Warning: Permanently added '10.128.0.176' (ECDSA) to the list of known hosts. 2022/05/08 17:52:11 fuzzer started 2022/05/08 17:52:12 dialing manager at 10.128.0.163:32823 [ 20.965383][ T24] audit: type=1400 audit(1652032332.766:74): avc: denied { mounton } for pid=1807 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.966266][ T1807] cgroup: Unknown subsys name 'net' [ 20.988132][ T24] audit: type=1400 audit(1652032332.766:75): avc: denied { mount } for pid=1807 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.015396][ T24] audit: type=1400 audit(1652032332.796:76): avc: denied { unmount } for pid=1807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.117221][ T1807] cgroup: Unknown subsys name 'rlimit' [ 21.266594][ T24] audit: type=1400 audit(1652032333.076:77): avc: denied { mounton } for pid=1807 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.292654][ T24] audit: type=1400 audit(1652032333.096:78): avc: denied { mount } for pid=1807 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2022/05/08 17:52:13 syscalls: 2727 2022/05/08 17:52:13 code coverage: enabled 2022/05/08 17:52:13 comparison tracing: enabled 2022/05/08 17:52:13 extra coverage: enabled 2022/05/08 17:52:13 delay kcov mmap: enabled 2022/05/08 17:52:13 setuid sandbox: enabled 2022/05/08 17:52:13 namespace sandbox: enabled 2022/05/08 17:52:13 Android sandbox: enabled 2022/05/08 17:52:13 fault injection: enabled 2022/05/08 17:52:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/05/08 17:52:13 net packet injection: enabled 2022/05/08 17:52:13 net device setup: enabled 2022/05/08 17:52:13 concurrency sanitizer: enabled 2022/05/08 17:52:13 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/05/08 17:52:13 USB emulation: /dev/raw-gadget does not exist 2022/05/08 17:52:13 hci packet injection: /dev/vhci does not exist 2022/05/08 17:52:13 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2022/05/08 17:52:13 802.15.4 emulation: enabled [ 21.298961][ T1807] syz-executor (1807) used greatest stack depth: 11504 bytes left [ 21.315852][ T24] audit: type=1400 audit(1652032333.096:79): avc: denied { create } for pid=1807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.315870][ T24] audit: type=1400 audit(1652032333.096:80): avc: denied { write } for pid=1807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.364346][ T24] audit: type=1400 audit(1652032333.096:81): avc: denied { read } for pid=1807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2022/05/08 17:52:13 suppressing KCSAN reports in functions: 'exit_mm' 'prandom_seed' 'dd_has_work' 'do_select' 'ext4_free_inodes_count' 'filemap_read' 'insert_work' 'ext4_writepages' 2022/05/08 17:52:13 fetching corpus: 0, signal 0/2000 (executing program) 2022/05/08 17:52:13 fetching corpus: 50, signal 14550/17891 (executing program) 2022/05/08 17:52:13 fetching corpus: 100, signal 30261/34217 (executing program) 2022/05/08 17:52:14 fetching corpus: 147, signal 36287/41061 (executing program) 2022/05/08 17:52:14 fetching corpus: 196, signal 40218/45687 (executing program) 2022/05/08 17:52:14 fetching corpus: 245, signal 43195/49351 (executing program) 2022/05/08 17:52:14 fetching corpus: 294, signal 48207/54554 (executing program) 2022/05/08 17:52:14 fetching corpus: 338, signal 51164/57826 (executing program) 2022/05/08 17:52:14 fetching corpus: 388, signal 54912/61606 (executing program) 2022/05/08 17:52:14 fetching corpus: 438, signal 57458/64354 (executing program) 2022/05/08 17:52:15 fetching corpus: 486, signal 60379/67296 (executing program) 2022/05/08 17:52:15 fetching corpus: 535, signal 61913/69040 (executing program) 2022/05/08 17:52:15 fetching corpus: 583, signal 63913/71064 (executing program) 2022/05/08 17:52:15 fetching corpus: 632, signal 65807/72878 (executing program) 2022/05/08 17:52:15 fetching corpus: 679, signal 67414/74500 (executing program) 2022/05/08 17:52:15 fetching corpus: 726, signal 69882/76564 (executing program) 2022/05/08 17:52:15 fetching corpus: 774, signal 71587/78062 (executing program) 2022/05/08 17:52:15 fetching corpus: 822, signal 73140/79345 (executing program) 2022/05/08 17:52:16 fetching corpus: 872, signal 74788/80624 (executing program) 2022/05/08 17:52:16 fetching corpus: 921, signal 77453/82398 (executing program) 2022/05/08 17:52:16 fetching corpus: 970, signal 79228/83602 (executing program) 2022/05/08 17:52:16 fetching corpus: 1018, signal 81204/84805 (executing program) 2022/05/08 17:52:16 fetching corpus: 1068, signal 82952/85805 (executing program) 2022/05/08 17:52:16 fetching corpus: 1118, signal 83942/86374 (executing program) 2022/05/08 17:52:17 fetching corpus: 1168, signal 85302/87076 (executing program) 2022/05/08 17:52:17 fetching corpus: 1186, signal 85760/87404 (executing program) 2022/05/08 17:52:17 fetching corpus: 1186, signal 85767/87474 (executing program) 2022/05/08 17:52:17 fetching corpus: 1186, signal 85767/87533 (executing program) 2022/05/08 17:52:17 fetching corpus: 1186, signal 85767/87580 (executing program) 2022/05/08 17:52:17 fetching corpus: 1187, signal 85769/87642 (executing program) 2022/05/08 17:52:17 fetching corpus: 1187, signal 85769/87702 (executing program) 2022/05/08 17:52:17 fetching corpus: 1187, signal 85769/87767 (executing program) 2022/05/08 17:52:17 fetching corpus: 1187, signal 85769/87853 (executing program) 2022/05/08 17:52:17 fetching corpus: 1187, signal 85769/87915 (executing program) 2022/05/08 17:52:17 fetching corpus: 1187, signal 85778/87989 (executing program) 2022/05/08 17:52:17 fetching corpus: 1187, signal 85778/88044 (executing program) 2022/05/08 17:52:17 fetching corpus: 1187, signal 85778/88116 (executing program) 2022/05/08 17:52:17 fetching corpus: 1187, signal 85778/88171 (executing program) 2022/05/08 17:52:17 fetching corpus: 1188, signal 85790/88236 (executing program) 2022/05/08 17:52:17 fetching corpus: 1188, signal 85790/88291 (executing program) 2022/05/08 17:52:17 fetching corpus: 1188, signal 85790/88351 (executing program) 2022/05/08 17:52:17 fetching corpus: 1188, signal 85790/88421 (executing program) 2022/05/08 17:52:17 fetching corpus: 1188, signal 85790/88484 (executing program) 2022/05/08 17:52:17 fetching corpus: 1188, signal 85790/88567 (executing program) 2022/05/08 17:52:17 fetching corpus: 1189, signal 85804/88588 (executing program) 2022/05/08 17:52:17 fetching corpus: 1189, signal 85805/88588 (executing program) 2022/05/08 17:52:17 fetching corpus: 1189, signal 85805/88588 (executing program) 2022/05/08 17:52:18 starting 6 fuzzer processes 17:52:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)=@allocspi={0x100, 0x16, 0x1, 0x0, 0x0, {{{@in=@multicast2, @in=@broadcast}, {@in, 0x0, 0x6c}, @in6=@mcast1}, 0x0, 0xfff}, [@tfcpad={0x8}]}, 0x100}}, 0x0) 17:52:18 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) set_mempolicy(0x1, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x4}]}, 0x28}}, 0x0) 17:52:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000940)='./file0\x00', 0x100000000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000340)="eb3c906d8d6673fdd2617400028001000240fd0204f801", 0x17}], 0x0, &(0x7f0000000180)={[], [], 0x2c}) 17:52:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x1d, 0x0, 0x1}, {0x20}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 26.996100][ T24] audit: type=1400 audit(1652032338.796:82): avc: denied { execmem } for pid=1813 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 17:52:18 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x208000, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendfile(r0, r1, 0x0, 0x0) 17:52:18 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x2, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x8d}, @exit], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xda, &(0x7f0000000240)=""/218, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 27.037517][ T24] audit: type=1400 audit(1652032338.846:83): avc: denied { read } for pid=1816 comm="syz-executor.5" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 27.132447][ T24] audit: type=1400 audit(1652032338.866:84): avc: denied { open } for pid=1816 comm="syz-executor.5" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 27.155884][ T24] audit: type=1400 audit(1652032338.866:85): avc: denied { mounton } for pid=1816 comm="syz-executor.5" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 27.177353][ T24] audit: type=1400 audit(1652032338.866:86): avc: denied { module_request } for pid=1816 comm="syz-executor.5" kmod="netdev-nr5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 27.201293][ T24] audit: type=1400 audit(1652032338.966:87): avc: denied { sys_module } for pid=1823 comm="syz-executor.2" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 27.471529][ T1823] chnl_net:caif_netlink_parms(): no params data found [ 27.497831][ T1816] chnl_net:caif_netlink_parms(): no params data found [ 27.516576][ T1820] chnl_net:caif_netlink_parms(): no params data found [ 27.581948][ T1822] chnl_net:caif_netlink_parms(): no params data found [ 27.640517][ T1816] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.647598][ T1816] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.655265][ T1816] device bridge_slave_0 entered promiscuous mode [ 27.662105][ T1827] chnl_net:caif_netlink_parms(): no params data found [ 27.683284][ T1823] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.690326][ T1823] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.697951][ T1823] device bridge_slave_0 entered promiscuous mode [ 27.704695][ T1816] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.711835][ T1816] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.719419][ T1816] device bridge_slave_1 entered promiscuous mode [ 27.733389][ T1820] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.740447][ T1820] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.748115][ T1820] device bridge_slave_0 entered promiscuous mode [ 27.758962][ T1823] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.766014][ T1823] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.773409][ T1823] device bridge_slave_1 entered promiscuous mode [ 27.794260][ T1820] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.801292][ T1820] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.808683][ T1820] device bridge_slave_1 entered promiscuous mode [ 27.823737][ T1816] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.847802][ T1823] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.857618][ T1816] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.872158][ T1848] chnl_net:caif_netlink_parms(): no params data found [ 27.884692][ T1820] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.893762][ T1822] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.900799][ T1822] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.908191][ T1822] device bridge_slave_0 entered promiscuous mode [ 27.915137][ T1822] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.922239][ T1822] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.929647][ T1822] device bridge_slave_1 entered promiscuous mode [ 27.937151][ T1823] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.961025][ T1820] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.003400][ T1820] team0: Port device team_slave_0 added [ 28.010105][ T1822] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.019718][ T1823] team0: Port device team_slave_0 added [ 28.026025][ T1823] team0: Port device team_slave_1 added [ 28.032060][ T1816] team0: Port device team_slave_0 added [ 28.037742][ T1827] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.044795][ T1827] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.052224][ T1827] device bridge_slave_0 entered promiscuous mode [ 28.059133][ T1827] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.066253][ T1827] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.073608][ T1827] device bridge_slave_1 entered promiscuous mode [ 28.080574][ T1820] team0: Port device team_slave_1 added [ 28.091394][ T1822] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.104481][ T1816] team0: Port device team_slave_1 added [ 28.134777][ T1827] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.146601][ T1827] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.155829][ T1820] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.162796][ T1820] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.188797][ T1820] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.203456][ T1823] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.210405][ T1823] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.236297][ T1823] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.251046][ T1816] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.258010][ T1816] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.283902][ T1816] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.300377][ T1820] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.307393][ T1820] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.333364][ T1820] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.344484][ T1822] team0: Port device team_slave_0 added [ 28.350274][ T1823] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.357261][ T1823] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.383133][ T1823] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.393993][ T1816] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.400939][ T1816] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.426811][ T1816] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.446044][ T1822] team0: Port device team_slave_1 added [ 28.466012][ T1827] team0: Port device team_slave_0 added [ 28.485070][ T1822] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.492018][ T1822] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.517872][ T1822] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.528931][ T1848] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.535986][ T1848] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.543364][ T1848] device bridge_slave_0 entered promiscuous mode [ 28.550615][ T1827] team0: Port device team_slave_1 added [ 28.574265][ T1822] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.581211][ T1822] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.607157][ T1822] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.617841][ T1848] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.624909][ T1848] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.632525][ T1848] device bridge_slave_1 entered promiscuous mode [ 28.643860][ T1820] device hsr_slave_0 entered promiscuous mode [ 28.650501][ T1820] device hsr_slave_1 entered promiscuous mode [ 28.658665][ T1823] device hsr_slave_0 entered promiscuous mode [ 28.665203][ T1823] device hsr_slave_1 entered promiscuous mode [ 28.672320][ T1823] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.679911][ T1823] Cannot create hsr debugfs directory [ 28.687108][ T1816] device hsr_slave_0 entered promiscuous mode [ 28.693522][ T1816] device hsr_slave_1 entered promiscuous mode [ 28.699930][ T1816] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.707481][ T1816] Cannot create hsr debugfs directory [ 28.733806][ T1827] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.740793][ T1827] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.766739][ T1827] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.780299][ T1848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.795419][ T1827] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.802402][ T1827] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.828281][ T1827] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.839813][ T1848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.851140][ T1822] device hsr_slave_0 entered promiscuous mode [ 28.857618][ T1822] device hsr_slave_1 entered promiscuous mode [ 28.863993][ T1822] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.871558][ T1822] Cannot create hsr debugfs directory [ 28.902733][ T1848] team0: Port device team_slave_0 added [ 28.915551][ T1827] device hsr_slave_0 entered promiscuous mode [ 28.921950][ T1827] device hsr_slave_1 entered promiscuous mode [ 28.928267][ T1827] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.935785][ T1827] Cannot create hsr debugfs directory [ 28.948830][ T1848] team0: Port device team_slave_1 added [ 28.972794][ T1848] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.979741][ T1848] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.005683][ T1848] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.017540][ T1848] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.024499][ T1848] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.050375][ T1848] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.102722][ T1848] device hsr_slave_0 entered promiscuous mode [ 29.109085][ T1848] device hsr_slave_1 entered promiscuous mode [ 29.115405][ T1848] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.122946][ T1848] Cannot create hsr debugfs directory [ 29.169845][ T1816] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 29.180604][ T1816] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 29.190993][ T1816] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 29.200884][ T1816] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 29.209937][ T1820] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.218277][ T1820] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.227423][ T1820] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.241511][ T1820] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.261033][ T1823] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.280862][ T1823] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.289309][ T1823] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.307001][ T1823] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.326035][ T1822] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.334205][ T1822] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.342736][ T1822] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.363773][ T1822] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.386867][ T1816] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.394587][ T1827] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.417074][ T1827] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.429463][ T1827] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.444038][ T1816] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.452973][ T1820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.456451][ T24] audit: type=1400 audit(1652032341.266:88): avc: denied { remove_name } for pid=1423 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 29.463379][ T1820] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.481980][ T24] audit: type=1400 audit(1652032341.266:89): avc: denied { rename } for pid=1423 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 29.499558][ T1820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 29.523139][ T1848] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.532124][ T1827] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.541833][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.551175][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.561453][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.569033][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.576623][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.584152][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.591742][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.600167][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.608696][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.615844][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.623489][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.631931][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.640249][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.647293][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.655211][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 29.663666][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 29.672470][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 29.680744][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 29.689363][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 29.697749][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 29.716192][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.724051][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 29.732106][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.740622][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.749072][ T1910] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.756246][ T1910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.764095][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.772498][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.780720][ T1910] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.787828][ T1910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.795518][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 29.804048][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 29.813080][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.821047][ T1848] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.846347][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 29.854608][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 29.863278][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 29.871733][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 29.880324][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 29.887756][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 29.896507][ T1848] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.904845][ T1848] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.918750][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 29.926677][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.934832][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.949489][ T1823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.960712][ T1820] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.972041][ T1816] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.982815][ T1816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 29.996112][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.004221][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.025780][ T1822] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.037830][ T1823] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.045526][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.053431][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.067252][ T1816] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.078182][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 30.085646][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 30.100147][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.108627][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.117012][ T1915] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.124019][ T1915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.132754][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.147955][ T1822] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.169073][ T1827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.177101][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.185667][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.195034][ T1910] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.202066][ T1910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.209829][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.217393][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.231548][ T1848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.244722][ T1827] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.255005][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.263932][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.272385][ T1918] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.279433][ T1918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.287339][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.295684][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.304108][ T1918] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.311201][ T1918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.318749][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 30.327525][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 30.336058][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 30.344635][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 30.353028][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 30.361526][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.369101][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.376828][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 30.385140][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 30.393626][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 30.402216][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.410714][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.419398][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.427246][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 30.439880][ T1848] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.455953][ T1823] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.466335][ T1823] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.479898][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.488322][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.496916][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.504420][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.512101][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.520362][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.528655][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.537178][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.545374][ T1918] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.552426][ T1918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.560174][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 30.568717][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 30.577066][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.585422][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.593749][ T1918] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.600776][ T1918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.608601][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 30.616973][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 30.625634][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.634205][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.642395][ T1918] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.649435][ T1918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.657210][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 30.665754][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 30.681224][ T1822] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.691679][ T1822] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.711528][ T1823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.721738][ T1827] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.732134][ T1827] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.743531][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 30.751089][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.758868][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 30.766818][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.774483][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 30.782764][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 30.791168][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.799825][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.808276][ T1918] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.815294][ T1918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.823013][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 30.831502][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 30.840157][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 30.848963][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.857286][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.865498][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.873739][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.881795][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 30.889254][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 30.896664][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.904972][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.913205][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.921406][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.942442][ T1820] device veth0_vlan entered promiscuous mode [ 30.948876][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 30.956817][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 30.964421][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 30.971946][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 30.980480][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 30.988911][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 30.997824][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 31.006146][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 31.014653][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.022931][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.031015][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.039167][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.049006][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 31.056991][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.064634][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.076222][ T1848] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.087037][ T1848] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 31.096805][ T1820] device veth1_vlan entered promiscuous mode [ 31.108888][ T1927] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 31.117103][ T1927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.125326][ T1927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.133573][ T1927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 31.141766][ T1927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 31.154869][ T1848] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.162127][ T1927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 31.169643][ T1927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 31.179475][ T1822] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.190862][ T1827] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.211945][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 31.220234][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 31.243098][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 31.250496][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.258934][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.267342][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.275639][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.291841][ T1820] device veth0_macvtap entered promiscuous mode [ 31.303661][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 31.311745][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.334643][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.349506][ T1820] device veth1_macvtap entered promiscuous mode [ 31.373307][ T1820] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.380632][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.390879][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.403244][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.423254][ T1820] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.432668][ T1816] device veth0_vlan entered promiscuous mode [ 31.440271][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.449245][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.458872][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.467420][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.476081][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.484144][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.493387][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.501033][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.508722][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.517247][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.527829][ T1820] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.536542][ T1820] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.545286][ T1820] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.553991][ T1820] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.571224][ T1816] device veth1_vlan entered promiscuous mode [ 31.588144][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 31.598139][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.606830][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.615231][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.623065][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.630835][ T1823] device veth0_vlan entered promiscuous mode [ 31.644068][ T1816] device veth0_macvtap entered promiscuous mode [ 31.658775][ T24] audit: type=1400 audit(1652032343.466:90): avc: denied { mounton } for pid=1820 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 31.660617][ T1823] device veth1_vlan entered promiscuous mode [ 31.692057][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 31.700243][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 31.708671][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.717555][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.726403][ T1816] device veth1_macvtap entered promiscuous mode [ 31.744299][ T1848] device veth0_vlan entered promiscuous mode [ 31.751665][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 17:52:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) set_mempolicy(0x1, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x4}]}, 0x28}}, 0x0) [ 31.761588][ T24] audit: type=1400 audit(1652032343.566:91): avc: denied { read write } for pid=1820 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 31.762159][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 31.796084][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.804194][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.813232][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 17:52:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) set_mempolicy(0x1, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x4}]}, 0x28}}, 0x0) 17:52:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) set_mempolicy(0x1, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x4}]}, 0x28}}, 0x0) 