(r2, &(0x7f0000000740)={0x11, 0x4, r4, 0x1, 0xb1, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in6={{0xa, 0x4e23, 0x1, @private0, 0xffff}}, 0x0, 0x0, 0x10, 0x0, "7efd4c82421304799b540736dc3d1c70f2feeaa25f39ba369bc3c9874941aa983057b14b4f2800ddb62bfb29e7f1c118b8a24e19901683a47b3bef0a466ccea00067f76ad564640e59abc244af08ad82"}, 0xd8) accept4$packet(r2, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14, 0x80800) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) [ 127.607167] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 23:12:26 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000016c0), 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0xffff, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001780)="66856d34ca550d90368d7270101adf4be276e063379777f4c566c0582a68b9ae4631e2da7225a166cd09a2b5f620bedfa00825c924a8445976e7c3ade10175daa6527d4a4dc39a0a7d775d0e4c3d1850d7cbe27d2034ade206af5acc48c424dbfff07514f7cc1117d21c49680757e2959141e7788bc3c2d7e052c3ade33040bd6cdfde342d51f8e53b652fb81237f5d566f65d28142f8a2059f15a5bba742a0d9e0796a99764065bea2b0094a33431f2cf742bec82d439b7164cbb1f197c", 0xbe, 0xf5}, {&(0x7f0000001840)="d17795edd43721d494a068ed81715686349410a5d79a775282f816fb2bb7af7b0debdfd3b2316b938de1b3a448cfb9b91bd5394564ba14f05b95af16a759775fa9f17c7f1efdee0e56b7cde0f11452ade11261ecbcd72d58fb6fe7bf80d0ffa424763537d875c2e4ce9fe1ec50a3d26b6a4e932b6d907bdd0a390ecbc957dcf1417845db198141e4ae3767a53b545a8133ba041aa835efdc8de0fae79cb3a35776e8ea5b70509af1248f33d7fd33b803", 0xb0, 0x80000001}, {&(0x7f0000001900)="5b1c22e9c7080d1d13474d157ab27026fd1f4d53832be33b5330b9d7ea2bdd299374128f63ad4cf8b481888ec1fa521b062ee9", 0x33, 0xf35}, {&(0x7f0000001940)="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", 0xfd, 0x100000}, {&(0x7f0000001a40)="e062810b747bc65f5703e06cc3a241346105593cc8cbbd42bd1da280ef602470346375165484ab281362e10b28e66732c0bfd8b4615c3b96dd73df287264e9d4a67fbf", 0x43, 0x7fff}], 0x400, &(0x7f0000001b40)={[{@fat=@tz_utc}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@tz_utc}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x5}}, {@fat=@dmask}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000001c00)=@gcm_256={{0x304}, "5387cafab1126784", "ef1d0499737e2da2466211d3f87d4b842a9907c69659a8e1bdb6181496afc23e", "ade94c58", "a6c4412e1fd84f0e"}, 0x38) openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) 23:12:26 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"1242df624590531b17ac8ee915e6b73a", 0x0, r0, {0x0, 0x400}, {0x3f, 0x4}, 0xff, [0x200, 0x2, 0x5, 0x28b2, 0x4, 0x4, 0x7, 0x5, 0x40, 0x7, 0x100, 0x81, 0x40, 0x107, 0x5, 0x101]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x6, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e20, 0x10001, @mcast2, 0x1}}, 0x0, 0x0, 0x1e, 0x0, "e46429e104fec92646ba066bcde8f859b21c1428bd3bf0b3977f8f2445867126c1b56f98ab9d48ef04b625081bf49233584eba8c02a8ff6a2c71d8f60a406534c3998bf965dabc23e654e43aa950d1a6"}, 0xd8) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000300)={"498e003672bf84a06e2086e0b12bbbe1", r1, r1, {0x4, 0x4c}, {0x20, 0x100}, 0x5, [0x2000000000000, 0x6, 0xfffffffffffffff8, 0x7f, 0x3, 0x1, 0xffffffff80000000, 0x9, 0x7, 0x7, 0x9, 0xfffffffffffffc00, 0x8001, 0x7, 0x1, 0x7f]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000400)={"33683405069f77b537f22f1dae09beeb", r0, r4, {0x7a4e, 0xffff}, {0x1, 0x6}, 0x100000001, [0x1, 0x9f, 0x2, 0x6, 0x0, 0x4, 0x0, 0x4, 0xffff, 0x8, 0x1, 0x8, 0x80000000, 0x2, 0x9]}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000500), 0x400280, 0x0) sendmsg$AUDIT_GET_FEATURE(r5, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3fb, 0x4, 0x70bd29, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4048040}, 0x4040000) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000640), 0x2208c0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r6, 0x80089418, &(0x7f0000000680)) r7 = openat$cgroup_pressure(r5, &(0x7f00000006c0)='cpu.pressure\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000700), 0x4) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f0000000740)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000780)={"bf1db8e365f84571e9e478bbc5895482", r4, r8, {0x0, 0x20}, {0x2, 0x10000000}, 0x5, [0xffffffff, 0x1, 0x1, 0x1ff, 0x0, 0x3ff9, 0xffffffffffffff40, 0x9, 0x7ff, 0x9, 0x871, 0xf8, 0xc4, 0x50000000000, 0x58, 0x8]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r6, 0xc0c89425, &(0x7f0000000880)={"9956c1db96ed1ec45cf7a017c7012953", r0, r2, {0x8, 0x80}, {0x640, 0x3}, 0x7, [0x0, 0x7, 0x3ff, 0x2, 0x4, 0x3f, 0xab33, 0x7, 0x1ff, 0x3, 0x2, 0x7, 0x3, 0x0, 0x1, 0x955]}) socket(0x15, 0x2, 0x4) openat$sr(0xffffffffffffff9c, &(0x7f00000009c0), 0x10040, 0x0) 23:12:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) bind$packet(r2, &(0x7f0000000740)={0x11, 0x4, r4, 0x1, 0xb1, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in6={{0xa, 0x4e23, 0x1, @private0, 0xffff}}, 0x0, 0x0, 0x10, 0x0, "7efd4c82421304799b540736dc3d1c70f2feeaa25f39ba369bc3c9874941aa983057b14b4f2800ddb62bfb29e7f1c118b8a24e19901683a47b3bef0a466ccea00067f76ad564640e59abc244af08ad82"}, 0xd8) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:26 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}}, 0x240400d4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48004}, 0x885) r1 = clone3(&(0x7f0000000540)={0x200010800, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0xd}, &(0x7f0000000400)=""/43, 0x2b, &(0x7f0000000440)=""/192, &(0x7f0000000500)=[0xffffffffffffffff], 0x1}, 0x58) wait4(r2, &(0x7f00000005c0), 0x8, &(0x7f0000000600)) r3 = pidfd_open(r1, 0x0) process_mrelease(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x35, 0x0, "0e10f22863d7e5d2dd29ec07e4c76a5d83e613c06d87f00b0c9c371e12f253a147bef404b4c19c8a87f51603353fef74bfec73e0ad8b16376c3eb788f90fb2f2c83c32aedc41621da8d377fb129a0a84"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000800), 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000840)=@ccm_128={{0x304}, "4afcc0165c43df32", "915e4392a40ff28a85e4440489dc81ab", "3fae7ea6", "346e52d6b99297b1"}, 0x28) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) sendmsg$AUDIT_USER(r5, &(0x7f0000000b00)={&(0x7f0000000980), 0xc, &(0x7f0000000ac0)={&(0x7f00000009c0)={0xf0, 0x3ed, 0xb06, 0x70bd29, 0x25dfdbfb, "71021228acc4a6312c70f9aa7b5fab3047fae0d835b8766876d82e2afdb2f803f989ed00861bea634dacc8c59ce1f39f5cf7e071fae59b6079363e0c2f896d35a31cfedf6704e5ee159e7cca1b2d4c6b4b3e04518ed367d547b46cc1c2327f661d5c4e75f51df702ce7f80bb07bdefe10301681f662b66174e2e82da4f68b2afb96a32611a78efd32d4e7063ff292001a8c8036ffb2f47cd055979d92e4bd55514a4d6824ad2b3460afdc0ccde24666f478ac6a11297a72dca92bd78dd481e49e7eddee3335bb507f55306b3354acd7fd306e2088f20fc5e6be55a79ef75", ["", "", "", ""]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x488c0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000b40)='htcp\x00', 0x5) socketpair(0x26, 0x800, 0x9, &(0x7f0000000b80)) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000c00), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000cc0)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x20101000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, r6, 0x201, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x884) 23:12:26 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) r8 = accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) read$char_usb(r0, &(0x7f00000008c0)=""/131, 0x83) accept$packet(r8, 0x0, &(0x7f0000000980)) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) pipe2(&(0x7f0000000b00), 0x80000) 23:12:27 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) r1 = accept4$packet(r0, 0x0, &(0x7f0000001080), 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001140)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000001240)=0xe8) recvfrom$packet(r1, &(0x7f00000010c0)=""/78, 0x4e, 0x21, &(0x7f0000001280)={0x11, 0xf6, r2, 0x1, 0x5, 0x6, @broadcast}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r3, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001300)=0x14, 0x0) sendmsg$AUDIT_USER(r0, &(0x7f00000014c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001480)={&(0x7f0000001380)={0xf8, 0x3ed, 0x20, 0x70bd2c, 0x25dfdbff, "0c0349f7d4b20ce63403e1de7d754f6e41b969f1155ab52dd615e37650869b52ce14706452c46557614b56e55cb1c1501fa7d97af914cd9b8736a62f559f1740c23b516d74d7f987a16784e86d42f9c9e1428f4e60653b6f4665df81eea9065a20e6e10689b4158f91e507737868c4e7921ba6e98c3f27c72e6a17d888256e54260519b77514ed7f017243f0d1d0cc7e9641ac018253fec0168132c00a8d6a465313b5a408f255452fdcefefd5d8b4d12051ab2623b2df6478aec158b48212011cf10980104e4a5d268d1aeb0ee40c64a43645e7e82011388af35294aa50d1e41db8616e158f8494", ["", "", "", "", "", "", "", "", ""]}, 0xf8}, 0x1, 0x0, 0x0, 0x8080}, 0x4) bind$packet(r3, &(0x7f0000001500)={0x11, 0xf6, r4, 0x1, 0x8}, 0x14) openat$cgroup_int(r0, &(0x7f0000001540)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000001580), &(0x7f00000015c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000001600)={0x0, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000001700)={'wg2\x00', 0x0}) sendto$packet(r3, &(0x7f0000001640)="0806973848a138de3c8430aa8fef21089f586181b45cb7bc04642cc384176e6d69edbabf24ec0e004dde5e7c1cb47d338d3ea1c4f5a9ac4a5c9a8d723e007b8e19b4f1455635460828d791459f7ae904734f2c2420e1be3aae8f3f1c0ec698eebfb7acdb8ef8509f5fcdb6c10d690f38ca09ac2f67312398d6", 0x79, 0x20040801, &(0x7f0000001740)={0x11, 0x9, r6, 0x1, 0x1, 0x6, @local}, 0x14) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000001780), 0xac081, 0x0) openat$cgroup_pressure(r7, &(0x7f00000017c0)='io.pressure\x00', 0x2, 0x0) openat$cgroup_procs(r7, &(0x7f0000001800)='tasks\x00', 0x2, 0x0) getpeername$packet(r1, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) [ 127.954361] loop6: detected capacity change from 0 to 264192 23:12:27 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0xed, 0x1, 0x3f, 0x1, 0x0, 0x100000000, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x600000, 0x0, @perf_config_ext={0x3}, 0x200, 0x9, 0x2, 0x1, 0x2, 0x0, 0x7, 0x0, 0x80, 0x0, 0x7fff}) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1, 0x20, 0x7b, 0x0, 0x5eb, 0x92001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf0f2, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x40000, 0x3ff, 0x1, 0x0, 0x5acb, 0xba, 0x8, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x1, 0x20, 0x3, 0x0, 0x7f, 0x4, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1e4, 0x4, @perf_config_ext={0x101, 0xffff}, 0x2000, 0x80, 0xb11, 0x4, 0x3ff, 0x5c87, 0x5, 0x0, 0x7ff, 0x0, 0xa6}, 0xffffffffffffffff, 0xa, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000002, 0x4000010, r0, 0x4) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x80, 0xfc, 0x8, 0x7, 0x0, 0x8000, 0x62, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6000, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x4, 0x1, 0x1, 0x20, 0x2, 0x0, 0x1f, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000400), 0x109000, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x20, 0x1f, 0x9c, 0x0, 0xa, 0x40008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000340)}, 0x0, 0x18, 0x8, 0x2, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x1}, r2, 0xa, r0, 0x9) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x5, 0x3f, 0x2, 0x3f, 0x0, 0x9, 0x80000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x18e9, 0x3f, 0x6, 0x3, 0xffffffff, 0x89, 0x200, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x0) socketpair(0x21, 0xa, 0x4, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$packet(r3, &(0x7f0000000540)=""/131, 0x83, 0x2040, &(0x7f0000000600)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000680)={0x9af0, 0x5b4, 0x8, 0x7}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8011) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e22, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}, 0x0, 0x0, 0x4f, 0x0, "59d71ac28975e0526729bcae336ddc5a226a4c372aed14dc659d7c330df976101cafec0e7a3d498fbf75a7e73dc04b080354250c2ef21490a433cfe6b2bfe903bfe20f7aff0b6ac1bc8b2c101b950668"}, 0xd8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000008c0)={0x1, 0x80, 0x59, 0x9, 0x3f, 0x6, 0x0, 0xeea, 0x40, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75, 0x0, @perf_config_ext={0x1ff, 0x7}, 0x3490, 0xfffffffffffffff4, 0x8, 0x8, 0x0, 0xffff8000, 0x4, 0x0, 0x400, 0x0, 0x5c35}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000940), &(0x7f0000000980)=0x14) 23:12:27 executing program 7: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4044010}, 0xc1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7fff}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0xd3}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4000041) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x3, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x28100, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x9}]}, 0x4c}}, 0x4800) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x64, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x400d0}, 0x4000) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x44, r5, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000091}, 0x91) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4810}, 0x0) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r1, 0x408, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x14050}, 0x2000c055) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0xd1}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r7, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x38, r6, 0x300, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x94}, 0x845) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_GETPARAMS(r8, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x58, r5, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000004) [ 127.969903] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 23:12:27 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) bind$packet(r2, &(0x7f0000000740)={0x11, 0x4, r4, 0x1, 0xb1, 0x6, @broadcast}, 0x14) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:27 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) r8 = accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) read$char_usb(r0, &(0x7f00000008c0)=""/131, 0x83) accept$packet(r8, 0x0, &(0x7f0000000980)) pipe2(&(0x7f0000000b00), 0x80000) 23:12:27 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000016c0), 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0xffff, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001780)="66856d34ca550d90368d7270101adf4be276e063379777f4c566c0582a68b9ae4631e2da7225a166cd09a2b5f620bedfa00825c924a8445976e7c3ade10175daa6527d4a4dc39a0a7d775d0e4c3d1850d7cbe27d2034ade206af5acc48c424dbfff07514f7cc1117d21c49680757e2959141e7788bc3c2d7e052c3ade33040bd6cdfde342d51f8e53b652fb81237f5d566f65d28142f8a2059f15a5bba742a0d9e0796a99764065bea2b0094a33431f2cf742bec82d439b7164cbb1f197c", 0xbe, 0xf5}, {&(0x7f0000001840)="d17795edd43721d494a068ed81715686349410a5d79a775282f816fb2bb7af7b0debdfd3b2316b938de1b3a448cfb9b91bd5394564ba14f05b95af16a759775fa9f17c7f1efdee0e56b7cde0f11452ade11261ecbcd72d58fb6fe7bf80d0ffa424763537d875c2e4ce9fe1ec50a3d26b6a4e932b6d907bdd0a390ecbc957dcf1417845db198141e4ae3767a53b545a8133ba041aa835efdc8de0fae79cb3a35776e8ea5b70509af1248f33d7fd33b803", 0xb0, 0x80000001}, {&(0x7f0000001900)="5b1c22e9c7080d1d13474d157ab27026fd1f4d53832be33b5330b9d7ea2bdd299374128f63ad4cf8b481888ec1fa521b062ee9", 0x33, 0xf35}, {&(0x7f0000001940)="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", 0xfd, 0x100000}, {&(0x7f0000001a40)="e062810b747bc65f5703e06cc3a241346105593cc8cbbd42bd1da280ef602470346375165484ab281362e10b28e66732c0bfd8b4615c3b96dd73df287264e9d4a67fbf", 0x43, 0x7fff}], 0x400, &(0x7f0000001b40)={[{@fat=@tz_utc}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@tz_utc}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x5}}, {@fat=@dmask}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) 23:12:27 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"1242df624590531b17ac8ee915e6b73a", 0x0, r0, {0x0, 0x400}, {0x3f, 0x4}, 0xff, [0x200, 0x2, 0x5, 0x28b2, 0x4, 0x4, 0x7, 0x5, 0x40, 0x7, 0x100, 0x81, 0x40, 0x107, 0x5, 0x101]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x6, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e20, 0x10001, @mcast2, 0x1}}, 0x0, 0x0, 0x1e, 0x0, "e46429e104fec92646ba066bcde8f859b21c1428bd3bf0b3977f8f2445867126c1b56f98ab9d48ef04b625081bf49233584eba8c02a8ff6a2c71d8f60a406534c3998bf965dabc23e654e43aa950d1a6"}, 0xd8) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000300)={"498e003672bf84a06e2086e0b12bbbe1", r1, r1, {0x4, 0x4c}, {0x20, 0x100}, 0x5, [0x2000000000000, 0x6, 0xfffffffffffffff8, 0x7f, 0x3, 0x1, 0xffffffff80000000, 0x9, 0x7, 0x7, 0x9, 0xfffffffffffffc00, 0x8001, 0x7, 0x1, 0x7f]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000400)={"33683405069f77b537f22f1dae09beeb", r0, r4, {0x7a4e, 0xffff}, {0x1, 0x6}, 0x100000001, [0x1, 0x9f, 0x2, 0x6, 0x0, 0x4, 0x0, 0x4, 0xffff, 0x8, 0x1, 0x8, 0x80000000, 0x2, 0x9]}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000500), 0x400280, 0x0) sendmsg$AUDIT_GET_FEATURE(r5, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3fb, 0x4, 0x70bd29, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4048040}, 0x4040000) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000640), 0x2208c0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r6, 0x80089418, &(0x7f0000000680)) r7 = openat$cgroup_pressure(r5, &(0x7f00000006c0)='cpu.pressure\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000700), 0x4) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f0000000740)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000780)={"bf1db8e365f84571e9e478bbc5895482", r4, r8, {0x0, 0x20}, {0x2, 0x10000000}, 0x5, [0xffffffff, 0x1, 0x1, 0x1ff, 0x0, 0x3ff9, 0xffffffffffffff40, 0x9, 0x7ff, 0x9, 0x871, 0xf8, 0xc4, 0x50000000000, 0x58, 0x8]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r6, 0xc0c89425, &(0x7f0000000880)={"9956c1db96ed1ec45cf7a017c7012953", r0, r2, {0x8, 0x80}, {0x640, 0x3}, 0x7, [0x0, 0x7, 0x3ff, 0x2, 0x4, 0x3f, 0xab33, 0x7, 0x1ff, 0x3, 0x2, 0x7, 0x3, 0x0, 0x1, 0x955]}) openat$sr(0xffffffffffffff9c, &(0x7f00000009c0), 0x10040, 0x0) 23:12:27 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) accept$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) [ 128.326340] loop6: detected capacity change from 0 to 264192 [ 128.349893] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 23:12:35 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000016c0), 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) 23:12:35 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000680)={0x2, 0x2}, 0x4) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:35 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) r1 = accept4$packet(r0, 0x0, &(0x7f0000001080), 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001140)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000001240)=0xe8) recvfrom$packet(r1, &(0x7f00000010c0)=""/78, 0x4e, 0x21, &(0x7f0000001280)={0x11, 0xf6, r2, 0x1, 0x5, 0x6, @broadcast}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r3, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001300)=0x14, 0x0) sendmsg$AUDIT_USER(r0, &(0x7f00000014c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001480)={&(0x7f0000001380)={0xf8, 0x3ed, 0x20, 0x70bd2c, 0x25dfdbff, "0c0349f7d4b20ce63403e1de7d754f6e41b969f1155ab52dd615e37650869b52ce14706452c46557614b56e55cb1c1501fa7d97af914cd9b8736a62f559f1740c23b516d74d7f987a16784e86d42f9c9e1428f4e60653b6f4665df81eea9065a20e6e10689b4158f91e507737868c4e7921ba6e98c3f27c72e6a17d888256e54260519b77514ed7f017243f0d1d0cc7e9641ac018253fec0168132c00a8d6a465313b5a408f255452fdcefefd5d8b4d12051ab2623b2df6478aec158b48212011cf10980104e4a5d268d1aeb0ee40c64a43645e7e82011388af35294aa50d1e41db8616e158f8494", ["", "", "", "", "", "", "", "", ""]}, 0xf8}, 0x1, 0x0, 0x0, 0x8080}, 0x4) bind$packet(r3, &(0x7f0000001500)={0x11, 0xf6, r4, 0x1, 0x8}, 0x14) openat$cgroup_int(r0, &(0x7f0000001540)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000001580), &(0x7f00000015c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000001600)={0x0, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000001700)={'wg2\x00', 0x0}) sendto$packet(r3, &(0x7f0000001640)="0806973848a138de3c8430aa8fef21089f586181b45cb7bc04642cc384176e6d69edbabf24ec0e004dde5e7c1cb47d338d3ea1c4f5a9ac4a5c9a8d723e007b8e19b4f1455635460828d791459f7ae904734f2c2420e1be3aae8f3f1c0ec698eebfb7acdb8ef8509f5fcdb6c10d690f38ca09ac2f67312398d6", 0x79, 0x20040801, &(0x7f0000001740)={0x11, 0x9, r6, 0x1, 0x1, 0x6, @local}, 0x14) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000001780), 0xac081, 0x0) openat$cgroup_pressure(r7, &(0x7f00000017c0)='io.pressure\x00', 0x2, 0x0) getpeername$packet(r1, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) 23:12:35 executing program 7: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4044010}, 0xc1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7fff}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0xd3}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4000041) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x3, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x28100, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x9}]}, 0x4c}}, 0x4800) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x64, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x400d0}, 0x4000) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x44, r5, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000091}, 0x91) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4810}, 0x0) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r1, 0x408, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x14050}, 0x2000c055) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0xd1}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r7, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x38, r6, 0x300, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x94}, 