17:52:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) set_mempolicy(0x1, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x4}]}, 0x28}}, 0x0) [ 31.821703][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.830608][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.839251][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.847717][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.858284][ T1822] device veth0_vlan entered promiscuous mode 17:52:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) set_mempolicy(0x1, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x4}]}, 0x28}}, 0x0) 17:52:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) set_mempolicy(0x1, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x4}]}, 0x28}}, 0x0) [ 31.871875][ T1816] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 31.882420][ T1816] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.896005][ T1816] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.909165][ T1848] device veth1_vlan entered promiscuous mode [ 31.922508][ T1822] device veth1_vlan entered promiscuous mode [ 31.930319][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.938271][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.946133][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.953756][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.961369][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.969880][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.978722][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.987050][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.996311][ T1816] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.006746][ T1816] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.017992][ T1816] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.026741][ T1823] device veth0_macvtap entered promiscuous mode [ 32.041073][ T1822] device veth0_macvtap entered promiscuous mode [ 32.048416][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 32.057511][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.066267][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.075092][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.083804][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.094774][ T1816] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.103496][ T1816] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.112209][ T1816] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.120919][ T1816] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.131691][ T1823] device veth1_macvtap entered promiscuous mode [ 32.141470][ T1822] device veth1_macvtap entered promiscuous mode [ 32.153306][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.161449][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 32.169788][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.177665][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.186309][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.206396][ T1848] device veth0_macvtap entered promiscuous mode [ 32.219030][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 32.227012][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.235093][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.244172][ T1823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.254682][ T1823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.264547][ T1823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.274990][ T1823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.286949][ T1823] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.294816][ T1827] device veth0_vlan entered promiscuous mode [ 32.309230][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.317065][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.324805][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.333638][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.342775][ T1823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.353192][ T1823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.362981][ T1823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.373599][ T1823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.384618][ T1823] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.394753][ T1822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.405184][ T1822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.415061][ T1822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.425491][ T1822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.435309][ T1822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.445752][ T1822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.456829][ T1822] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.468247][ T1822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.478749][ T1822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.488570][ T1822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.499030][ T1822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.508824][ T1822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.519274][ T1822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.530128][ T1822] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.542437][ T1848] device veth1_macvtap entered promiscuous mode [ 32.553169][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.557970][ T24] kauditd_printk_skb: 2 callbacks suppressed 17:52:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)=@allocspi={0x100, 0x16, 0x1, 0x0, 0x0, {{{@in=@multicast2, @in=@broadcast}, {@in, 0x0, 0x6c}, @in6=@mcast1}, 0x0, 0xfff}, [@tfcpad={0x8}]}, 0x100}}, 0x0) 17:52:24 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() r1 = gettid() tkill(r1, 0x30) tkill(r0, 0x12) r2 = gettid() tkill(r2, 0x15) [ 32.557981][ T24] audit: type=1400 audit(1652032344.356:94): avc: denied { create } for pid=2018 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 32.561251][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.566564][ T24] audit: type=1400 audit(1652032344.356:95): avc: denied { write } for pid=2018 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 32.566623][ T24] audit: type=1400 audit(1652032344.356:96): avc: denied { nlmsg_write } for pid=2018 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 32.588187][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.644667][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.653319][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.662058][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.670668][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.682082][ T1823] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.690811][ T1823] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.699530][ T1823] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.708228][ T1823] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.720265][ T1822] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.728988][ T1822] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.737770][ T1822] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.746468][ T1822] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.762053][ T1827] device veth1_vlan entered promiscuous mode [ 32.775362][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 32.785568][ T1848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.796055][ T1848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.805948][ T1848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.816381][ T1848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.826178][ T1848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.836586][ T1848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.846456][ T1848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.856918][ T1848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.868297][ T1848] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.879773][ T1848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.890257][ T1848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.900059][ T1848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.910460][ T1848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.920302][ T1848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.930706][ T1848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.940516][ T1848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.950925][ T1848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.961977][ T1848] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.973013][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.981576][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.990284][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.998794][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.017894][ T1848] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.026682][ T1848] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.035359][ T1848] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.044110][ T1848] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.075397][ T1827] device veth0_macvtap entered promiscuous mode [ 33.086016][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 33.094831][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.105088][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 33.124473][ T1827] device veth1_macvtap entered promiscuous mode [ 33.139297][ T2029] loop1: detected capacity change from 0 to 264192 [ 33.160787][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.171254][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.181128][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.191747][ T24] audit: type=1400 audit(1652032344.966:97): avc: denied { mounton } for pid=2028 comm="syz-executor.1" path="/root/syzkaller-testdir2770523994/syzkaller.QEFxAm/0/file0" dev="sda1" ino=1159 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 33.193109][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.193118][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.193130][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.249871][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.261770][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.271582][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 33.282024][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.296457][ T1827] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.305994][ T1927] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 33.314065][ T1927] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.324779][ T1927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.325108][ T24] audit: type=1400 audit(1652032345.136:98): avc: denied { create } for pid=2031 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 33.357038][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.359609][ T24] audit: type=1400 audit(1652032345.166:99): avc: denied { read } for pid=2031 comm="syz-executor.3" path="socket:[16381]" dev="sockfs" ino=16381 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 33.367664][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.400701][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.411325][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.421124][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.431584][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.441506][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.451916][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.461724][ T1827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 33.472138][ T1827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.485086][ T1827] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.495940][ T1927] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.504797][ T1927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.518934][ T1827] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.527852][ T1827] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.536618][ T1827] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.545400][ T1827] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 17:52:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000940)='./file0\x00', 0x100000000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000340)="eb3c906d8d6673fdd2617400028001000240fd0204f801", 0x17}], 0x0, &(0x7f0000000180)={[], [], 0x2c}) 17:52:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)=@allocspi={0x100, 0x16, 0x1, 0x0, 0x0, {{{@in=@multicast2, @in=@broadcast}, {@in, 0x0, 0x6c}, @in6=@mcast1}, 0x0, 0xfff}, [@tfcpad={0x8}]}, 0x100}}, 0x0) 17:52:25 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() r1 = gettid() tkill(r1, 0x30) tkill(r0, 0x12) r2 = gettid() tkill(r2, 0x15) 17:52:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x1d, 0x0, 0x1}, {0x20}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:52:25 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x208000, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendfile(r0, r1, 0x0, 0x0) 17:52:25 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x2, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x8d}, @exit], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xda, &(0x7f0000000240)=""/218, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:25 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() r1 = gettid() tkill(r1, 0x30) tkill(r0, 0x12) r2 = gettid() tkill(r2, 0x15) 17:52:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x1d, 0x0, 0x1}, {0x20}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:52:25 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x2, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x8d}, @exit], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xda, &(0x7f0000000240)=""/218, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)=@allocspi={0x100, 0x16, 0x1, 0x0, 0x0, {{{@in=@multicast2, @in=@broadcast}, {@in, 0x0, 0x6c}, @in6=@mcast1}, 0x0, 0xfff}, [@tfcpad={0x8}]}, 0x100}}, 0x0) [ 33.589546][ T24] audit: type=1400 audit(1652032345.396:100): avc: denied { mount } for pid=2028 comm="syz-executor.1" name="/" dev="loop1" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 17:52:25 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x208000, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendfile(r0, r1, 0x0, 0x0) 17:52:25 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() r1 = gettid() tkill(r1, 0x30) tkill(r0, 0x12) r2 = gettid() tkill(r2, 0x15) [ 33.701036][ T24] audit: type=1400 audit(1652032345.396:101): avc: denied { prog_load } for pid=2034 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 33.720395][ T24] audit: type=1400 audit(1652032345.396:102): avc: denied { bpf } for pid=2034 comm="syz-executor.4" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 33.741242][ T24] audit: type=1400 audit(1652032345.396:103): avc: denied { perfmon } for pid=2034 comm="syz-executor.4" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 33.748180][ T2059] loop1: detected capacity change from 0 to 264192 17:52:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000940)='./file0\x00', 0x100000000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000340)="eb3c906d8d6673fdd2617400028001000240fd0204f801", 0x17}], 0x0, &(0x7f0000000180)={[], [], 0x2c}) 17:52:25 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x208000, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendfile(r0, r1, 0x0, 0x0) 17:52:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x1d, 0x0, 0x1}, {0x20}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:52:25 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() r1 = gettid() tkill(r1, 0x30) tkill(r0, 0x12) r2 = gettid() tkill(r2, 0x15) 17:52:25 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x2, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x8d}, @exit], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xda, &(0x7f0000000240)=""/218, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:25 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() r1 = gettid() tkill(r1, 0x30) tkill(r0, 0x12) r2 = gettid() tkill(r2, 0x15) 17:52:25 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:25 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x3d, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa84b}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 17:52:25 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() r1 = gettid() tkill(r1, 0x30) tkill(r0, 0x12) r2 = gettid() tkill(r2, 0x15) 17:52:25 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x4008804) sendmsg(r0, &(0x7f0000000080)={0x0, 0x3a, &(0x7f0000000100)=[{&(0x7f0000000000)="2c0200010300072a", 0x584}], 0x1}, 0x3b000000) 17:52:25 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() r1 = gettid() tkill(r1, 0x30) tkill(r0, 0x12) r2 = gettid() tkill(r2, 0x15) 17:52:25 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() r1 = gettid() tkill(r1, 0x30) tkill(r0, 0x12) r2 = gettid() tkill(r2, 0x15) [ 34.124265][ C0] hrtimer: interrupt took 27406 ns [ 34.132560][ T2082] loop1: detected capacity change from 0 to 264192 17:52:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000940)='./file0\x00', 0x100000000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000340)="eb3c906d8d6673fdd2617400028001000240fd0204f801", 0x17}], 0x0, &(0x7f0000000180)={[], [], 0x2c}) 17:52:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x4008804) sendmsg(r0, &(0x7f0000000080)={0x0, 0x3a, &(0x7f0000000100)=[{&(0x7f0000000000)="2c0200010300072a", 0x584}], 0x1}, 0x3b000000) 17:52:26 