0x845) sendmsg$IEEE802154_LLSEC_GETPARAMS(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x58, r5, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000004) 23:12:35 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0xed, 0x1, 0x3f, 0x1, 0x0, 0x100000000, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x600000, 0x0, @perf_config_ext={0x3}, 0x200, 0x9, 0x2, 0x1, 0x2, 0x0, 0x7, 0x0, 0x80, 0x0, 0x7fff}) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1, 0x20, 0x7b, 0x0, 0x5eb, 0x92001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf0f2, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x40000, 0x3ff, 0x1, 0x0, 0x5acb, 0xba, 0x8, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x1, 0x20, 0x3, 0x0, 0x7f, 0x4, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1e4, 0x4, @perf_config_ext={0x101, 0xffff}, 0x2000, 0x80, 0xb11, 0x4, 0x3ff, 0x5c87, 0x5, 0x0, 0x7ff, 0x0, 0xa6}, 0xffffffffffffffff, 0xa, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000002, 0x4000010, r0, 0x4) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x80, 0xfc, 0x8, 0x7, 0x0, 0x8000, 0x62, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6000, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x4, 0x1, 0x1, 0x20, 0x2, 0x0, 0x1f, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000400), 0x109000, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x20, 0x1f, 0x9c, 0x0, 0xa, 0x40008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000340)}, 0x0, 0x18, 0x8, 0x2, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x1}, r2, 0xa, r0, 0x9) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x5, 0x3f, 0x2, 0x3f, 0x0, 0x9, 0x80000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x18e9, 0x3f, 0x6, 0x3, 0xffffffff, 0x89, 0x200, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x0) socketpair(0x21, 0xa, 0x4, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$packet(r3, &(0x7f0000000540)=""/131, 0x83, 0x2040, &(0x7f0000000600)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000680)={0x9af0, 0x5b4, 0x8, 0x7}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8011) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e22, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}, 0x0, 0x0, 0x4f, 0x0, "59d71ac28975e0526729bcae336ddc5a226a4c372aed14dc659d7c330df976101cafec0e7a3d498fbf75a7e73dc04b080354250c2ef21490a433cfe6b2bfe903bfe20f7aff0b6ac1bc8b2c101b950668"}, 0xd8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000008c0)={0x1, 0x80, 0x59, 0x9, 0x3f, 0x6, 0x0, 0xeea, 0x40, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75, 0x0, @perf_config_ext={0x1ff, 0x7}, 0x3490, 0xfffffffffffffff4, 0x8, 0x8, 0x0, 0xffff8000, 0x4, 0x0, 0x400, 0x0, 0x5c35}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000940), &(0x7f0000000980)=0x14) 23:12:35 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) r8 = accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) read$char_usb(r0, &(0x7f00000008c0)=""/131, 0x83) accept$packet(r8, 0x0, &(0x7f0000000980)) pipe2(&(0x7f0000000b00), 0x80000) 23:12:35 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"1242df624590531b17ac8ee915e6b73a", 0x0, r0, {0x0, 0x400}, {0x3f, 0x4}, 0xff, [0x200, 0x2, 0x5, 0x28b2, 0x4, 0x4, 0x7, 0x5, 0x40, 0x7, 0x100, 0x81, 0x40, 0x107, 0x5, 0x101]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x6, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e20, 0x10001, @mcast2, 0x1}}, 0x0, 0x0, 0x1e, 0x0, "e46429e104fec92646ba066bcde8f859b21c1428bd3bf0b3977f8f2445867126c1b56f98ab9d48ef04b625081bf49233584eba8c02a8ff6a2c71d8f60a406534c3998bf965dabc23e654e43aa950d1a6"}, 0xd8) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000300)={"498e003672bf84a06e2086e0b12bbbe1", r1, r1, {0x4, 0x4c}, {0x20, 0x100}, 0x5, [0x2000000000000, 0x6, 0xfffffffffffffff8, 0x7f, 0x3, 0x1, 0xffffffff80000000, 0x9, 0x7, 0x7, 0x9, 0xfffffffffffffc00, 0x8001, 0x7, 0x1, 0x7f]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000400)={"33683405069f77b537f22f1dae09beeb", r0, r3, {0x7a4e, 0xffff}, {0x1, 0x6}, 0x100000001, [0x1, 0x9f, 0x2, 0x6, 0x0, 0x4, 0x0, 0x4, 0xffff, 0x8, 0x1, 0x8, 0x80000000, 0x2, 0x9]}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000500), 0x400280, 0x0) sendmsg$AUDIT_GET_FEATURE(r4, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3fb, 0x4, 0x70bd29, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4048040}, 0x4040000) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000640), 0x2208c0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f0000000680)) r6 = openat$cgroup_pressure(r4, &(0x7f00000006c0)='cpu.pressure\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000700), 0x4) ioctl$BTRFS_IOC_START_SYNC(r6, 0x80089418, &(0x7f0000000740)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000780)={"bf1db8e365f84571e9e478bbc5895482", r3, r7, {0x0, 0x20}, {0x2, 0x10000000}, 0x5, [0xffffffff, 0x1, 0x1, 0x1ff, 0x0, 0x3ff9, 0xffffffffffffff40, 0x9, 0x7ff, 0x9, 0x871, 0xf8, 0xc4, 0x50000000000, 0x58, 0x8]}) openat$sr(0xffffffffffffff9c, &(0x7f00000009c0), 0x10040, 0x0) 23:12:35 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}}, 0x240400d4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48004}, 0x885) r1 = clone3(&(0x7f0000000540)={0x200010800, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0xd}, &(0x7f0000000400)=""/43, 0x2b, &(0x7f0000000440)=""/192, &(0x7f0000000500)=[0xffffffffffffffff], 0x1}, 0x58) wait4(r2, &(0x7f00000005c0), 0x8, &(0x7f0000000600)) r3 = pidfd_open(r1, 0x0) process_mrelease(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x35, 0x0, "0e10f22863d7e5d2dd29ec07e4c76a5d83e613c06d87f00b0c9c371e12f253a147bef404b4c19c8a87f51603353fef74bfec73e0ad8b16376c3eb788f90fb2f2c83c32aedc41621da8d377fb129a0a84"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000800), 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000840)=@ccm_128={{0x304}, "4afcc0165c43df32", "915e4392a40ff28a85e4440489dc81ab", "3fae7ea6", "346e52d6b99297b1"}, 0x28) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) sendmsg$AUDIT_USER(r5, &(0x7f0000000b00)={&(0x7f0000000980), 0xc, &(0x7f0000000ac0)={&(0x7f00000009c0)={0xf0, 0x3ed, 0xb06, 0x70bd29, 0x25dfdbfb, "71021228acc4a6312c70f9aa7b5fab3047fae0d835b8766876d82e2afdb2f803f989ed00861bea634dacc8c59ce1f39f5cf7e071fae59b6079363e0c2f896d35a31cfedf6704e5ee159e7cca1b2d4c6b4b3e04518ed367d547b46cc1c2327f661d5c4e75f51df702ce7f80bb07bdefe10301681f662b66174e2e82da4f68b2afb96a32611a78efd32d4e7063ff292001a8c8036ffb2f47cd055979d92e4bd55514a4d6824ad2b3460afdc0ccde24666f478ac6a11297a72dca92bd78dd481e49e7eddee3335bb507f55306b3354acd7fd306e2088f20fc5e6be55a79ef75", ["", "", "", ""]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x488c0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000b40)='htcp\x00', 0x5) socketpair(0x26, 0x800, 0x9, &(0x7f0000000b80)) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000c00), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000cc0)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x20101000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, r6, 0x201, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x884) 23:12:36 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x5, 0x81b, 0x20, 0x6, 0xfffffffb}, 0x14) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:36 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) r8 = accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) read$char_usb(r0, &(0x7f00000008c0)=""/131, 0x83) accept$packet(r8, 0x0, &(0x7f0000000980)) pipe2(&(0x7f0000000b00), 0x80000) 23:12:36 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000016c0), 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) 23:12:36 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) read$char_usb(r0, &(0x7f00000008c0)=""/131, 0x83) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) pipe2(&(0x7f0000000b00), 0x80000) 23:12:36 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000005c0), &(0x7f0000000600)=0x4) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:36 executing program 7: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4044010}, 0xc1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7fff}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0xd3}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4000041) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x3, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x28100, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x9}]}, 0x4c}}, 0x4800) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x64, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x400d0}, 0x4000) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x44, r5, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000091}, 0x91) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4810}, 0x0) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r1, 0x408, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x14050}, 0x2000c055) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0xd1}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r7, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x38, r6, 0x300, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x94}, 0x845) sendmsg$IEEE802154_LLSEC_GETPARAMS(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x58, r5, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000004) 23:12:44 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"1242df624590531b17ac8ee915e6b73a", 0x0, r0, {0x0, 0x400}, {0x3f, 0x4}, 0xff, [0x200, 0x2, 0x5, 0x28b2, 0x4, 0x4, 0x7, 0x5, 0x40, 0x7, 0x100, 0x81, 0x40, 0x107, 0x5, 0x101]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x6, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e20, 0x10001, @mcast2, 0x1}}, 0x0, 0x0, 0x1e, 0x0, "e46429e104fec92646ba066bcde8f859b21c1428bd3bf0b3977f8f2445867126c1b56f98ab9d48ef04b625081bf49233584eba8c02a8ff6a2c71d8f60a406534c3998bf965dabc23e654e43aa950d1a6"}, 0xd8) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000300)={"498e003672bf84a06e2086e0b12bbbe1", r1, r1, {0x4, 0x4c}, {0x20, 0x100}, 0x5, [0x2000000000000, 0x6, 0xfffffffffffffff8, 0x7f, 0x3, 0x1, 0xffffffff80000000, 0x9, 0x7, 0x7, 0x9, 0xfffffffffffffc00, 0x8001, 0x7, 0x1, 0x7f]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000400)={"33683405069f77b537f22f1dae09beeb", r0, r3, {0x7a4e, 0xffff}, {0x1, 0x6}, 0x100000001, [0x1, 0x9f, 0x2, 0x6, 0x0, 0x4, 0x0, 0x4, 0xffff, 0x8, 0x1, 0x8, 0x80000000, 0x2, 0x9]}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000500), 0x400280, 0x0) sendmsg$AUDIT_GET_FEATURE(r4, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3fb, 0x4, 0x70bd29, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4048040}, 0x4040000) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000640), 0x2208c0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f0000000680)) r6 = openat$cgroup_pressure(r4, &(0x7f00000006c0)='cpu.pressure\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000700), 0x4) ioctl$BTRFS_IOC_START_SYNC(r6, 0x80089418, &(0x7f0000000740)) openat$sr(0xffffffffffffff9c, &(0x7f00000009c0), 0x10040, 0x0) 23:12:44 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}}, 0x240400d4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48004}, 0x885) r1 = clone3(&(0x7f0000000540)={0x200010800, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0xd}, &(0x7f0000000400)=""/43, 0x2b, &(0x7f0000000440)=""/192, &(0x7f0000000500)=[0xffffffffffffffff], 0x1}, 0x58) wait4(r2, &(0x7f00000005c0), 0x8, &(0x7f0000000600)) r3 = pidfd_open(r1, 0x0) process_mrelease(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x35, 0x0, "0e10f22863d7e5d2dd29ec07e4c76a5d83e613c06d87f00b0c9c371e12f253a147bef404b4c19c8a87f51603353fef74bfec73e0ad8b16376c3eb788f90fb2f2c83c32aedc41621da8d377fb129a0a84"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000800), 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000840)=@ccm_128={{0x304}, "4afcc0165c43df32", "915e4392a40ff28a85e4440489dc81ab", "3fae7ea6", "346e52d6b99297b1"}, 0x28) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) sendmsg$AUDIT_USER(r5, &(0x7f0000000b00)={&(0x7f0000000980), 0xc, &(0x7f0000000ac0)={&(0x7f00000009c0)={0xf0, 0x3ed, 0xb06, 0x70bd29, 0x25dfdbfb, "71021228acc4a6312c70f9aa7b5fab3047fae0d835b8766876d82e2afdb2f803f989ed00861bea634dacc8c59ce1f39f5cf7e071fae59b6079363e0c2f896d35a31cfedf6704e5ee159e7cca1b2d4c6b4b3e04518ed367d547b46cc1c2327f661d5c4e75f51df702ce7f80bb07bdefe10301681f662b66174e2e82da4f68b2afb96a32611a78efd32d4e7063ff292001a8c8036ffb2f47cd055979d92e4bd55514a4d6824ad2b3460afdc0ccde24666f478ac6a11297a72dca92bd78dd481e49e7eddee3335bb507f55306b3354acd7fd306e2088f20fc5e6be55a79ef75", ["", "", "", ""]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x488c0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000b40)='htcp\x00', 0x5) socketpair(0x26, 0x800, 0x9, &(0x7f0000000b80)) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000c00), 0xffffffffffffffff) 23:12:44 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0xed, 0x1, 0x3f, 0x1, 0x0, 0x100000000, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x600000, 0x0, @perf_config_ext={0x3}, 0x200, 0x9, 0x2, 0x1, 0x2, 0x0, 0x7, 0x0, 0x80, 0x0, 0x7fff}) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1, 0x20, 0x7b, 0x0, 0x5eb, 0x92001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf0f2, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x40000, 0x3ff, 0x1, 0x0, 0x5acb, 0xba, 0x8, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x1, 0x20, 0x3, 0x0, 0x7f, 0x4, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1e4, 0x4, @perf_config_ext={0x101, 0xffff}, 0x2000, 0x80, 0xb11, 0x4, 0x3ff, 0x5c87, 0x5, 0x0, 0x7ff, 0x0, 0xa6}, 0xffffffffffffffff, 0xa, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000002, 0x4000010, r0, 0x4) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x80, 0xfc, 0x8, 0x7, 0x0, 0x8000, 0x62, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6000, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x4, 0x1, 0x1, 0x20, 0x2, 0x0, 0x1f, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000400), 0x109000, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x20, 0x1f, 0x9c, 0x0, 0xa, 0x40008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000340)}, 0x0, 0x18, 0x8, 0x2, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x1}, r2, 0xa, r0, 0x9) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x5, 0x3f, 0x2, 0x3f, 0x0, 0x9, 0x80000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x18e9, 0x3f, 0x6, 0x3, 0xffffffff, 0x89, 0x200, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x0) socketpair(0x21, 0xa, 0x4, &(0x7f0000000500)={0xffffffffffffffff}) recvfrom$packet(r3, &(0x7f0000000540)=""/131, 0x83, 0x2040, &(0x7f0000000600)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000680)={0x9af0, 0x5b4, 0x8, 0x7}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8011) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e22, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}, 0x0, 0x0, 0x4f, 0x0, "59d71ac28975e0526729bcae336ddc5a226a4c372aed14dc659d7c330df976101cafec0e7a3d498fbf75a7e73dc04b080354250c2ef21490a433cfe6b2bfe903bfe20f7aff0b6ac1bc8b2c101b950668"}, 0xd8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000008c0)={0x1, 0x80, 0x59, 0x9, 0x3f, 0x6, 0x0, 0xeea, 0x40, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75, 0x0, @perf_config_ext={0x1ff, 0x7}, 0x3490, 0xfffffffffffffff4, 0x8, 0x8, 0x0, 0xffff8000, 0x4, 0x0, 0x400, 0x0, 0x5c35}) accept$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) 23:12:44 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:44 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000840)="78392bcced885b5aaf7331365bbd6602fa8eb953a6fed9b29e589490cc0dcf99bfd02f4ae42f0f5fcadbeb959950e72143e13ad3069552af73b19210a0586a67024070a905aebd3b27c7db3407f5ab12e5cc382525c9e548b1e2129ed23406a93fa97178beb1738d4fc6d59314cbd04cfb6f8d964e5fce2b", 0x78) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) pipe2(&(0x7f0000000b00), 0x80000) 23:12:44 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) r1 = accept4$packet(r0, 0x0, &(0x7f0000001080), 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001140)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000001240)=0xe8) recvfrom$packet(r1, &(0x7f00000010c0)=""/78, 0x4e, 0x21, &(0x7f0000001280)={0x11, 0xf6, r2, 0x1, 0x5, 0x6, @broadcast}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r3, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001300)=0x14, 0x0) sendmsg$AUDIT_USER(r0, &(0x7f00000014c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001480)={&(0x7f0000001380)={0xf8, 0x3ed, 0x20, 0x70bd2c, 0x25dfdbff, "0c0349f7d4b20ce63403e1de7d754f6e41b969f1155ab52dd615e37650869b52ce14706452c46557614b56e55cb1c1501fa7d97af914cd9b8736a62f559f1740c23b516d74d7f987a16784e86d42f9c9e1428f4e60653b6f4665df81eea9065a20e6e10689b4158f91e507737868c4e7921ba6e98c3f27c72e6a17d888256e54260519b77514ed7f017243f0d1d0cc7e9641ac018253fec0168132c00a8d6a465313b5a408f255452fdcefefd5d8b4d12051ab2623b2df6478aec158b48212011cf10980104e4a5d268d1aeb0ee40c64a43645e7e82011388af35294aa50d1e41db8616e158f8494", ["", "", "", "", "", "", "", "", ""]}, 0xf8}, 0x1, 0x0, 0x0, 0x8080}, 0x4) bind$packet(r3, &(0x7f0000001500)={0x11, 0xf6, r4, 0x1, 0x8}, 0x14) openat$cgroup_int(r0, &(0x7f0000001540)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000001580), &(0x7f00000015c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000001600)={0x0, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000001700)={'wg2\x00', 0x0}) sendto$packet(r3, &(0x7f0000001640)="0806973848a138de3c8430aa8fef21089f586181b45cb7bc04642cc384176e6d69edbabf24ec0e004dde5e7c1cb47d338d3ea1c4f5a9ac4a5c9a8d723e007b8e19b4f1455635460828d791459f7ae904734f2c2420e1be3aae8f3f1c0ec698eebfb7acdb8ef8509f5fcdb6c10d690f38ca09ac2f67312398d6", 0x79, 0x20040801, &(0x7f0000001740)={0x11, 0x9, r6, 0x1, 0x1, 0x6, @local}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f0000001780), 0xac081, 0x0) getpeername$packet(r1, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) 23:12:44 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000016c0), 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) 23:12:44 executing program 7: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4044010}, 0xc1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7fff}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0xd3}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4000041) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x3, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x28100, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x9}]}, 0x4c}}, 0x4800) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x64, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x400d0}, 0x4000) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x44, r5, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000091}, 0x91) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4810}, 0x0) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r1, 0x408, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x14050}, 0x2000c055) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0xd1}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r7, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x38, r6, 0x300, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x94}, 0x845) sendmsg$IEEE802154_LLSEC_GETPARAMS(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x58, r5, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000004) 23:12:44 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:44 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) syz_mount_image$msdos(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0xffff, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001780)="66856d34ca550d90368d7270101adf4be276e063379777f4c566c0582a68b9ae4631e2da7225a166cd09a2b5f620bedfa00825c924a8445976e7c3ade10175daa6527d4a4dc39a0a7d775d0e4c3d1850d7cbe27d2034ade206af5acc48c424dbfff07514f7cc1117d21c49680757e2959141e7788bc3c2d7e052c3ade33040bd6cdfde342d51f8e53b652fb81237f5d566f65d28142f8a2059f15a5bba742a0d9e0796a99764065bea2b0094a33431f2cf742bec82d439b7164cbb1f197c", 0xbe, 0xf5}, {&(0x7f0000001840)="d17795edd43721d494a068ed81715686349410a5d79a775282f816fb2bb7af7b0debdfd3b2316b938de1b3a448cfb9b91bd5394564ba14f05b95af16a759775fa9f17c7f1efdee0e56b7cde0f11452ade11261ecbcd72d58fb6fe7bf80d0ffa424763537d875c2e4ce9fe1ec50a3d26b6a4e932b6d907bdd0a390ecbc957dcf1417845db198141e4ae3767a53b545a8133ba041aa835efdc8de0fae79cb3a35776e8ea5b70509af1248f33d7fd33b803", 0xb0, 0x80000001}, {&(0x7f0000001900)="5b1c22e9c7080d1d13474d157ab27026fd1f4d53832be33b5330b9d7ea2bdd299374128f63ad4cf8b481888ec1fa521b062ee9", 0x33, 0xf35}, {&(0x7f0000001940)="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", 0xfd, 0x100000}, {&(0x7f0000001a40)="e062810b747bc65f5703e06cc3a241346105593cc8cbbd42bd1da280ef602470346375165484ab281362e10b28e66732c0bfd8b4615c3b96dd73df287264e9d4a67fbf", 0x43, 0x7fff}], 0x400, &(0x7f0000001b40)={[{@fat=@tz_utc}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@tz_utc}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x5}}, {@fat=@dmask}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) 23:12:44 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) pipe2(&(0x7f0000000b00), 0x80000) 23:12:44 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0xed, 0x1, 0x3f, 0x1, 0x0, 0x100000000, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x600000, 0x0, @perf_config_ext={0x3}, 0x200, 0x9, 0x2, 0x1, 0x2, 0x0, 0x7, 0x0, 0x80, 0x0, 0x7fff}) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1, 0x20, 0x7b, 0x0, 0x5eb, 0x92001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf0f2, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x40000, 0x3ff, 0x1, 0x0, 0x5acb, 0xba, 0x8, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x1, 0x20, 0x3, 0x0, 0x7f, 0x4, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1e4, 0x4, @perf_config_ext={0x101, 0xffff}, 0x2000, 0x80, 0xb11, 0x4, 0x3ff, 0x5c87, 0x5, 0x0, 0x7ff, 0x0, 0xa6}, 0xffffffffffffffff, 