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() r1 = gettid() tkill(r1, 0x30) tkill(r0, 0x12) r2 = gettid() tkill(r2, 0x15) 17:52:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x4008804) sendmsg(r0, &(0x7f0000000080)={0x0, 0x3a, &(0x7f0000000100)=[{&(0x7f0000000000)="2c0200010300072a", 0x584}], 0x1}, 0x3b000000) 17:52:26 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:26 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x4008804) sendmsg(r0, &(0x7f0000000080)={0x0, 0x3a, &(0x7f0000000100)=[{&(0x7f0000000000)="2c0200010300072a", 0x584}], 0x1}, 0x3b000000) [ 34.522349][ T2098] loop1: detected capacity change from 0 to 264192 17:52:26 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x3d, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa84b}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 17:52:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x4008804) sendmsg(r0, &(0x7f0000000080)={0x0, 0x3a, &(0x7f0000000100)=[{&(0x7f0000000000)="2c0200010300072a", 0x584}], 0x1}, 0x3b000000) 17:52:26 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x4008804) sendmsg(r0, &(0x7f0000000080)={0x0, 0x3a, &(0x7f0000000100)=[{&(0x7f0000000000)="2c0200010300072a", 0x584}], 0x1}, 0x3b000000) 17:52:26 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:26 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:26 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x3d, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa84b}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 17:52:26 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x4008804) sendmsg(r0, &(0x7f0000000080)={0x0, 0x3a, &(0x7f0000000100)=[{&(0x7f0000000000)="2c0200010300072a", 0x584}], 0x1}, 0x3b000000) 17:52:26 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x3d, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa84b}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 17:52:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x3d, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa84b}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 17:52:27 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:27 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:27 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x3d, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa84b}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 17:52:27 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:27 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x3d, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa84b}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 17:52:27 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:27 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:27 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:27 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:28 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:28 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:28 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x3d, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa84b}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 17:52:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x3d, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa84b}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 17:52:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x3d, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa84b}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 17:52:28 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:28 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:28 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:28 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:28 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000005}, 0x18418, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f000006a300)={0x7f, [{0x0, r4}, {r3}, {0x0, r4}, {r3}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {}, {}, {r2}, {}, {r3, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {}, {}, {r2}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {r3}, {r3, r4}, {}, {}, {r3}, {r3, r4}, {r2}, {}, {}, {r2, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {r3}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2}, {r2}, {r3}, {}, {r2}, {r3, r4}, {0x0, r4}, {r3}, {r3}, {}, {r3}, {r2}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {r3}, {0x0, r4}, {}, {r3, r4}, {r2}, {}, {}, {r3, r4}, {r2, r4}, {r3, r4}, {r3, r4}, {}, {}, {r2}, {r2}, {r2}, {r2, r4}, {}, {}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {0x0, r4}, {}, {0x0, r4}, {r2}, {r3}, {r3}, {}, {}, {}, {}, {0x0, r4}, {r2}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3, r4}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {}, {r3}, {r3}, {}, {}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3}, {r2, r4}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {}, {r3, r4}, {0x0, r4}, {r3}, {r3, r4}, {r2}, {r3}, {}, {r2}, {}, {r2, r4}], 0x1f, "4062a0465f36de"}) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f0000002580)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0xc000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000840)={0x0, 0x7, 0x4, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)) kexec_load(0x341000, 0x1, &(0x7f00000003c0)=[{0x0, 0xd06800, 0x107a01000, 0x1000000}], 0x0) 17:52:28 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8930, &(0x7f0000000000)={@private2={0xfc, 0x3a}}) 17:52:28 executing program 4: unlinkat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x0) [ 36.979209][ T2185] SELinux: Context system_u:object_r:random_device_t:s0 is not valid (left unmapped). 17:52:28 executing program 4: unlinkat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x0) 17:52:28 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:29 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8930, &(0x7f0000000000)={@private2={0xfc, 0x3a}}) 17:52:29 executing program 4: unlinkat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x0) 17:52:29 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:29 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:29 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:29 executing program 4: unlinkat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x0) 17:52:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8930, &(0x7f0000000000)={@private2={0xfc, 0x3a}}) 17:52:29 executing program 4: unlinkat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x0) 17:52:30 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8930, &(0x7f0000000000)={@private2={0xfc, 0x3a}}) 17:52:30 executing program 4: unlinkat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x0) 17:52:30 executing program 4: unlinkat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x0) [ 38.751022][ T2203] sched: RT throttling activated 17:52:31 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:31 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:31 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:31 executing program 4: unlinkat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x0) 17:52:31 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:31 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x40d82) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000080)=[{0x26, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}], 0x1c) 17:52:31 executing program 4: unlinkat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x0) 17:52:31 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x40d82) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000080)=[{0x26, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}], 0x1c) 17:52:31 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x40d82) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000080)=[{0x26, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}], 0x1c) 17:52:31 executing program 4: unlinkat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x0) 17:52:31 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x40d82) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000080)=[{0x26, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}], 0x1c) 17:52:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff0f00600d698cb89e14f088a8", 0x0, 0x103, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 40.773147][ T24] kauditd_printk_skb: 15 callbacks suppressed [ 40.773170][ T24] audit: type=1400 audit(1652032352.576:119): avc: denied { prog_run } for pid=2261 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 40.798675][ T24] audit: type=1400 audit(1652032352.576:120): avc: denied { kernel } for pid=2261 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 17:52:33 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6c}]}, &(0x7f0000000780)='GPL\x00', 0x5, 0xd7, &(0x7f00000007c0)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff0f00600d698cb89e14f088a8", 0x0, 0x103, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 17:52:33 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:33 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x149a43, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) lseek(r0, 0x1000000000007fd, 0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r6, 0x100000001, 0x0, 0x2811fdff) ftruncate(r6, 0x400020000081c) lseek(r5, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10000) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x40) 17:52:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff0f00600d698cb89e14f088a8", 0x0, 0x103, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 17:52:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6c}]}, &(0x7f0000000780)='GPL\x00', 0x5, 0xd7, &(0x7f00000007c0)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6c}]}, &(0x7f0000000780)='GPL\x00', 0x5, 0xd7, &(0x7f00000007c0)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff0f00600d698cb89e14f088a8", 0x0, 0x103, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 17:52:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6c}]}, &(0x7f0000000780)='GPL\x00', 0x5, 0xd7, &(0x7f00000007c0)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7977f02008b5e5a076d83923dd29c034055c8dc3df0a426a16b351df71ae2ec0efd49897a74a0091ff110026e6d2efe31ab7e4a8a2d8a7c0636fca0c34f17c3e9c4d7bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2dcd38bdb27481399815ab3a14817ac65e4dd11183a13477bf7e060e3670ef0e789f65eb328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c24b751c51160fbcbbf35b1ed777148ba532e6ea09c346df08b32808b80600000000000000334d83239dd27080e711327ef01fb6c86afac12233faa13e9f3022d4a5bbfb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54fec374861d02300c192236e81a1f422f5ac5f17fde3767d2e24f29e5dad9796ec5697a6ea0181eabc18cae2ed4b4390af9a9ceafd07fd00b0000002cab151f00000000000000278087001460af81c5f4adaddd1410e80203c14140c427dc16e8b00d42e4e5e3ae703f8ea4c3dab45f912191f9df3d7c2af0ea4fdde831d062d3d6e1d09f0479c9fb55010840331c9825f9386cb5c8f7e49348d27d915b8e9349b17f7aab0d75690d78d5f14805e127ca2aa3beea073a77127fbe389324001aaae7efad93aa48d33a01e41fb317227369a10fd7bfa641635e8077e71db29939e4e84aa17ae2f75f4c49b552748a00000000e18449a2dbf3c778e86cc74307267206abb801426cf0e1461f3d79b87c3ac7749e3179d88a089cddf2155073000000000000003dd380a1af2486d6ccf4918a47312c806d0223f4586f29b0d012620a7f847daa3a0eebea812c70a0a1111a62ef04723649a40e134a70c0733643e4a6632d60e42bae1b3512ac48c8479966ca333a3f20b68d848458f8fe20a6f3472fa4fa9f0569c0ec8395f95187e72a9e700352a3d480ffef3eb5beb7aec0b09f45b2f0ac6b494a822edc6ee996b7f695aa0922004bbc865214a36921408d6b3f6d000aa7aa5729ac9098e28d733b9300000000000000000000000000000000000000000069225649aa49c84ae8a08d60399210f31d2acd89573273d32b33d7e60f4d7b9e874e5c19c44ac9b354dbc0f3fee1d4125624a348b2ccdf6f81b94ba31a03f10983c857faa5c585ce80a9ed52f8658ee7ab809cd7722f7787fd460d28333b895f113eec4ef84fad96b80744c2b8dc29f9bb886e62b05ef0983f6a2f6b6b4ee522e1ad40fee82e9b7b4a1358c768bd21d991df6612f31b17829097dad5287224e18f54dea8f64913502104000000f94f02d36c17f4b83b5b71bc70000000a644310b74ec472efcafb5e4e994a454534d5498c1603abbca2227a000b8ceb249121c0a7e285732ed1d416a6deb7938419ab6d9c2a5cba3f8e277c548ab833f07d3e2c633d1a232fb31d117c3cc5d4fa7bb28007ce31c3d5fa7b9337f89734dd43591e98a5d43f3dd759cabfdb88ef3f44bc6eddc1e9f9e36763b05a64d0c62e8580e2676e05257e25c20f6571013bd6ff5287858b36af3f62ff63002fb70f4a58cf7e683589835c0dc813be4b27460ca38099fc037d7e0870574d67c054adcec23374e8b34c1077a0997c8e609f7700a3d701c708244a8a8d36fcd23e336bc188129230700000000000008f1aba4ad9c4e30ec6650ceef6b744b339ec2ee1ffb684c98ffb2b679d28ce085b1faf76ce996bf31a754e7136a3598956c5a8b53a35ecdbb7740cfbbf4ede18e224043b5e8305637277990931177f0e36b6de4efce32d7154f160e3818cbf72b17ccbbe1bef21941e93c67847d2e4c0fffba9fec1db8ed968e0ae952ed29cda3908252bcbb8b839a433c51c0172ce7df3a4fd6726f091c31b8a24652e1b6754d524ca09b8514759c1e53d5f73c69513b4ab79ef805dd017713d9fd6172c164cf08d65599003bd2f163e1c91941193cae8aec3f7bd3232b81e42c715ed30f299319cef10148afe92d92340c38eb6ba7000000bc850146fba81da014aa7892ab215c16a52ab21ffeea9163fb1fd195015b3122aedc0000000000000000007c6e37369c1b92b3ac059ad537d2938ce9cbeeb9bf0d85e50b9e274dbc0301af781ce65a7e443b7eeee8ba40c5d93c71e7bcbeea088fca224533635035e8ac9d7a7b6492d644ffba96698771132f125fabbd11e688efdff9d6635bff1255d9f4e4305cddceaa7ed7ff60c505c36e5e3bfdad405afe8896af86d91bfa582ec70a5cced679a7c495670aab42fe98ca83ccfe9a669ced1f77f0818ce89fc9ce17c4c64573544b8e5d0439f029b5949ad9882c45331dee7205f78f3b6ee2e0f159c4fe34c723d1be73ec84e762399db66b6e7d61f0ce0f613f6396e584072a6caafe534f231957492205caac54a866fde5a7e20ae65b245d990354fcc958c347cc3c99a11bcea0d3458306e77a98b5f905c0bf5fae6fdb39430604f62c080d686bcef1df3f41f8d3850cee9da82ca040752d819b4f9bfc2ab87a11737401bdc679c73e786a76026205c57a33407facda09df412c522e07f74cfba9c2fe856ec22e8dceaf658be7bb58c7ae45cf7ff6ff2dc1609559db61e800356da05779d3eecef617dcf919c2911dc50eaf9f62000000000000000000000000000000000000000000000000000000000000000000000000ced27636647174fd17f7f5150c760c78fc311659de1a9c09b2a072f134bc01c8df541e8586480d82957b3df758b88a13033bd31ec39d0a5e54bc57ae9aecfcadb084c1b1bb0baeaac3c1d80a15189dcf00480ce97e55b50ab184be07f8b6428613d1fdba355df67f34aa779e0388e5748f54dec2c4ff8abd229543604b51cb4179eefa98acdeaa15b7266a0b89b34556d300b2ca63dff32d3ac036a91b24e3dfb5b5d58f55d6863ef5243a97"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff0f00600d698cb89e14f088a8", 0x0, 0x103, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 17:52:33 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'vlan1\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="14030000542369d25e69be4be727c7a4552c8c349fee90"], 0xf9}], 0x1}, 0x0) [ 42.572543][ T24] audit: type=1400 audit(1652032354.376:121): avc: denied { create } for pid=2290 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.672779][ T24] audit: type=1400 audit(1652032354.406:122): avc: denied { bind } for pid=2290 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.692593][ T24] audit: type=1400 audit(1652032354.406:123): avc: denied { setopt } for pid=2290 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.712464][ T24] audit: type=1400 audit(1652032354.406:124): avc: denied { write } for pid=2290 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 17:52:34 executing program 3: r0 = socket(0x200000100000011, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'vlan1\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="14030000542369d25e69be4be727c7a4552c8c349fee90"], 0xf9}], 0x1}, 0x0) 17:52:34 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'vlan1\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="14030000542369d25e69be4be727c7a4552c8c349fee90"], 0xf9}], 0x1}, 0x0) 17:52:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff0f00600d698cb89e14f088a8", 0x0, 0x103, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 17:52:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff0f00600d698cb89e14f088a8", 0x0, 0x103, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 17:52:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x18, 0x0, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 17:52:34 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) getdents64(r0, &(0x7f0000000100)=""/176, 0xb0) 17:52:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x18, 0x0, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) [ 42.837833][ T2305] loop5: detected capacity change from 0 to 264192 [ 42.850139][ T24] audit: type=1400 audit(1652032354.656:125): avc: denied { create } for pid=2307 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 17:52:34 executing program 3: r0 = socket(0x200000100000011, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'vlan1\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="14030000542369d25e69be4be727c7a4552c8c349fee90"], 0xf9}], 0x1}, 0x0) 17:52:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x18, 0x0, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 17:52:34 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) getdents64(r0, &(0x7f0000000100)=""/176, 0xb0) [ 42.871036][ T24] audit: type=1400 audit(1652032354.656:126): avc: denied { write } for pid=2307 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 17:52:34 executing program 3: r0 = socket(0x200000100000011, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'vlan1\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="14030000542369d25e69be4be727c7a4552c8c349fee90"], 0xf9}], 0x1}, 0x0) 17:52:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x18, 0x0, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 17:52:34 executing program 