0xa, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000002, 0x4000010, r0, 0x4) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x80, 0xfc, 0x8, 0x7, 0x0, 0x8000, 0x62, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6000, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x4, 0x1, 0x1, 0x20, 0x2, 0x0, 0x1f, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000400), 0x109000, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x20, 0x1f, 0x9c, 0x0, 0xa, 0x40008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000340)}, 0x0, 0x18, 0x8, 0x2, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x1}, r2, 0xa, r0, 0x9) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x5, 0x3f, 0x2, 0x3f, 0x0, 0x9, 0x80000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x18e9, 0x3f, 0x6, 0x3, 0xffffffff, 0x89, 0x200, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x0) socketpair(0x21, 0xa, 0x4, &(0x7f0000000500)={0xffffffffffffffff}) recvfrom$packet(r3, &(0x7f0000000540)=""/131, 0x83, 0x2040, &(0x7f0000000600)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000680)={0x9af0, 0x5b4, 0x8, 0x7}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8011) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e22, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}, 0x0, 0x0, 0x4f, 0x0, "59d71ac28975e0526729bcae336ddc5a226a4c372aed14dc659d7c330df976101cafec0e7a3d498fbf75a7e73dc04b080354250c2ef21490a433cfe6b2bfe903bfe20f7aff0b6ac1bc8b2c101b950668"}, 0xd8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000008c0)={0x1, 0x80, 0x59, 0x9, 0x3f, 0x6, 0x0, 0xeea, 0x40, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75, 0x0, @perf_config_ext={0x1ff, 0x7}, 0x3490, 0xfffffffffffffff4, 0x8, 0x8, 0x0, 0xffff8000, 0x4, 0x0, 0x400, 0x0, 0x5c35}) accept$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) [ 145.698696] [ 145.698934] ===================================== [ 145.699462] WARNING: bad unlock balance detected! [ 145.699977] 6.19.0-rc5-next-20260115 #1 Not tainted [ 145.700540] ------------------------------------- [ 145.701060] syz-executor.2/4222 is trying to release lock (rcu_read_lock) at: [ 145.701872] [] __wait_on_freeing_inode+0x105/0x350 [ 145.702602] but there are no more locks to release! [ 145.703699] [ 145.703699] other info that might help us debug this: [ 145.705420] 4 locks held by syz-executor.2/4222: [ 145.706536] #0: ffff88800f5a83f8 (sb_writers#3){.+.+}-{0:0}, at: filename_create+0xf7/0x400 [ 145.708497] #1: ffff88803ca6ecb8 (&type->i_mutex_dir_key#3/1){+.+.}-{4:4}, at: filename_create+0x1b1/0x400 [ 145.711481] #2: ffff88800f5ac950 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0xe32/0x12d0 [ 145.713929] #3: ffffffff85c16898 (inode_hash_lock){+.+.}-{3:3}, at: insert_inode_locked+0xf9/0x890 [ 145.714953] [ 145.714953] stack backtrace: [ 145.715459] CPU: 1 UID: 0 PID: 4222 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260115 #1 PREEMPT(lazy) [ 145.715480] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 145.715490] Call Trace: [ 145.715496] [ 145.715502] dump_stack_lvl+0xca/0x120 [ 145.715536] ? __wait_on_freeing_inode+0x105/0x350 [ 145.715556] print_unlock_imbalance_bug+0x118/0x130 [ 145.715577] ? __wait_on_freeing_inode+0x105/0x350 [ 145.715596] lock_release+0x1ee/0x270 [ 145.715617] __wait_on_freeing_inode+0x10a/0x350 [ 145.715637] ? __pfx___wait_on_freeing_inode+0x10/0x10 [ 145.715658] ? __pfx_var_wake_function+0x10/0x10 [ 145.715683] ? lock_is_held_type+0x9e/0x120 [ 145.715699] insert_inode_locked+0x25f/0x890 [ 145.715722] __ext4_new_inode+0x223d/0x4cd0 [ 145.715746] ? __pfx___ext4_new_inode+0x10/0x10 [ 145.715765] ? __pfx___dquot_initialize+0x10/0x10 [ 145.715790] ? __pfx_avc_has_perm+0x10/0x10 [ 145.715812] ext4_symlink+0x623/0xb40 [ 145.715837] ? __pfx_ext4_symlink+0x10/0x10 [ 145.715858] ? security_inode_permission+0x72/0xe0 [ 145.715876] vfs_symlink+0x44b/0x840 [ 145.715898] filename_symlinkat+0x158/0x440 [ 145.715918] ? __pfx_filename_symlinkat+0x10/0x10 [ 145.715936] ? strncpy_from_user+0x21b/0x2f0 [ 145.715960] __x64_sys_symlink+0x82/0x110 [ 145.715978] do_syscall_64+0xbf/0x420 [ 145.715996] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.716013] RIP: 0033:0x7f5be5ef0427 [ 145.716025] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.716040] RSP: 002b:00007ffde4b12b78 EFLAGS: 00000206 ORIG_RAX: 0000000000000058 [ 145.716055] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5be5ef0427 [ 145.716066] RDX: 00007ffde4b12c57 RSI: 00007f5be5f4b019 RDI: 00007ffde4b12c40 [ 145.716076] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffde4b12a10 [ 145.716086] R10: 00007ffde4b128c7 R11: 0000000000000206 R12: 0000000000000001 [ 145.716095] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffde4b12c40 [ 145.716110] [ 145.737594] ------------[ cut here ]------------ [ 145.738110] WARNING: kernel/rcu/tree_plugin.h:443 at __rcu_read_unlock+0x25f/0x5c0, CPU#1: syz-executor.2/4222 [ 145.739361] Modules linked in: [ 145.739769] CPU: 1 UID: 0 PID: 4222 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260115 #1 PREEMPT(lazy) [ 145.740937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 145.741904] RIP: 0010:__rcu_read_unlock+0x25f/0x5c0 [ 145.742624] Code: f2 02 00 00 c7 43 58 01 00 00 00 bf 09 00 00 00 e8 d6 b7 de ff 4d 85 f6 0f 84 73 fe ff ff e8 38 8a 20 00 fb e9 68 fe ff ff 90 <0f> 0b 90 5b 5d 41 5c 41 5d 41 5e e9 81 4d 74 03 e8 2c 5d 56 00 e9 [ 145.744669] RSP: 0018:ffff8880406679a0 EFLAGS: 00010286 [ 145.745328] RAX: 00000000ffffffff RBX: ffff88804448d280 RCX: ffffffff815660f7 [ 145.746102] RDX: 0000000000000000 RSI: ffffffff81566100 RDI: ffff88804448d67c [ 145.746954] RBP: ffff88804448d280 R08: 0000000000000000 R09: fffffbfff0ba7040 [ 145.749597] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88804448d280 [ 145.751813] R13: 0000000000000001 R14: ffffffff85c0cbb0 R15: ffff88803c866268 [ 145.752688] FS: 0000555573843400(0000) GS:ffff8880e5442000(0000) knlGS:0000000000000000 [ 145.753635] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 145.754340] CR2: 0000555573843708 CR3: 000000001e17f000 CR4: 0000000000350ef0 [ 145.755118] Call Trace: [ 145.755536] [ 145.756677] __wait_on_freeing_inode+0x10f/0x350 [ 145.758033] ? __pfx___wait_on_freeing_inode+0x10/0x10 [ 145.760220] ? __pfx_var_wake_function+0x10/0x10 [ 145.762905] ? lock_is_held_type+0x9e/0x120 [ 145.765125] insert_inode_locked+0x25f/0x890 [ 145.767493] __ext4_new_inode+0x223d/0x4cd0 [ 145.771043] ? __pfx___ext4_new_inode+0x10/0x10 [ 145.772811] ? __pfx___dquot_initialize+0x10/0x10 [ 145.773909] ? __pfx_avc_has_perm+0x10/0x10 [ 145.776949] ext4_symlink+0x623/0xb40 [ 145.780142] ? __pfx_ext4_symlink+0x10/0x10 [ 145.781631] ? security_inode_permission+0x72/0xe0 [ 145.783931] vfs_symlink+0x44b/0x840 [ 145.785784] filename_symlinkat+0x158/0x440 [ 145.787443] ? __pfx_filename_symlinkat+0x10/0x10 [ 145.788544] ? strncpy_from_user+0x21b/0x2f0 [ 145.791176] __x64_sys_symlink+0x82/0x110 [ 145.792238] do_syscall_64+0xbf/0x420 [ 145.793486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.794186] RIP: 0033:0x7f5be5ef0427 [ 145.794785] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.796845] RSP: 002b:00007ffde4b12b78 EFLAGS: 00000206 ORIG_RAX: 0000000000000058 [ 145.797749] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5be5ef0427 [ 145.798605] RDX: 00007ffde4b12c57 RSI: 00007f5be5f4b019 RDI: 00007ffde4b12c40 [ 145.799455] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffde4b12a10 [ 145.800228] R10: 00007ffde4b128c7 R11: 0000000000000206 R12: 0000000000000001 [ 145.801088] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffde4b12c40 [ 145.804831] [ 145.805109] irq event stamp: 203 [ 145.805554] hardirqs last enabled at (203): [] _raw_spin_unlock_irqrestore+0x2c/0x50 [ 145.806746] hardirqs last disabled at (202): [] _raw_spin_lock_irqsave+0x53/0x60 [ 145.807879] softirqs last enabled at (198): [] kernel_fpu_end+0x59/0x70 [ 145.808969] softirqs last disabled at (196): [] kernel_fpu_begin_mask+0x1bb/0x300 [ 145.810117] ---[ end trace 0000000000000000 ]--- [ 145.812202] loop6: detected capacity change from 0 to 264192 [ 145.813572] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 23:12:44 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}}, 0x240400d4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48004}, 0x885) r1 = clone3(&(0x7f0000000540)={0x200010800, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0xd}, &(0x7f0000000400)=""/43, 0x2b, &(0x7f0000000440)=""/192, &(0x7f0000000500)=[0xffffffffffffffff], 0x1}, 0x58) wait4(r2, &(0x7f00000005c0), 0x8, &(0x7f0000000600)) r3 = pidfd_open(r1, 0x0) process_mrelease(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x35, 0x0, "0e10f22863d7e5d2dd29ec07e4c76a5d83e613c06d87f00b0c9c371e12f253a147bef404b4c19c8a87f51603353fef74bfec73e0ad8b16376c3eb788f90fb2f2c83c32aedc41621da8d377fb129a0a84"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000800), 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000840)=@ccm_128={{0x304}, "4afcc0165c43df32", "915e4392a40ff28a85e4440489dc81ab", "3fae7ea6", "346e52d6b99297b1"}, 0x28) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) sendmsg$AUDIT_USER(r5, &(0x7f0000000b00)={&(0x7f0000000980), 0xc, &(0x7f0000000ac0)={&(0x7f00000009c0)={0xf0, 0x3ed, 0xb06, 0x70bd29, 0x25dfdbfb, "71021228acc4a6312c70f9aa7b5fab3047fae0d835b8766876d82e2afdb2f803f989ed00861bea634dacc8c59ce1f39f5cf7e071fae59b6079363e0c2f896d35a31cfedf6704e5ee159e7cca1b2d4c6b4b3e04518ed367d547b46cc1c2327f661d5c4e75f51df702ce7f80bb07bdefe10301681f662b66174e2e82da4f68b2afb96a32611a78efd32d4e7063ff292001a8c8036ffb2f47cd055979d92e4bd55514a4d6824ad2b3460afdc0ccde24666f478ac6a11297a72dca92bd78dd481e49e7eddee3335bb507f55306b3354acd7fd306e2088f20fc5e6be55a79ef75", ["", "", "", ""]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x488c0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000b40)='htcp\x00', 0x5) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000c00), 0xffffffffffffffff) 23:12:44 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"1242df624590531b17ac8ee915e6b73a", 0x0, r0, {0x0, 0x400}, {0x3f, 0x4}, 0xff, [0x200, 0x2, 0x5, 0x28b2, 0x4, 0x4, 0x7, 0x5, 0x40, 0x7, 0x100, 0x81, 0x40, 0x107, 0x5, 0x101]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x6, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e20, 0x10001, @mcast2, 0x1}}, 0x0, 0x0, 0x1e, 0x0, "e46429e104fec92646ba066bcde8f859b21c1428bd3bf0b3977f8f2445867126c1b56f98ab9d48ef04b625081bf49233584eba8c02a8ff6a2c71d8f60a406534c3998bf965dabc23e654e43aa950d1a6"}, 0xd8) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000300)={"498e003672bf84a06e2086e0b12bbbe1", r1, r1, {0x4, 0x4c}, {0x20, 0x100}, 0x5, [0x2000000000000, 0x6, 0xfffffffffffffff8, 0x7f, 0x3, 0x1, 0xffffffff80000000, 0x9, 0x7, 0x7, 0x9, 0xfffffffffffffc00, 0x8001, 0x7, 0x1, 0x7f]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000400)={"33683405069f77b537f22f1dae09beeb", r0, r3, {0x7a4e, 0xffff}, {0x1, 0x6}, 0x100000001, [0x1, 0x9f, 0x2, 0x6, 0x0, 0x4, 0x0, 0x4, 0xffff, 0x8, 0x1, 0x8, 0x80000000, 0x2, 0x9]}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000500), 0x400280, 0x0) sendmsg$AUDIT_GET_FEATURE(r4, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3fb, 0x4, 0x70bd29, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4048040}, 0x4040000) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000640), 0x2208c0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f0000000680)) openat$cgroup_pressure(r4, &(0x7f00000006c0)='cpu.pressure\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000700), 0x4) openat$sr(0xffffffffffffff9c, &(0x7f00000009c0), 0x10040, 0x0) 23:12:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:52 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) pipe2(&(0x7f0000000b00), 0x80000) 23:12:52 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"1242df624590531b17ac8ee915e6b73a", 0x0, r0, {0x0, 0x400}, {0x3f, 0x4}, 0xff, [0x200, 0x2, 0x5, 0x28b2, 0x4, 0x4, 0x7, 0x5, 0x40, 0x7, 0x100, 0x81, 0x40, 0x107, 0x5, 0x101]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x6, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e20, 0x10001, @mcast2, 0x1}}, 0x0, 0x0, 0x1e, 0x0, "e46429e104fec92646ba066bcde8f859b21c1428bd3bf0b3977f8f2445867126c1b56f98ab9d48ef04b625081bf49233584eba8c02a8ff6a2c71d8f60a406534c3998bf965dabc23e654e43aa950d1a6"}, 0xd8) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000300)={"498e003672bf84a06e2086e0b12bbbe1", r1, r1, {0x4, 0x4c}, {0x20, 0x100}, 0x5, [0x2000000000000, 0x6, 0xfffffffffffffff8, 0x7f, 0x3, 0x1, 0xffffffff80000000, 0x9, 0x7, 0x7, 0x9, 0xfffffffffffffc00, 0x8001, 0x7, 0x1, 0x7f]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000400)={"33683405069f77b537f22f1dae09beeb", r0, r3, {0x7a4e, 0xffff}, {0x1, 0x6}, 0x100000001, [0x1, 0x9f, 0x2, 0x6, 0x0, 0x4, 0x0, 0x4, 0xffff, 0x8, 0x1, 0x8, 0x80000000, 0x2, 0x9]}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000500), 0x400280, 0x0) sendmsg$AUDIT_GET_FEATURE(r4, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3fb, 0x4, 0x70bd29, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4048040}, 0x4040000) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000640), 0x2208c0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f0000000680)) openat$cgroup_pressure(r4, &(0x7f00000006c0)='cpu.pressure\x00', 0x2, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000009c0), 0x10040, 0x0) 23:12:52 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}}, 0x240400d4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48004}, 0x885) r1 = clone3(&(0x7f0000000540)={0x200010800, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0xd}, &(0x7f0000000400)=""/43, 0x2b, &(0x7f0000000440)=""/192, &(0x7f0000000500)=[0xffffffffffffffff], 0x1}, 0x58) wait4(r2, &(0x7f00000005c0), 0x8, &(0x7f0000000600)) r3 = pidfd_open(r1, 0x0) process_mrelease(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x35, 0x0, "0e10f22863d7e5d2dd29ec07e4c76a5d83e613c06d87f00b0c9c371e12f253a147bef404b4c19c8a87f51603353fef74bfec73e0ad8b16376c3eb788f90fb2f2c83c32aedc41621da8d377fb129a0a84"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000800), 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000840)=@ccm_128={{0x304}, "4afcc0165c43df32", "915e4392a40ff28a85e4440489dc81ab", "3fae7ea6", "346e52d6b99297b1"}, 0x28) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) sendmsg$AUDIT_USER(r5, &(0x7f0000000b00)={&(0x7f0000000980), 0xc, &(0x7f0000000ac0)={&(0x7f00000009c0)={0xf0, 0x3ed, 0xb06, 0x70bd29, 0x25dfdbfb, "71021228acc4a6312c70f9aa7b5fab3047fae0d835b8766876d82e2afdb2f803f989ed00861bea634dacc8c59ce1f39f5cf7e071fae59b6079363e0c2f896d35a31cfedf6704e5ee159e7cca1b2d4c6b4b3e04518ed367d547b46cc1c2327f661d5c4e75f51df702ce7f80bb07bdefe10301681f662b66174e2e82da4f68b2afb96a32611a78efd32d4e7063ff292001a8c8036ffb2f47cd055979d92e4bd55514a4d6824ad2b3460afdc0ccde24666f478ac6a11297a72dca92bd78dd481e49e7eddee3335bb507f55306b3354acd7fd306e2088f20fc5e6be55a79ef75", ["", "", "", ""]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x488c0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000b40)='htcp\x00', 0x5) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000c00), 0xffffffffffffffff) 23:12:52 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0xed, 0x1, 0x3f, 0x1, 0x0, 0x100000000, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x600000, 0x0, @perf_config_ext={0x3}, 0x200, 0x9, 0x2, 0x1, 0x2, 0x0, 0x7, 0x0, 0x80, 0x0, 0x7fff}) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1, 0x20, 0x7b, 0x0, 0x5eb, 0x92001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf0f2, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x40000, 0x3ff, 0x1, 0x0, 0x5acb, 0xba, 0x8, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x1, 0x20, 0x3, 0x0, 0x7f, 0x4, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1e4, 0x4, @perf_config_ext={0x101, 0xffff}, 0x2000, 0x80, 0xb11, 0x4, 0x3ff, 0x5c87, 0x5, 0x0, 0x7ff, 0x0, 0xa6}, 0xffffffffffffffff, 0xa, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000002, 0x4000010, r0, 0x4) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x80, 0xfc, 0x8, 0x7, 0x0, 0x8000, 0x62, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6000, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x4, 0x1, 0x1, 0x20, 0x2, 0x0, 0x1f, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000400), 0x109000, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x20, 0x1f, 0x9c, 0x0, 0xa, 0x40008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000340)}, 0x0, 0x18, 0x8, 0x2, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x1}, r2, 0xa, r0, 0x9) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x5, 0x3f, 0x2, 0x3f, 0x0, 0x9, 0x80000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x18e9, 0x3f, 0x6, 0x3, 0xffffffff, 0x89, 0x200, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x0) socketpair(0x21, 0xa, 0x4, &(0x7f0000000500)={0xffffffffffffffff}) recvfrom$packet(r3, &(0x7f0000000540)=""/131, 0x83, 0x2040, &(0x7f0000000600)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000680)={0x9af0, 0x5b4, 0x8, 0x7}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8011) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e22, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}, 0x0, 0x0, 0x4f, 0x0, "59d71ac28975e0526729bcae336ddc5a226a4c372aed14dc659d7c330df976101cafec0e7a3d498fbf75a7e73dc04b080354250c2ef21490a433cfe6b2bfe903bfe20f7aff0b6ac1bc8b2c101b950668"}, 0xd8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000008c0)={0x1, 0x80, 0x59, 0x9, 0x3f, 0x6, 0x0, 0xeea, 0x40, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x75, 0x0, @perf_config_ext={0x1ff, 0x7}, 0x3490, 0xfffffffffffffff4, 0x8, 0x8, 0x0, 0xffff8000, 0x4, 0x0, 0x400, 0x0, 0x5c35}) accept$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) 23:12:52 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) syz_mount_image$msdos(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0xffff, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001780)="66856d34ca550d90368d7270101adf4be276e063379777f4c566c0582a68b9ae4631e2da7225a166cd09a2b5f620bedfa00825c924a8445976e7c3ade10175daa6527d4a4dc39a0a7d775d0e4c3d1850d7cbe27d2034ade206af5acc48c424dbfff07514f7cc1117d21c49680757e2959141e7788bc3c2d7e052c3ade33040bd6cdfde342d51f8e53b652fb81237f5d566f65d28142f8a2059f15a5bba742a0d9e0796a99764065bea2b0094a33431f2cf742bec82d439b7164cbb1f197c", 0xbe, 0xf5}, {&(0x7f0000001840)="d17795edd43721d494a068ed81715686349410a5d79a775282f816fb2bb7af7b0debdfd3b2316b938de1b3a448cfb9b91bd5394564ba14f05b95af16a759775fa9f17c7f1efdee0e56b7cde0f11452ade11261ecbcd72d58fb6fe7bf80d0ffa424763537d875c2e4ce9fe1ec50a3d26b6a4e932b6d907bdd0a390ecbc957dcf1417845db198141e4ae3767a53b545a8133ba041aa835efdc8de0fae79cb3a35776e8ea5b70509af1248f33d7fd33b803", 0xb0, 0x80000001}, {&(0x7f0000001900)="5b1c22e9c7080d1d13474d157ab27026fd1f4d53832be33b5330b9d7ea2bdd299374128f63ad4cf8b481888ec1fa521b062ee9", 0x33, 0xf35}, {&(0x7f0000001940)="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", 0xfd, 0x100000}, {&(0x7f0000001a40)="e062810b747bc65f5703e06cc3a241346105593cc8cbbd42bd1da280ef602470346375165484ab281362e10b28e66732c0bfd8b4615c3b96dd73df287264e9d4a67fbf", 0x43, 0x7fff}], 0x400, &(0x7f0000001b40)={[{@fat=@tz_utc}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@tz_utc}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x5}}, {@fat=@dmask}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) 23:12:52 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) r1 = accept4$packet(r0, 0x0, &(0x7f0000001080), 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001140)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000001240)=0xe8) recvfrom$packet(r1, &(0x7f00000010c0)=""/78, 0x4e, 0x21, &(0x7f0000001280)={0x11, 0xf6, r2, 0x1, 0x5, 0x6, @broadcast}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r3, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001300)=0x14, 0x0) sendmsg$AUDIT_USER(r0, &(0x7f00000014c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001480)={&(0x7f0000001380)={0xf8, 0x3ed, 0x20, 0x70bd2c, 0x25dfdbff, "0c0349f7d4b20ce63403e1de7d754f6e41b969f1155ab52dd615e37650869b52ce14706452c46557614b56e55cb1c1501fa7d97af914cd9b8736a62f559f1740c23b516d74d7f987a16784e86d42f9c9e1428f4e60653b6f4665df81eea9065a20e6e10689b4158f91e507737868c4e7921ba6e98c3f27c72e6a17d888256e54260519b77514ed7f017243f0d1d0cc7e9641ac018253fec0168132c00a8d6a465313b5a408f255452fdcefefd5d8b4d12051ab2623b2df6478aec158b48212011cf10980104e4a5d268d1aeb0ee40c64a43645e7e82011388af35294aa50d1e41db8616e158f8494", ["", "", "", "", "", "", "", "", ""]}, 0xf8}, 0x1, 0x0, 0x0, 0x8080}, 0x4) bind$packet(r3, &(0x7f0000001500)={0x11, 0xf6, r4, 0x1, 0x8}, 0x14) openat$cgroup_int(r0, &(0x7f0000001540)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000001580), &(0x7f00000015c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000001600)={0x0, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000001700)={'wg2\x00', 0x0}) sendto$packet(r3, &(0x7f0000001640)="0806973848a138de3c8430aa8fef21089f586181b45cb7bc04642cc384176e6d69edbabf24ec0e004dde5e7c1cb47d338d3ea1c4f5a9ac4a5c9a8d723e007b8e19b4f1455635460828d791459f7ae904734f2c2420e1be3aae8f3f1c0ec698eebfb7acdb8ef8509f5fcdb6c10d690f38ca09ac2f67312398d6", 0x79, 0x20040801, &(0x7f0000001740)={0x11, 0x9, r6, 0x1, 0x1, 0x6, @local}, 0x14) getpeername$packet(r1, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) 23:12:52 executing program 7: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4044010}, 0xc1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7fff}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0xd3}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4000041) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x3, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x28100, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x9}]}, 0x4c}}, 0x4800) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x64, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x400d0}, 