3: io_setup(0x1, &(0x7f0000000000)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4, 0x0, r1, 0x0}]) [ 42.972823][ T8] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 42.986599][ T2324] loop5: detected capacity change from 0 to 264192 [ 43.055939][ T1820] syz-executor.0 (1820) used greatest stack depth: 10472 bytes left [ 43.070104][ T8] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.170674][ T8] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.220478][ T8] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.717572][ T8] device hsr_slave_0 left promiscuous mode [ 43.724237][ T8] device hsr_slave_1 left promiscuous mode [ 43.730516][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 43.737943][ T8] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 43.745532][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 43.752945][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 43.760939][ T8] device bridge_slave_1 left promiscuous mode [ 43.767105][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.777919][ T8] device bridge_slave_0 left promiscuous mode [ 43.784213][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.793917][ T8] device veth1_macvtap left promiscuous mode [ 43.799925][ T8] device veth0_macvtap left promiscuous mode [ 43.805955][ T8] device veth1_vlan left promiscuous mode [ 43.811689][ T8] device veth0_vlan left promiscuous mode [ 43.894993][ T8] team0 (unregistering): Port device team_slave_1 removed [ 43.907033][ T8] team0 (unregistering): Port device team_slave_0 removed [ 43.916901][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 43.928349][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 43.955425][ T8] bond0 (unregistering): Released all slaves [ 44.341894][ T8] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.406918][ T8] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.453008][ T8] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.466916][ T2456] chnl_net:caif_netlink_parms(): no params data found [ 44.516731][ T8] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.531950][ T2456] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.539031][ T2456] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.549649][ T2456] device bridge_slave_0 entered promiscuous mode [ 44.566145][ T2456] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.573186][ T2456] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.580865][ T2456] device bridge_slave_1 entered promiscuous mode [ 44.602845][ T2456] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.614512][ T2456] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 44.658136][ T2456] team0: Port device team_slave_0 added [ 44.664438][ T2456] team0: Port device team_slave_1 added [ 44.700589][ T2456] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 44.707544][ T2456] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.733517][ T2456] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.746953][ T2456] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 44.753876][ T2456] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.779752][ T2456] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 44.803878][ T2471] chnl_net:caif_netlink_parms(): no params data found [ 44.849466][ T2456] device hsr_slave_0 entered promiscuous mode [ 44.855905][ T2456] device hsr_slave_1 entered promiscuous mode [ 44.876596][ T8] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.908912][ T2471] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.915998][ T2471] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.924152][ T2471] device bridge_slave_0 entered promiscuous mode [ 44.933773][ T2471] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.940841][ T2471] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.948642][ T2471] device bridge_slave_1 entered promiscuous mode [ 44.958737][ T8] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.969641][ T2467] chnl_net:caif_netlink_parms(): no params data found [ 45.005219][ T2471] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.023827][ T8] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 45.042479][ T2471] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.080878][ T2471] team0: Port device team_slave_0 added [ 45.089451][ T8] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 45.112566][ T2471] team0: Port device team_slave_1 added [ 45.135061][ T2467] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.142144][ T2467] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.149958][ T2467] device bridge_slave_0 entered promiscuous mode [ 45.158459][ T2467] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.165553][ T2467] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.173242][ T2467] device bridge_slave_1 entered promiscuous mode [ 45.180114][ T2471] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.187148][ T2471] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.213130][ T2471] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.226102][ T2471] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.233025][ T2471] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.258984][ T2471] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.282255][ T2467] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.301046][ T2467] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.327791][ T2471] device hsr_slave_0 entered promiscuous mode [ 45.334140][ T2471] device hsr_slave_1 entered promiscuous mode [ 45.340795][ T2471] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 45.348347][ T2471] Cannot create hsr debugfs directory [ 45.362732][ T2467] team0: Port device team_slave_0 added [ 45.381672][ T2467] team0: Port device team_slave_1 added [ 45.417831][ T2467] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.424797][ T2467] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.450752][ T2467] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.476767][ T2456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 45.483933][ T2467] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.490902][ T2467] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.516849][ T2467] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.539968][ T2456] 8021q: adding VLAN 0 to HW filter on device team0 [ 45.576717][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.584250][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.612772][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.621254][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.629669][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.636705][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.644396][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.653106][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.661297][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.668367][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.676250][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 45.685179][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 45.694235][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 45.704020][ T2467] device hsr_slave_0 entered promiscuous mode [ 45.711497][ T2467] device hsr_slave_1 entered promiscuous mode [ 45.717861][ T2467] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 45.725378][ T2467] Cannot create hsr debugfs directory [ 45.737236][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 45.745676][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 45.754412][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 45.762721][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 45.788477][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 45.797053][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 45.805299][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.813813][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 45.822086][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.853842][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 45.875390][ T2471] 8021q: adding VLAN 0 to HW filter on device bond0 [ 45.897775][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 45.905199][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 45.917532][ T2456] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 45.928756][ T2471] 8021q: adding VLAN 0 to HW filter on device team0 [ 45.936124][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.943763][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.978469][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.987520][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.995883][ T1918] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.002921][ T1918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.011164][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.019846][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.028456][ T1918] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.035554][ T1918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.043455][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 46.052042][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 46.060919][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 46.069438][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 46.077972][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 46.086275][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 46.094672][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.118953][ T2471] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 46.131277][ T2471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 46.144162][ T2467] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.152066][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 46.162480][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 46.171474][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 46.179721][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.213172][ T2467] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.222911][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 46.230601][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 46.237996][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.245473][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.253190][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.261659][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.270094][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.277119][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.286699][ T2471] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.300949][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 46.328062][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.336912][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.345277][ T825] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.352404][ T825] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.360298][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 46.368906][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 46.377411][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 46.385735][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 46.394284][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 46.402604][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 46.411194][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 46.419427][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.427622][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.435766][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.444105][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 46.452832][ T2467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 46.462288][ T8] device hsr_slave_0 left promiscuous mode [ 46.468470][ T8] device hsr_slave_1 left promiscuous mode [ 46.474497][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 46.481972][ T8] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 46.489754][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 46.497182][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 46.505823][ T8] device bridge_slave_1 left promiscuous mode [ 46.512016][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.519718][ T8] device bridge_slave_0 left promiscuous mode [ 46.525976][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.535184][ T8] device hsr_slave_0 left promiscuous mode [ 46.541306][ T8] device hsr_slave_1 left promiscuous mode [ 46.547346][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 46.554772][ T8] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 46.562487][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 46.570003][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 46.577805][ T8] device bridge_slave_1 left promiscuous mode [ 46.583990][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.591518][ T8] device bridge_slave_0 left promiscuous mode [ 46.597704][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.608323][ T8] device veth1_macvtap left promiscuous mode [ 46.614283][ T8] device veth0_macvtap left promiscuous mode [ 46.620339][ T8] device veth1_vlan left promiscuous mode [ 46.626144][ T8] device veth0_vlan left promiscuous mode [ 46.632224][ T8] device veth1_macvtap left promiscuous mode [ 46.638282][ T8] device veth0_macvtap left promiscuous mode [ 46.644266][ T8] device veth1_vlan left promiscuous mode [ 46.650145][ T8] device veth0_vlan left promiscuous mode [ 46.783023][ T8] team0 (unregistering): Port device team_slave_1 removed [ 46.792850][ T8] team0 (unregistering): Port device team_slave_0 removed [ 46.803160][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 46.814428][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 46.842736][ T8] bond0 (unregistering): Released all slaves [ 46.923709][ T8] team0 (unregistering): Port device team_slave_1 removed [ 46.933611][ T8] team0 (unregistering): Port device team_slave_0 removed [ 46.942956][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 46.953987][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 46.981239][ T8] bond0 (unregistering): Released all slaves [ 47.066100][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 47.073582][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 47.093175][ T2467] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.103624][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 47.116178][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.189942][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.198473][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.209327][ T2456] device veth0_vlan entered promiscuous mode [ 47.216072][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.223865][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.237052][ T2456] device veth1_vlan entered promiscuous mode [ 47.259380][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.270651][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 47.278980][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.287423][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.296947][ T2456] device veth0_macvtap entered promiscuous mode [ 47.304630][ T2456] device veth1_macvtap entered promiscuous mode [ 47.320264][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 47.329077][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.338277][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 47.346691][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.355595][ T2456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.366083][ T2456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.375874][ T2456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.386276][ T2456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.396066][ T2456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.406475][ T2456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.419093][ T2456] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 47.430047][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.438971][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.448242][ T2456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 47.458757][ T2456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.468551][ T2456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 47.478956][ T2456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.488758][ T2456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 47.499156][ T2456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.509885][ T2456] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 47.522095][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 47.530860][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.543568][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 47.552234][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.572078][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.580439][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.593750][ T2471] device veth0_vlan entered promiscuous mode [ 47.601483][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.609508][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.622600][ T2471] device veth1_vlan entered promiscuous mode [ 47.646413][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.654399][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 47.668782][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.677295][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.694340][ T2467] device veth0_vlan entered promiscuous mode [ 47.702727][ T2471] device veth0_macvtap entered promiscuous mode [ 47.710896][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 47.719321][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.729133][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.737972][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.745599][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.756718][ T2467] device veth1_vlan entered promiscuous mode [ 47.766955][ T2471] device veth1_macvtap entered promiscuous mode [ 47.782427][ T2471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.793010][ T2471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.802861][ T2471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.813258][ T2471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.823118][ T2471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.833517][ T2471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.843312][ T2471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.853713][ T2471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.864527][ T2471] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 47.875827][ T2467] device veth0_macvtap entered promiscuous mode [ 47.885733][ T2467] device veth1_macvtap entered promiscuous mode [ 47.892369][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.900167][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.908115][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 47.916005][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.924291][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.932967][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.941304][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.949974][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.958756][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 47.968460][ T2471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 47.978996][ T2471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.988797][ T2471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 47.999199][ T2471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.009010][ T2471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.019522][ T2471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.029337][ T2471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.039737][ T2471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.050513][ T2471] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.061046][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 48.069782][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.083810][ T2467] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.094752][ T2467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.104544][ T2467] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.114947][ T2467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.124737][ T2467] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.135137][ T2467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.145010][ T2467] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.155459][ T2467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.165252][ T2467] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.175653][ T2467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.188066][ T2467] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.198547][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 48.207906][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.226489][ T2467] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.236974][ T2467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.246777][ T2467] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.257191][ T2467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.267149][ T2467] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.277550][ T2467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.287461][ T2467] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.297871][ T2467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.307677][ T2467] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.318159][ T2467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.329915][ T2467] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.345940][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 48.354511][ T825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:52:40 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'vlan1\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="14030000542369d25e69be4be727c7a4552c8c349fee90"], 0xf9}], 0x1}, 0x0) 17:52:40 executing program 2: unshare(0x20000400) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/74, 0x4a, 0x0) 17:52:40 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) getdents64(r0, &(0x7f0000000100)=""/176, 0xb0) 17:52:40 executing program 3: io_setup(0x1, &(0x7f0000000000)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4, 0x0, r1, 0x0}]) 17:52:40 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) r2 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480941ba7860ac5cf65ac60aded8974895abaff4b4834ff930b3f1e0b02bd67aa030595eecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf90809750aa6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) 17:52:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) 17:52:40 executing program 2: unshare(0x20000400) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/74, 0x4a, 0x0) 17:52:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) [ 48.432165][ T24] audit: type=1400 audit(1652032360.236:127): avc: denied { read } for pid=2714 comm="syz-executor.2" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 48.441723][ T2721] loop5: detected capacity change from 0 to 264192 17:52:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) [ 48.506216][ T24] audit: type=1400 audit(1652032360.266:128): avc: denied { open } for pid=2714 comm="syz-executor.2" path="/dev/nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 48.529928][ T24] audit: type=1400 audit(1652032360.276:129): avc: denied { setopt } for pid=2713 comm="syz-executor.4" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 17:52:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) 17:52:40 executing program 2: unshare(0x20000400) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/74, 0x4a, 0x0) 17:52:40 executing program 5: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) getdents64(r0, &(0x7f0000000100)=""/176, 0xb0) 17:52:40 executing program 0: r0 = socket(0x200000100000011, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'vlan1\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r0, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="14030000542369d25e69be4be727c7a4552c8c349fee90"], 0xf9}], 0x1}, 0x0) 17:52:40 executing program 3: io_setup(0x1, &(0x7f0000000000)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4, 0x0, r1, 0x0}]) 17:52:40 executing program 2: unshare(0x20000400) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/74, 0x4a, 0x0) [ 48.550510][ T24] audit: type=1400 audit(1652032360.276:130): avc: denied { name_bind } for pid=2718 comm="syz-executor.1" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 48.572453][ T24] audit: type=1400 audit(1652032360.276:131): avc: denied { node_bind } for pid=2718 comm="syz-executor.1" saddr=255.255.255.255 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 17:52:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) [ 48.667909][ T2748] loop5: detected capacity change from 0 to 264192 17:52:41 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) r2 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480941ba7860ac5cf65ac60aded8974895abaff4b4834ff930b3f1e0b02bd67aa030595eecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf90809750aa6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) 17:52:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) 17:52:41 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) 17:52:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) 17:52:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000640), 0x2000000007f9, 0x0) sysinfo(&(0x7f00000007c0)=""/142) unshare(0x400) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:52:41 executing program 3: io_setup(0x1, &(0x7f0000000000)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4, 0x0, r1, 0x0}]) [ 49.259891][ T24] audit: type=1400 audit(1652032361.066:132): avc: denied { read } for pid=1423 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 17:52:41 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) 17:52:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000640), 0x2000000007f9, 0x0) sysinfo(&(0x7f00000007c0)=""/142) unshare(0x400) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:52:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) 17:52:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) 17:52:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000640), 0x2000000007f9, 0x0) sysinfo(&(0x7f00000007c0)=""/142) unshare(0x400) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:52:41 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000640), 0x2000000007f9, 0x0) sysinfo(&(0x7f00000007c0)=""/142) unshare(0x400) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:52:41 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) r2 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480941ba7860ac5cf65ac60aded8974895abaff4b4834ff930b3f1e0b02bd67aa030595eecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf90809750aa6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) 17:52:41 executing program 3: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) r2 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480941ba7860ac5cf65ac60aded8974895abaff4b4834ff930b3f1e0b02bd67aa030595eecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf90809750aa6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) 17:52:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) 17:52:41 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)='5', 0x1}, {&(0x7f00000002c0)="a5f997a52fe61b2702b96574dc1d54d489255a4e1a", 0x15}], 0x2}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000180)="b542", 0x2, 0x0, 0x0, 0x0) 17:52:41 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000640), 0x2000000007f9, 0x0) sysinfo(&(0x7f00000007c0)=""/142) unshare(0x400) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:52:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000640), 0x2000000007f9, 0x0) sysinfo(&(0x7f00000007c0)=""/142) unshare(0x400) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:52:42 executing program 2: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) r2 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480941ba7860ac5cf65ac60aded8974895abaff4b4834ff930b3f1e0b02bd67aa030595eecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf90809750aa6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) 17:52:42 executing program 0: socketpair(0xa, 0x2, 0x3a, &(0x7f0000000700)) 17:52:42 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000640), 0x2000000007f9, 0x0) sysinfo(&(0x7f00000007c0)=""/142) unshare(0x400) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:52:42 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xcef7}, 0x8) 17:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:42 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xcef7}, 0x8) [ 50.257588][ T24] audit: type=1400 audit(1652032362.066:133): avc: denied { setopt } for pid=3030 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 50.325321][ T24] audit: type=1400 audit(1652032362.106:134): avc: denied { create } for pid=3042 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 17:52:42 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) r2 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480941ba7860ac5cf65ac60aded8974895abaff4b4834ff930b3f1e0b02bd67aa030595eecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf90809750aa6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) 17:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:42 executing program 0: socketpair(0xa, 0x2, 0x3a, &(0x7f0000000700)) 17:52:42 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xcef7}, 0x8) 17:52:42 executing program 3: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) r2 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480941ba7860ac5cf65ac60aded8974895abaff4b4834ff930b3f1e0b02bd67aa030595eecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf90809750aa6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) 17:52:42 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xcef7}, 0x8) 17:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:42 executing program 2: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) r2 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480941ba7860ac5cf65ac60aded8974895abaff4b4834ff930b3f1e0b02bd67aa030595eecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf90809750aa6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) 17:52:42 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:42 executing program 0: socketpair(0xa, 0x2, 0x3a, &(0x7f0000000700)) 17:52:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:42 executing program 0: socketpair(0xa, 0x2, 0x3a, &(0x7f0000000700)) 17:52:43 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:43 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:43 executing program 3: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) r2 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480941ba7860ac5cf65ac60aded8974895abaff4b4834ff930b3f1e0b02bd67aa030595eecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf90809750aa6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) 17:52:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:43 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f00000005c0)=[{{&(0x7f00000001c0)=@in6={0x2, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@in={0x2, 0x4e24, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000140)=[@timestamping={{0x18, 0x1, 0x24}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 17:52:43 executing program 2: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000300)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a22961b61e3ff5f1c3ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816b3f6db1c00010000000081c7a0b204c006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) r2 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480941ba7860ac5cf65ac60aded8974895abaff4b4834ff930b3f1e0b02bd67aa030595eecc7a9541aa3b77e758044ab4ea6f7ae55d88fecf90809750aa6746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) 17:52:43 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:43 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f00000005c0)=[{{&(0x7f00000001c0)=@in6={0x2, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@in={0x2, 0x4e24, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000140)=[@timestamping={{0x18, 0x1, 0x24}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 17:52:43 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:43 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x3b) fcntl$notify(r3, 0x402, 0x0) 17:52:43 executing program 4: mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x90131, 0xffffffffffffffff, 0x10000000) 17:52:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f00000005c0)=[{{&(0x7f00000001c0)=@in6={0x2, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@in={0x2, 0x4e24, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000140)=[@timestamping={{0x18, 0x1, 0x24}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 17:52:44 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81b"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x400100000001) 17:52:44 executing program 4: mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x90131, 0xffffffffffffffff, 0x10000000) 17:52:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f00000005c0)=[{{&(0x7f00000001c0)=@in6={0x2, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@in={0x2, 0x4e24, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000140)=[@timestamping={{0x18, 0x1, 0x24}}, @timestamping={{0x14}}], 0x30}}], 0x2, 0x0) 17:52:44 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:44 executing program 4: mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x90131, 0xffffffffffffffff, 0x10000000) 17:52:44 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:44 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:44 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) [ 52.820989][ T24] audit: type=1400 audit(1652032364.626:135): avc: denied { create } for pid=3132 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 52.840724][ T24] audit: type=1400 audit(1652032364.626:136): avc: denied { connect } for pid=3132 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 17:52:44 executing program 4: mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x90131, 0xffffffffffffffff, 0x10000000) 17:52:44 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:44 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81b"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x400100000001) 17:52:44 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81b"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x400100000001) 17:52:45 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81b"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x400100000001) 17:52:45 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81b"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x400100000001) 17:52:45 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:45 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:45 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:45 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:45 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:45 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81b"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x400100000001) 17:52:46 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81b"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x400100000001) 17:52:46 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:46 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:46 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:46 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:52:46 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:46 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/block/loop0', 0xe0c00, 0x197) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600934f65ac618ded8974995abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r1, &(0x7f0000001500)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xad000000, 0xd002}, 0x100) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) [ 54.846334][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 54.846346][ T24] audit: type=1400 audit(1652032366.656:138): avc: denied { name_bind } for pid=3254 comm="syz-executor.0" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 54.879664][ T3255] netlink: 243 bytes leftover after parsing attributes in process `syz-executor.0'. [ 54.900571][ T24] audit: type=1400 audit(1652032366.696:139): avc: denied { map } for pid=3254 comm="syz-executor.0" path="socket:[20111]" dev="sockfs" ino=20111 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 17:52:46 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:46 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:47 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:47 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) [ 55.455491][ T3284] netlink: 243 bytes leftover after parsing attributes in process `syz-executor.0'. 