0x4000) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x44, r5, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000091}, 0x91) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4810}, 0x0) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r1, 0x408, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x14050}, 0x2000c055) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0xd1}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_GETPARAMS(r7, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x58, r5, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000004) 23:12:52 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) sendmsg$AUDIT_SET(r0, &(0x7f0000000800)={&(0x7f0000000740), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, 0x3e9, 0x902, 0x70bd2c, 0x25dfdbfe, {0x42, 0x0, 0x1, 0x0, 0x5e, 0x8001, 0xf0, 0x6, 0x0, 0x1}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x10000) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) pipe2(&(0x7f0000000b00), 0x80000) [ 153.611623] loop6: detected capacity change from 0 to 264192 [ 153.613626] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 23:12:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:52 executing program 7: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4044010}, 0xc1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7fff}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0xd3}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4000041) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000280), 0x3, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x28100, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x9}]}, 0x4c}}, 0x4800) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x64, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x400d0}, 0x4000) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x44, r5, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000091}, 0x91) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r6, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4810}, 0x0) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r1, 0x408, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x14050}, 0x2000c055) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0xd1}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_GETPARAMS(r7, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x58, r5, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000004) 23:12:52 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}}, 0x240400d4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48004}, 0x885) r1 = clone3(&(0x7f0000000540)={0x200010800, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0xd}, &(0x7f0000000400)=""/43, 0x2b, &(0x7f0000000440)=""/192, &(0x7f0000000500)=[0xffffffffffffffff], 0x1}, 0x58) wait4(r2, &(0x7f00000005c0), 0x8, &(0x7f0000000600)) r3 = pidfd_open(r1, 0x0) process_mrelease(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x35, 0x0, "0e10f22863d7e5d2dd29ec07e4c76a5d83e613c06d87f00b0c9c371e12f253a147bef404b4c19c8a87f51603353fef74bfec73e0ad8b16376c3eb788f90fb2f2c83c32aedc41621da8d377fb129a0a84"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000800), 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000840)=@ccm_128={{0x304}, "4afcc0165c43df32", "915e4392a40ff28a85e4440489dc81ab", "3fae7ea6", "346e52d6b99297b1"}, 0x28) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) sendmsg$AUDIT_USER(r5, &(0x7f0000000b00)={&(0x7f0000000980), 0xc, &(0x7f0000000ac0)={&(0x7f00000009c0)={0xf0, 0x3ed, 0xb06, 0x70bd29, 0x25dfdbfb, "71021228acc4a6312c70f9aa7b5fab3047fae0d835b8766876d82e2afdb2f803f989ed00861bea634dacc8c59ce1f39f5cf7e071fae59b6079363e0c2f896d35a31cfedf6704e5ee159e7cca1b2d4c6b4b3e04518ed367d547b46cc1c2327f661d5c4e75f51df702ce7f80bb07bdefe10301681f662b66174e2e82da4f68b2afb96a32611a78efd32d4e7063ff292001a8c8036ffb2f47cd055979d92e4bd55514a4d6824ad2b3460afdc0ccde24666f478ac6a11297a72dca92bd78dd481e49e7eddee3335bb507f55306b3354acd7fd306e2088f20fc5e6be55a79ef75", ["", "", "", ""]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x488c0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000b40)='htcp\x00', 0x5) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000c00), 0xffffffffffffffff) 23:12:52 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) openat$full(0xffffffffffffff9c, &(0x7f0000001680), 0x10000, 0x0) syz_mount_image$msdos(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0xffff, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001780)="66856d34ca550d90368d7270101adf4be276e063379777f4c566c0582a68b9ae4631e2da7225a166cd09a2b5f620bedfa00825c924a8445976e7c3ade10175daa6527d4a4dc39a0a7d775d0e4c3d1850d7cbe27d2034ade206af5acc48c424dbfff07514f7cc1117d21c49680757e2959141e7788bc3c2d7e052c3ade33040bd6cdfde342d51f8e53b652fb81237f5d566f65d28142f8a2059f15a5bba742a0d9e0796a99764065bea2b0094a33431f2cf742bec82d439b7164cbb1f197c", 0xbe, 0xf5}, {&(0x7f0000001840)="d17795edd43721d494a068ed81715686349410a5d79a775282f816fb2bb7af7b0debdfd3b2316b938de1b3a448cfb9b91bd5394564ba14f05b95af16a759775fa9f17c7f1efdee0e56b7cde0f11452ade11261ecbcd72d58fb6fe7bf80d0ffa424763537d875c2e4ce9fe1ec50a3d26b6a4e932b6d907bdd0a390ecbc957dcf1417845db198141e4ae3767a53b545a8133ba041aa835efdc8de0fae79cb3a35776e8ea5b70509af1248f33d7fd33b803", 0xb0, 0x80000001}, {&(0x7f0000001900)="5b1c22e9c7080d1d13474d157ab27026fd1f4d53832be33b5330b9d7ea2bdd299374128f63ad4cf8b481888ec1fa521b062ee9", 0x33, 0xf35}, {&(0x7f0000001940)="d732605abcd5419765e878f994d9ec61c28281453b07117d31191f7b70012beb36c1ef0a09ab8f4e93086be03b23ffb41bd45c532a0f1ab980917a531fe636abf6fc54ab5642153879fcfc87f4dff55c191819c1971631965489d499d7e8fb77225112236923015fae3619f281091ea7d6da33172ad779fb535cec5e1c211c366cd05ec33b7fc480d448ca530fc318b1eacd62bc5024d32480a88b46785bb9d267ff4a34a49b6f9162ebb7c02c752bc3153abe04c05e1f342a981ddda84386d809493855720d4a22d51ed08a897872fbd25d263b81e646910c618304d6f52f16f08c16797b6a9b161e3561b2b03e0615037cb4f576f132c4118f53a80e", 0xfd, 0x100000}, {&(0x7f0000001a40)="e062810b747bc65f5703e06cc3a241346105593cc8cbbd42bd1da280ef602470346375165484ab281362e10b28e66732c0bfd8b4615c3b96dd73df287264e9d4a67fbf", 0x43, 0x7fff}], 0x400, &(0x7f0000001b40)={[{@fat=@tz_utc}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@tz_utc}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x5}}, {@fat=@dmask}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) 23:12:52 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) bind$packet(r4, &(0x7f0000000700)={0x11, 0x6, r7, 0x1, 0x4, 0x6, @multicast}, 0x14) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) pipe2(&(0x7f0000000b00), 0x80000) 23:12:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) sendto$packet(r2, &(0x7f0000000340)="2d5d57bf03", 0x5, 0x20044004, &(0x7f0000000380)={0x11, 0x15, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:52 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) r1 = accept4$packet(r0, 0x0, &(0x7f0000001080), 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001140)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000001240)=0xe8) recvfrom$packet(r1, &(0x7f00000010c0)=""/78, 0x4e, 0x21, &(0x7f0000001280)={0x11, 0xf6, r2, 0x1, 0x5, 0x6, @broadcast}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r3, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001300)=0x14, 0x0) sendmsg$AUDIT_USER(r0, &(0x7f00000014c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001480)={&(0x7f0000001380)={0xf8, 0x3ed, 0x20, 0x70bd2c, 0x25dfdbff, "0c0349f7d4b20ce63403e1de7d754f6e41b969f1155ab52dd615e37650869b52ce14706452c46557614b56e55cb1c1501fa7d97af914cd9b8736a62f559f1740c23b516d74d7f987a16784e86d42f9c9e1428f4e60653b6f4665df81eea9065a20e6e10689b4158f91e507737868c4e7921ba6e98c3f27c72e6a17d888256e54260519b77514ed7f017243f0d1d0cc7e9641ac018253fec0168132c00a8d6a465313b5a408f255452fdcefefd5d8b4d12051ab2623b2df6478aec158b48212011cf10980104e4a5d268d1aeb0ee40c64a43645e7e82011388af35294aa50d1e41db8616e158f8494", ["", "", "", "", "", "", "", "", ""]}, 0xf8}, 0x1, 0x0, 0x0, 0x8080}, 0x4) bind$packet(r3, &(0x7f0000001500)={0x11, 0xf6, r4, 0x1, 0x8}, 0x14) openat$cgroup_int(r0, &(0x7f0000001540)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000001580), &(0x7f00000015c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000001600)={0x0, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000001700)={'wg2\x00'}) getpeername$packet(r1, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) [ 153.892873] loop6: detected capacity change from 0 to 264192 23:12:52 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"1242df624590531b17ac8ee915e6b73a", 0x0, r0, {0x0, 0x400}, {0x3f, 0x4}, 0xff, [0x200, 0x2, 0x5, 0x28b2, 0x4, 0x4, 0x7, 0x5, 0x40, 0x7, 0x100, 0x81, 0x40, 0x107, 0x5, 0x101]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000140)=0x6, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e20, 0x10001, @mcast2, 0x1}}, 0x0, 0x0, 0x1e, 0x0, "e46429e104fec92646ba066bcde8f859b21c1428bd3bf0b3977f8f2445867126c1b56f98ab9d48ef04b625081bf49233584eba8c02a8ff6a2c71d8f60a406534c3998bf965dabc23e654e43aa950d1a6"}, 0xd8) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f00000002c0)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000300)={"498e003672bf84a06e2086e0b12bbbe1", r1, r1, {0x4, 0x4c}, {0x20, 0x100}, 0x5, [0x2000000000000, 0x6, 0xfffffffffffffff8, 0x7f, 0x3, 0x1, 0xffffffff80000000, 0x9, 0x7, 0x7, 0x9, 0xfffffffffffffc00, 0x8001, 0x7, 0x1, 0x7f]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000400)={"33683405069f77b537f22f1dae09beeb", r0, r3, {0x7a4e, 0xffff}, {0x1, 0x6}, 0x100000001, [0x1, 0x9f, 0x2, 0x6, 0x0, 0x4, 0x0, 0x4, 0xffff, 0x8, 0x1, 0x8, 0x80000000, 0x2, 0x9]}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000500), 0x400280, 0x0) sendmsg$AUDIT_GET_FEATURE(r4, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3fb, 0x4, 0x70bd29, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4048040}, 0x4040000) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000640), 0x2208c0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f0000000680)) openat$sr(0xffffffffffffff9c, &(0x7f00000009c0), 0x10040, 0x0) 23:12:52 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0xed, 0x1, 0x3f, 0x1, 0x0, 0x100000000, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x600000, 0x0, @perf_config_ext={0x3}, 0x200, 0x9, 0x2, 0x1, 0x2, 0x0, 0x7, 0x0, 0x80, 0x0, 0x7fff}) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1, 0x20, 0x7b, 0x0, 0x5eb, 0x92001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf0f2, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x40000, 0x3ff, 0x1, 0x0, 0x5acb, 0xba, 0x8, 0x0, 0xfffffffd, 0x0, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x1, 0x20, 0x3, 0x0, 0x7f, 0x4, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1e4, 0x4, @perf_config_ext={0x101, 0xffff}, 0x2000, 0x80, 0xb11, 0x4, 0x3ff, 0x5c87, 0x5, 0x0, 0x7ff, 0x0, 0xa6}, 0xffffffffffffffff, 0xa, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000002, 0x4000010, r0, 0x4) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x80, 0xfc, 