17:52:47 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) [ 55.525178][ T3304] netlink: 243 bytes leftover after parsing attributes in process `syz-executor.3'. 17:52:47 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) [ 55.617659][ T3294] netlink: 243 bytes leftover after parsing attributes in process `syz-executor.5'. 17:52:47 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:47 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:47 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) [ 55.981460][ T3312] netlink: 243 bytes leftover after parsing attributes in process `syz-executor.4'. [ 56.105895][ T3322] netlink: 243 bytes leftover after parsing attributes in process `syz-executor.2'. 17:52:47 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) [ 56.165533][ T3328] netlink: 243 bytes leftover after parsing attributes in process `syz-executor.0'. [ 56.202949][ T3337] netlink: 243 bytes leftover after parsing attributes in process `syz-executor.1'. 17:52:48 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:48 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:48 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) [ 56.346991][ T3345] netlink: 243 bytes leftover after parsing attributes in process `syz-executor.5'. [ 56.458432][ T3352] netlink: 243 bytes leftover after parsing attributes in process `syz-executor.3'. 17:52:48 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:48 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:48 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x84, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, &(0x7f00000002c0)=0x100) 17:52:48 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x84, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, &(0x7f00000002c0)=0x100) [ 57.026022][ T24] audit: type=1400 audit(1652032368.836:140): avc: denied { getopt } for pid=3428 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 17:52:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x84, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, &(0x7f00000002c0)=0x100) 17:52:48 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x8000002}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0f00e400000000f10febca0746", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00f9ff0f010200ca000000b01d84dd3bb3170b"], 0x140}}, 0x0) mmap(&(0x7f0000550000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=@gettaction={0x110, 0x32, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4560}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x11}, 0x20) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11907064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x600000) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 17:52:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x84, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, &(0x7f00000002c0)=0x100) 17:52:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xb, 0x2, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x19}, @exit], &(0x7f0000000200)='GPL\x00', 0x2, 0xd1, &(0x7f0000000240)=""/209, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xb, 0x2, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x19}, @exit], &(0x7f0000000200)='GPL\x00', 0x2, 0xd1, &(0x7f0000000240)=""/209, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="34000000100081eee80000040000000410000000", @ANYRES32=r3, @ANYBLOB="ddfffffdff000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB="2c0000001400b59500000000000000000a000000", @ANYRES32=r3, @ANYBLOB="1400020007"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) 17:52:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xb, 0x2, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x19}, @exit], &(0x7f0000000200)='GPL\x00', 0x2, 0xd1, &(0x7f0000000240)=""/209, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="34000000100081eee80000040000000410000000", @ANYRES32=r3, @ANYBLOB="ddfffffdff000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB="2c0000001400b59500000000000000000a000000", @ANYRES32=r3, @ANYBLOB="1400020007"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) 17:52:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xb, 0x2, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x19}, @exit], &(0x7f0000000200)='GPL\x00', 0x2, 0xd1, &(0x7f0000000240)=""/209, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:49 executing program 3: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="34000000100081eee80000040000000410000000", @ANYRES32=r3, @ANYBLOB="ddfffffdff000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB="2c0000001400b59500000000000000000a000000", @ANYRES32=r3, @ANYBLOB="1400020007"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) 17:52:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f00000001c0)="30801080", 0x4, r1) 17:52:49 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000040000000000000000850000000e000000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='sys_exit\x00', r0}, 0x10) futex(0x0, 0xa, 0x0, 0x0, 0x0, 0x4) 17:52:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="34000000100081eee80000040000000410000000", @ANYRES32=r3, @ANYBLOB="ddfffffdff000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB="2c0000001400b59500000000000000000a000000", @ANYRES32=r3, @ANYBLOB="1400020007"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) 17:52:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 17:52:49 executing program 3: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="34000000100081eee80000040000000410000000", @ANYRES32=r3, @ANYBLOB="ddfffffdff000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB="2c0000001400b59500000000000000000a000000", @ANYRES32=r3, @ANYBLOB="1400020007"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) 17:52:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x303, 0x38}, '%Z\f\x00', "f4133c00d895e9d5fb08a848e66013e9", "1700", "fb486d4e2dcefee8"}, 0x28) setsockopt$sock_int(r0, 0x1, 0x49, &(0x7f0000000040), 0x4) 17:52:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f00000001c0)="30801080", 0x4, r1) 17:52:49 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000040000000000000000850000000e000000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='sys_exit\x00', r0}, 0x10) futex(0x0, 0xa, 0x0, 0x0, 0x0, 0x4) 17:52:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="34000000100081eee80000040000000410000000", @ANYRES32=r3, @ANYBLOB="ddfffffdff000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB="2c0000001400b59500000000000000000a000000", @ANYRES32=r3, @ANYBLOB="1400020007"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) [ 57.622588][ T3483] loop0: detected capacity change from 0 to 4096 17:52:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f00000001c0)="30801080", 0x4, r1) 17:52:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 17:52:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f00000001c0)="30801080", 0x4, r1) [ 57.684406][ T3483] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 57.711415][ T24] audit: type=1400 audit(1652032369.516:141): avc: denied { mount } for pid=3481 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 17:52:49 executing program 3: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="34000000100081eee80000040000000410000000", @ANYRES32=r3, @ANYBLOB="ddfffffdff000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB="2c0000001400b59500000000000000000a000000", @ANYRES32=r3, @ANYBLOB="1400020007"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) 17:52:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 17:52:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 17:52:49 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000040000000000000000850000000e000000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='sys_exit\x00', r0}, 0x10) futex(0x0, 0xa, 0x0, 0x0, 0x0, 0x4) [ 57.793394][ T3515] loop0: detected capacity change from 0 to 4096 [ 57.829460][ T3520] loop5: detected capacity change from 0 to 4096 [ 57.838072][ T24] audit: type=1400 audit(1652032369.516:142): avc: denied { write } for pid=3481 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 57.849051][ T3527] loop1: detected capacity change from 0 to 4096 [ 57.860126][ T24] audit: type=1400 audit(1652032369.516:143): avc: denied { add_name } for pid=3481 comm="syz-executor.0" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 57.887171][ T24] audit: type=1400 audit(1652032369.516:144): avc: denied { create } for pid=3481 comm="syz-executor.0" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 57.907543][ T24] audit: type=1400 audit(1652032369.516:145): avc: denied { read write open } for pid=3481 comm="syz-executor.0" path="/root/syzkaller-testdir1424843859/syzkaller.Vhglhq/32/file0/bus" dev="loop0" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 17:52:49 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000040000000000000000850000000e000000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='sys_exit\x00', r0}, 0x10) futex(0x0, 0xa, 0x0, 0x0, 0x0, 0x4) 17:52:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x303, 0x38}, '%Z\f\x00', "f4133c00d895e9d5fb08a848e66013e9", "1700", "fb486d4e2dcefee8"}, 0x28) setsockopt$sock_int(r0, 0x1, 0x49, &(0x7f0000000040), 0x4) [ 57.914788][ T3515] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 57.935547][ T24] audit: type=1400 audit(1652032369.546:146): avc: denied { unmount } for pid=2467 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 57.935571][ T24] audit: type=1400 audit(1652032369.556:147): avc: denied { prog_load } for pid=3502 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 57.972536][ T3527] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. 17:52:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 17:52:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 17:52:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f00000001c0)="30801080", 0x4, r1) 17:52:49 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f00000001c0)="30801080", 0x4, r1) 17:52:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 17:52:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f00000001c0)="30801080", 0x4, r1) [ 58.028510][ T3520] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. 17:52:49 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f00000001c0)="30801080", 0x4, r1) 17:52:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f00000001c0)="30801080", 0x4, r1) 17:52:49 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000440)='asymmetric\x00', 0x0, &(0x7f00000001c0)="30801080", 0x4, r1) [ 58.109138][ T3564] loop1: detected capacity change from 0 to 4096 [ 58.143266][ T3570] loop0: detected capacity change from 0 to 4096 [ 58.146384][ T3564] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. 17:52:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 17:52:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x3, @dev}], 0x10) [ 58.167815][ T3570] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 58.178526][ T3573] loop5: detected capacity change from 0 to 4096 17:52:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x303, 0x38}, '%Z\f\x00', "f4133c00d895e9d5fb08a848e66013e9", "1700", "fb486d4e2dcefee8"}, 0x28) setsockopt$sock_int(r0, 0x1, 0x49, &(0x7f0000000040), 0x4) 17:52:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 17:52:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x3, @dev}], 0x10) 17:52:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f80100200040000000000000000000800029a0ec11f153595a4b414c4c4552202046415431322020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ffff00f0ffffffff078000ffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8ffff00f0ffffffff078000ffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="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", 0x120, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e670325132510000e67032510300000000002e2e2020202020202020201000c1e670325132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000c1e670325132510000e670325104001a040000", 0x80, 0x1e00}, {&(0x7f0000010600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x2e00}, {&(0x7f0000010b00)='syzkallers\x00'/32, 0x20, 0x3e00}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x7e00}], 0x0, &(0x7f0000010d00)) [ 58.237529][ T3573] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. 17:52:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x3, @dev}], 0x10) 17:52:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) [ 58.284675][ T3598] loop4: detected capacity change from 0 to 128 17:52:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f80100200040000000000000000000800029a0ec11f153595a4b414c4c4552202046415431322020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ffff00f0ffffffff078000ffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8ffff00f0ffffffff078000ffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="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", 0x120, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e670325132510000e67032510300000000002e2e2020202020202020201000c1e670325132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000c1e670325132510000e670325104001a040000", 0x80, 0x1e00}, {&(0x7f0000010600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x2e00}, {&(0x7f0000010b00)='syzkallers\x00'/32, 0x20, 0x3e00}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x7e00}], 0x0, &(0x7f0000010d00)) 17:52:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x3, @dev}], 0x10) [ 58.339415][ T3608] loop0: detected capacity change from 0 to 4096 [ 58.339588][ T3609] loop1: detected capacity change from 0 to 4096 [ 58.364923][ T3608] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 58.412806][ T3609] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 58.426446][ T3622] loop4: detected capacity change from 0 to 128 17:52:50 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:50 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f80100200040000000000000000000800029a0ec11f153595a4b414c4c4552202046415431322020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ffff00f0ffffffff078000ffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8ffff00f0ffffffff078000ffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="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", 0x120, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e670325132510000e67032510300000000002e2e2020202020202020201000c1e670325132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000c1e670325132510000e670325104001a040000", 0x80, 0x1e00}, {&(0x7f0000010600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x2e00}, {&(0x7f0000010b00)='syzkallers\x00'/32, 0x20, 0x3e00}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x7e00}], 0x0, &(0x7f0000010d00)) [ 58.504163][ T3630] loop5: detected capacity change from 0 to 4096 [ 58.551733][ T3642] loop1: detected capacity change from 0 to 128 [ 58.564683][ T3644] loop4: detected capacity change from 0 to 128 [ 58.576442][ T3630] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. 