0x8, 0x7, 0x0, 0x8000, 0x62, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6000, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x4, 0x1, 0x1, 0x20, 0x2, 0x0, 0x1f, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000400), 0x109000, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x20, 0x1f, 0x9c, 0x0, 0xa, 0x40008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000340)}, 0x0, 0x18, 0x8, 0x2, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x1}, r2, 0xa, r0, 0x9) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x5, 0x3f, 0x2, 0x3f, 0x0, 0x9, 0x80000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x18e9, 0x3f, 0x6, 0x3, 0xffffffff, 0x89, 0x200, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x0) socketpair(0x21, 0xa, 0x4, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$packet(r3, &(0x7f0000000540)=""/131, 0x83, 0x2040, &(0x7f0000000600)={0x11, 0x4, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000680)={0x9af0, 0x5b4, 0x8, 0x7}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8011) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000007c0)={@in6={{0xa, 0x4e22, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}, 0x0, 0x0, 0x4f, 0x0, "59d71ac28975e0526729bcae336ddc5a226a4c372aed14dc659d7c330df976101cafec0e7a3d498fbf75a7e73dc04b080354250c2ef21490a433cfe6b2bfe903bfe20f7aff0b6ac1bc8b2c101b950668"}, 0xd8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000940), &(0x7f0000000980)=0x14) accept$packet(r5, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) [ 153.900192] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 23:12:53 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}}, 0x240400d4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48004}, 0x885) r1 = clone3(&(0x7f0000000540)={0x200010800, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0xd}, &(0x7f0000000400)=""/43, 0x2b, &(0x7f0000000440)=""/192, &(0x7f0000000500)=[0xffffffffffffffff], 0x1}, 0x58) wait4(r2, &(0x7f00000005c0), 0x8, &(0x7f0000000600)) r3 = pidfd_open(r1, 0x0) process_mrelease(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x35, 0x0, "0e10f22863d7e5d2dd29ec07e4c76a5d83e613c06d87f00b0c9c371e12f253a147bef404b4c19c8a87f51603353fef74bfec73e0ad8b16376c3eb788f90fb2f2c83c32aedc41621da8d377fb129a0a84"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000800), 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000840)=@ccm_128={{0x304}, "4afcc0165c43df32", "915e4392a40ff28a85e4440489dc81ab", "3fae7ea6", "346e52d6b99297b1"}, 0x28) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) sendmsg$AUDIT_USER(r5, &(0x7f0000000b00)={&(0x7f0000000980), 0xc, &(0x7f0000000ac0)={&(0x7f00000009c0)={0xf0, 0x3ed, 0xb06, 0x70bd29, 0x25dfdbfb, "71021228acc4a6312c70f9aa7b5fab3047fae0d835b8766876d82e2afdb2f803f989ed00861bea634dacc8c59ce1f39f5cf7e071fae59b6079363e0c2f896d35a31cfedf6704e5ee159e7cca1b2d4c6b4b3e04518ed367d547b46cc1c2327f661d5c4e75f51df702ce7f80bb07bdefe10301681f662b66174e2e82da4f68b2afb96a32611a78efd32d4e7063ff292001a8c8036ffb2f47cd055979d92e4bd55514a4d6824ad2b3460afdc0ccde24666f478ac6a11297a72dca92bd78dd481e49e7eddee3335bb507f55306b3354acd7fd306e2088f20fc5e6be55a79ef75", ["", "", "", ""]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x488c0) socketpair(0x26, 0x800, 0x9, &(0x7f0000000b80)) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000c00), 0xffffffffffffffff) 23:12:53 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000006c0)=[@window={0x3, 0x7ff, 0x8}, @mss={0x2, 0x4}], 0x2) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) pipe2(&(0x7f0000000b00), 0x80000) 23:12:53 executing program 5: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/207, 0xcf, 0x62, &(0x7f0000000140)={0x11, 0x1c, r0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x2, r1, 0x1, 0x73, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, 0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) openat$hpet(0xffffffffffffff9c, &(0x7f00000009c0), 0x50000, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000b00), 0x2c040, 0x0) 23:12:53 executing program 6: r0 = socket(0x29, 0xa, 0x6) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9aba6ec86046c8e7c622cadb85bc4b5a", 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @timestamp], 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001280)={&(0x7f0000001140), &(0x7f0000001180)=""/240, 0xf0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x2000, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x38, 0x3e9, 0x1, 0x70bd2b, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa485, 0x7ff, 0x0, 0x8001}, ["", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x0, 'pids'}, {0x2d, 'devices'}, {0x2d, 'io'}, {0x2b, 'io'}, {0xff0b32ef7726d14c, 'cpuset'}]}, 0x1f) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x20200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000001600)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/123, 0x7b, 0x1, &(0x7f0000001500)=""/236, 0xec}, &(0x7f0000001640)=0x40) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000016c0), 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0xffff, 0x5, &(0x7f0000001ac0)=[{&(0x7f0000001780)="66856d34ca550d90368d7270101adf4be276e063379777f4c566c0582a68b9ae4631e2da7225a166cd09a2b5f620bedfa00825c924a8445976e7c3ade10175daa6527d4a4dc39a0a7d775d0e4c3d1850d7cbe27d2034ade206af5acc48c424dbfff07514f7cc1117d21c49680757e2959141e7788bc3c2d7e052c3ade33040bd6cdfde342d51f8e53b652fb81237f5d566f65d28142f8a2059f15a5bba742a0d9e0796a99764065bea2b0094a33431f2cf742bec82d439b7164cbb1f197c", 0xbe, 0xf5}, {&(0x7f0000001840)="d17795edd43721d494a068ed81715686349410a5d79a775282f816fb2bb7af7b0debdfd3b2316b938de1b3a448cfb9b91bd5394564ba14f05b95af16a759775fa9f17c7f1efdee0e56b7cde0f11452ade11261ecbcd72d58fb6fe7bf80d0ffa424763537d875c2e4ce9fe1ec50a3d26b6a4e932b6d907bdd0a390ecbc957dcf1417845db198141e4ae3767a53b545a8133ba041aa835efdc8de0fae79cb3a35776e8ea5b70509af1248f33d7fd33b803", 0xb0, 0x80000001}, {&(0x7f0000001900)="5b1c22e9c7080d1d13474d157ab27026fd1f4d53832be33b5330b9d7ea2bdd299374128f63ad4cf8b481888ec1fa521b062ee9", 0x33, 0xf35}, {&(0x7f0000001940)="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", 0xfd, 0x100000}, {&(0x7f0000001a40)="e062810b747bc65f5703e06cc3a241346105593cc8cbbd42bd1da280ef602470346375165484ab281362e10b28e66732c0bfd8b4615c3b96dd73df287264e9d4a67fbf", 0x43, 0x7fff}], 0x400, &(0x7f0000001b40)={[{@fat=@tz_utc}, {@dots}, {@dots}, {@fat=@quiet}, {@fat=@tz_utc}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x5}}, {@fat=@dmask}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x103400, 0x0) 23:12:53 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc8, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x9af94ff8b3647c04}, 0x4040084) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) pipe2(&(0x7f0000000b00), 0x80000) 23:12:53 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}}, 0x240400d4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48004}, 0x885) r1 = clone3(&(0x7f0000000540)={0x200010800, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0xd}, &(0x7f0000000400)=""/43, 0x2b, &(0x7f0000000440)=""/192, &(0x7f0000000500)=[0xffffffffffffffff], 0x1}, 0x58) wait4(r2, &(0x7f00000005c0), 0x8, &(0x7f0000000600)) r3 = pidfd_open(r1, 0x0) process_mrelease(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x35, 0x0, "0e10f22863d7e5d2dd29ec07e4c76a5d83e613c06d87f00b0c9c371e12f253a147bef404b4c19c8a87f51603353fef74bfec73e0ad8b16376c3eb788f90fb2f2c83c32aedc41621da8d377fb129a0a84"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0), 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000800), 0x4) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000840)=@ccm_128={{0x304}, "4afcc0165c43df32", "915e4392a40ff28a85e4440489dc81ab", "3fae7ea6", "346e52d6b99297b1"}, 0x28) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) sendmsg$AUDIT_USER(r5, &(0x7f0000000b00)={&(0x7f0000000980), 0xc, &(0x7f0000000ac0)={&(0x7f00000009c0)={0xf0, 0x3ed, 0xb06, 0x70bd29, 0x25dfdbfb, "71021228acc4a6312c70f9aa7b5fab3047fae0d835b8766876d82e2afdb2f803f989ed00861bea634dacc8c59ce1f39f5cf7e071fae59b6079363e0c2f896d35a31cfedf6704e5ee159e7cca1b2d4c6b4b3e04518ed367d547b46cc1c2327f661d5c4e75f51df702ce7f80bb07bdefe10301681f662b66174e2e82da4f68b2afb96a32611a78efd32d4e7063ff292001a8c8036ffb2f47cd055979d92e4bd55514a4d6824ad2b3460afdc0ccde24666f478ac6a11297a72dca92bd78dd481e49e7eddee3335bb507f55306b3354acd7fd306e2088f20fc5e6be55a79ef75", ["", "", "", ""]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x488c0) socketpair(0x26, 0x800, 0x9, &(0x7f0000000b80)) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000c00), 0xffffffffffffffff) 23:12:53 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1541, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1ff}, @ETHTOOL_A_RINGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x29b2372c87e9e30a}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0xd44}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x1000}]}, 0x124}, 0x1, 0x0, 0x0, 0x600c0}, 0x20040001) syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x800) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14) pipe2(&(0x7f0000000b00), 0x80000) [ 154.125194] loop6: detected capacity change from 0 to 264192 [ 154.128849] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 VM DIAGNOSIS: 23:12:44 Registers: info registers vcpu 0 RAX=0000000000000001 RBX=0000000000000001 RCX=ffffffff84d1a2ce RDX=fffffbfff0b82d11 RSI=0000000000000004 RDI=ffffffff85c16880 RBP=ffffffff85c16880 RSP=ffff88801acf7b40 R8 =0000000000000000 R9 =fffffbfff0b82d10 R10=ffffffff85c16883 R11=0000000000000000 R12=1ffff1100359ef69 R13=0000000000000003 R14=fffffbfff0b82d10 R15=ffff88801acf7b78 RIP=ffffffff84d1a460 RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 000055558100f400 00000000 00000000 GS =0000 ffff8880e5342000 00000000 00000000 LDT=0000 fffffe6d00000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555581018c58 CR3=000000001e2c5000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000a60ce07b00000000cec3662e XMM01=000000000000000003515b82db34ca11 XMM02=0000000000000000333bebdfd0a6a21d XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000078 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff82975135 RDI=ffffffff889c19e0 RBP=ffffffff889c19a0 RSP=ffff888040667488 R8 =0000000000000000 R9 =ffffed1001d2b046 R10=0000000000000078 R11=666666203a322320 R12=0000000000000078 R13=0000000000000010 R14=ffffffff889c19a0 R15=ffffffff82975120 RIP=ffffffff8297518d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555573843400 00000000 00000000 GS =0000 ffff8880e5442000 00000000 00000000 LDT=0000 fffffe7400000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555573843708 CR3=000000001e17f000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000a60ce07b00000000cec3662e XMM01=000000000000000003515b82db34ca11 XMM02=0000000000000000333bebdfd0a6a21d XMM03=00000000000000000000000000000000 XMM04=000000ff0000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000