17:52:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x303, 0x38}, '%Z\f\x00', "f4133c00d895e9d5fb08a848e66013e9", "1700", "fb486d4e2dcefee8"}, 0x28) setsockopt$sock_int(r0, 0x1, 0x49, &(0x7f0000000040), 0x4) 17:52:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f80100200040000000000000000000800029a0ec11f153595a4b414c4c4552202046415431322020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ffff00f0ffffffff078000ffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8ffff00f0ffffffff078000ffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="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", 0x120, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e670325132510000e67032510300000000002e2e2020202020202020201000c1e670325132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000c1e670325132510000e670325104001a040000", 0x80, 0x1e00}, {&(0x7f0000010600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x2e00}, {&(0x7f0000010b00)='syzkallers\x00'/32, 0x20, 0x3e00}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x7e00}], 0x0, &(0x7f0000010d00)) [ 58.596936][ T3642] isofs_fill_super: bread failed, dev=loop1, iso_blknum=32, block=64 17:52:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:50 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') [ 58.679475][ T3648] Zero length message leads to an empty skb [ 58.714716][ T3666] loop1: detected capacity change from 0 to 128 17:52:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 58.735693][ T3666] isofs_fill_super: bread failed, dev=loop1, iso_blknum=32, block=64 [ 58.744068][ T3664] loop4: detected capacity change from 0 to 128 17:52:50 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') [ 58.822556][ T3684] loop4: detected capacity change from 0 to 128 [ 58.833973][ T3686] loop1: detected capacity change from 0 to 128 [ 58.852799][ T3686] isofs_fill_super: bread failed, dev=loop1, iso_blknum=32, block=64 [ 58.869969][ T3684] isofs_fill_super: bread failed, dev=loop4, iso_blknum=32, block=64 17:52:51 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:51 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:51 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:51 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 59.370079][ T3716] loop4: detected capacity change from 0 to 128 [ 59.371197][ T3719] loop0: detected capacity change from 0 to 128 [ 59.383351][ T3718] loop1: detected capacity change from 0 to 128 [ 59.390861][ T3722] loop2: detected capacity change from 0 to 128 [ 59.393210][ T3719] isofs_fill_super: bread failed, dev=loop0, iso_blknum=32, block=64 17:52:51 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:51 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 59.422205][ T3716] isofs_fill_super: bread failed, dev=loop4, iso_blknum=32, block=64 [ 59.432887][ T3722] isofs_fill_super: bread failed, dev=loop2, iso_blknum=32, block=64 [ 59.442329][ T3718] isofs_fill_super: bread failed, dev=loop1, iso_blknum=32, block=64 17:52:51 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:51 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) [ 59.483892][ T3728] loop0: detected capacity change from 0 to 128 [ 59.499204][ T3730] loop4: detected capacity change from 0 to 128 [ 59.518819][ T3734] loop2: detected capacity change from 0 to 128 17:52:51 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 59.529250][ T3730] isofs_fill_super: bread failed, dev=loop4, iso_blknum=32, block=64 [ 59.538978][ T3728] isofs_fill_super: bread failed, dev=loop0, iso_blknum=32, block=64 [ 59.542091][ T3734] isofs_fill_super: bread failed, dev=loop2, iso_blknum=32, block=64 [ 59.587376][ T3739] loop0: detected capacity change from 0 to 128 [ 59.596997][ T3739] isofs_fill_super: bread failed, dev=loop0, iso_blknum=32, block=64 [ 60.244603][ T24] kauditd_printk_skb: 16 callbacks suppressed [ 60.244616][ T24] audit: type=1326 audit(1652032372.046:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3723 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f21cb53d0e9 code=0x7fc00000 [ 60.275762][ T24] audit: type=1326 audit(1652032372.046:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3723 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21cb53d0e9 code=0x7fc00000 [ 60.299760][ T24] audit: type=1326 audit(1652032372.046:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3723 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21cb53d0e9 code=0x7fc00000 [ 60.323601][ T24] audit: type=1326 audit(1652032372.046:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3723 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21cb53d0e9 code=0x7fc00000 [ 60.347408][ T24] audit: type=1326 audit(1652032372.046:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3723 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21cb53d0e9 code=0x7fc00000 [ 60.371285][ T24] audit: type=1326 audit(1652032372.046:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3723 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21cb53d0e9 code=0x7fc00000 [ 60.395211][ T24] audit: type=1326 audit(1652032372.046:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3723 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21cb53d0e9 code=0x7fc00000 [ 60.418997][ T24] audit: type=1326 audit(1652032372.046:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3723 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21cb53d0e9 code=0x7fc00000 17:52:52 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:52 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:52 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:52 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:52 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) [ 60.442933][ T24] audit: type=1326 audit(1652032372.046:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3723 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21cb53d0e9 code=0x7fc00000 [ 60.466778][ T24] audit: type=1326 audit(1652032372.046:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3723 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21cb53d0e9 code=0x7fc00000 [ 60.514264][ T3793] loop2: detected capacity change from 0 to 128 [ 60.529646][ T3793] isofs_fill_super: bread failed, dev=loop2, iso_blknum=32, block=64 17:52:52 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:53 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:53 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:53 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:53 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:53 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:53 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:54 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:54 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:54 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:54 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 62.257006][ T4035] loop5: detected capacity change from 0 to 128 [ 62.259580][ T4036] loop1: detected capacity change from 0 to 128 [ 62.271739][ T4038] loop3: detected capacity change from 0 to 128 [ 62.281565][ T4035] isofs_fill_super: bread failed, dev=loop5, iso_blknum=32, block=64 [ 62.283921][ T4036] isofs_fill_super: bread failed, dev=loop1, iso_blknum=32, block=64 17:52:54 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001600018b993b5d463d5dd88564"], 0x20}}, 0x0) r5 = signalfd4(r4, &(0x7f00000000c0)={[0x8000000000000000]}, 0x8, 0x400) openat(r3, &(0x7f0000000240)='./bus\x00', 0x0, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0}) r7 = socket$unix(0x1, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000180)={r6, 0x1, r7, 0x5, 0x80000}) 17:52:54 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 62.303601][ T4038] isofs_fill_super: bread failed, dev=loop3, iso_blknum=32, block=64 17:52:54 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 62.340922][ T4043] loop3: detected capacity change from 0 to 128 [ 62.353090][ T3629] udevd[3629]: inotify_add_watch(7, /dev/loop3p189, 10) failed: No such file or directory [ 62.355125][ T4045] loop5: detected capacity change from 0 to 128 [ 62.366704][ T2323] udevd[2323]: inotify_add_watch(7, /dev/loop3p195, 10) failed: No such file or directory [ 62.380315][ T1905] udevd[1905]: inotify_add_watch(7, /dev/loop3p188, 10) failed: No such file or directory [ 62.388338][ T4045] isofs_fill_super: bread failed, dev=loop5, iso_blknum=32, block=64 [ 62.392993][ T3633] udevd[3633]: inotify_add_watch(7, /dev/loop3p194, 10) failed: No such file or directory [ 62.403891][ T4043] isofs_fill_super: bread failed, dev=loop3, iso_blknum=32, block=64 [ 62.415409][ T4049] loop1: detected capacity change from 0 to 128 17:52:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:54 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 62.434687][ T4049] isofs_fill_super: bread failed, dev=loop1, iso_blknum=32, block=64 17:52:54 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 62.488360][ T4062] loop3: detected capacity change from 0 to 128 [ 62.500822][ T4062] isofs_fill_super: bread failed, dev=loop3, iso_blknum=32, block=64 [ 62.527052][ T4068] loop5: detected capacity change from 0 to 128 [ 62.536967][ T4070] loop1: detected capacity change from 0 to 128 [ 62.547005][ T4070] isofs_fill_super: bread failed, dev=loop1, iso_blknum=32, block=64 [ 62.548214][ T4068] isofs_fill_super: bread failed, dev=loop5, iso_blknum=32, block=64 17:52:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:54 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:54 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:54 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 63.076008][ T4112] loop5: detected capacity change from 0 to 128 [ 63.088218][ T4112] isofs_fill_super: bread failed, dev=loop5, iso_blknum=32, block=64 [ 63.114971][ T4119] loop3: detected capacity change from 0 to 128 17:52:54 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 63.126717][ T4123] loop0: detected capacity change from 0 to 128 [ 63.131768][ T4125] loop4: detected capacity change from 0 to 128 [ 63.135158][ T4123] isofs_fill_super: bread failed, dev=loop0, iso_blknum=32, block=64 [ 63.152060][ T4122] loop1: detected capacity change from 0 to 128 [ 63.167957][ T4119] isofs_fill_super: bread failed, dev=loop3, iso_blknum=32, block=64 17:52:55 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 63.186176][ T4125] isofs_fill_super: bread failed, dev=loop4, iso_blknum=32, block=64 [ 63.188873][ T4129] loop5: detected capacity change from 0 to 128 [ 63.205472][ T4122] isofs_fill_super: bread failed, dev=loop1, iso_blknum=32, block=64 [ 63.224768][ T4129] isofs_fill_super: bread failed, dev=loop5, iso_blknum=32, block=64 17:52:55 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 63.228478][ T4135] loop0: detected capacity change from 0 to 128 17:52:55 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:55 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 63.261711][ T3629] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 63.278386][ T4135] isofs_fill_super: bread failed, dev=loop0, iso_blknum=32, block=64 17:52:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) [ 63.309904][ T4144] loop1: detected capacity change from 0 to 128 [ 63.323768][ T4147] loop3: detected capacity change from 0 to 128 [ 63.332210][ T4150] loop5: detected capacity change from 0 to 128 [ 63.342814][ T4153] loop4: detected capacity change from 0 to 128 [ 63.362649][ T4147] isofs_fill_super: bread failed, dev=loop3, iso_blknum=32, block=64 [ 63.377758][ T4156] loop0: detected capacity change from 0 to 128 [ 63.378553][ T4150] isofs_fill_super: bread failed, dev=loop5, iso_blknum=32, block=64 [ 63.395443][ T4153] isofs_fill_super: bread failed, dev=loop4, iso_blknum=32, block=64 17:52:55 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:55 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="034344303031", 0x6, 0x8000}], 0x0, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f00000007c0)='./file1\x00', &(0x7f0000000940), 0x80, &(0x7f0000000fc0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@aname}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, 'syzkaller\x00'}}, {@uid_gt}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x4, 0xc4, 0x5, 0x100, 0x6c, @private1, @private2, 0x40, 0x700, 0x17d4, 0x7}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="85000000860000009500fd9f000000008a479a9cc9ca135552516c6a61eb9ce435df8b397697a17981c301f2daa876d6451fcc6ea8064707b82c5e9cc3419360eb425a827b498a1518db9a03dd759d7082b552a8698c58039c7b12a78e"], &(0x7f00000000c0)='GPL\x00', 0x80000005, 0xc2, &(0x7f00000009c0)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x32}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0x7) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000400)={@private0, 0x5, r4}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18f1f3d5096cc9d2207fc18e8a4ebf0000001b00000000000201037502f706000000"], &(0x7f0000000080)='GPL\x00', 0x1f, 0xb6, &(0x7f0000000340)=""/182, 0x41100, 0x8, '\x00', r4, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0xf25, 0x81}, 0x10, r5, r1}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="02168000000000008510b61eb45a7c945c508900c7608c527c0a323000faffffff850000006a0000009500000000000000950000008ee9060018630000060000000000000078e5ff"], &(0x7f0000000700)='GPL\x00', 0x2, 0x1000, &(0x7f0000002180)=""/4096, 0x41000, 0x6, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0xfffffffd, 0x5, 0x9, 0x4}, 0x10, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0x9, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000050000000000000001010200852000000200542ee7009500000000000000185e00000500ccc210455c63ed0efb240ccbccb7266e00000000000004e700100000000000000000006dbd2986da93da07d2f8"], &(0x7f0000000980)='GPL\x00', 0x80, 0x36, &(0x7f0000000c40)=""/54, 0x41000, 0x18, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x4005, 0x101, 0x200002}, 0x10, r5}, 0x80) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000900)='GPL\x00', 0x3, 0x7d, &(0x7f0000000c80)=""/125, 0x40f00, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0x2, 0x3, 0xab}, 0x10, 0x4f7d, 0xffffffffffffffff, 0x0, &(0x7f0000000d40)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xd, 0x8, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x41}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000940), 0x41000, 0x12, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000d80)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x5, 0x0, 0xab, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, r6]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}}, &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x1e, &(0x7f00000000c0)=""/30, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000180)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x100, 0x4}, 0x10, r5}, 0x80) 17:52:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') [ 63.405865][ T4144] isofs_fill_super: bread failed, dev=loop1, iso_blknum=32, block=64 [ 63.430880][ T4156] isofs_fill_super: bread failed, dev=loop0, iso_blknum=32, block=64 17:52:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') [ 63.485183][ T4168] loop4: detected capacity change from 0 to 128 [ 63.496511][ T4169] loop1: detected capacity change from 0 to 128 [ 63.504907][ T4168] isofs_fill_super: bread failed, dev=loop4, iso_blknum=32, block=64 [ 63.513390][ T4171] loop3: detected capacity change from 0 to 128 [ 63.527162][ T4169] isofs_fill_super: bread failed, dev=loop1, iso_blknum=32, block=64 17:52:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') [ 63.563084][ T4171] isofs_fill_super: bread failed, dev=loop3, iso_blknum=32, block=64 17:52:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newnexthop={0x38, 0x68, 0x7a1, 0x0, 0x0, {}, [@NHA_ID={0x8}, @NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @ILA_ATTR_LOCATOR={0xc}}, @NHA_GROUP={0x4}, @NHA_FDB={0x4}]}, 0x38}}, 0x0) 17:52:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newnexthop={0x38, 0x68, 0x7a1, 0x0, 0x0, {}, [@NHA_ID={0x8}, @NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @ILA_ATTR_LOCATOR={0xc}}, @NHA_GROUP={0x4}, @NHA_FDB={0x4}]}, 0x38}}, 0x0) 17:52:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newnexthop={0x38, 0x68, 0x7a1, 0x0, 0x0, {}, [@NHA_ID={0x8}, @NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @ILA_ATTR_LOCATOR={0xc}}, @NHA_GROUP={0x4}, @NHA_FDB={0x4}]}, 0x38}}, 0x0) 17:52:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newnexthop={0x38, 0x68, 0x7a1, 0x0, 0x0, {}, [@NHA_ID={0x8}, @NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @ILA_ATTR_LOCATOR={0xc}}, @NHA_GROUP={0x4}, @NHA_FDB={0x4}]}, 0x38}}, 0x0) 17:52:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newnexthop={0x38, 0x68, 0x7a1, 0x0, 0x0, {}, [@NHA_ID={0x8}, @NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @ILA_ATTR_LOCATOR={0xc}}, @NHA_GROUP={0x4}, @NHA_FDB={0x4}]}, 0x38}}, 0x0) 17:52:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffc]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffc]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x84000b6a) rmdir(&(0x7f0000000100)='./control\x00') 17:52:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket(0xa, 0x3, 0x102) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x1bc, &(0x7f0000000580)={&(0x7f00000004c0)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 17:52:55 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) set_mempolicy(0x3, &(0x7f00000000c0)=0x9, 0xd0) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000000000)=0x8) 17:52:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newnexthop={0x38, 0x68, 0x7a1, 0x0, 0x0, {}, [@NHA_ID={0x8}, @NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @ILA_ATTR_LOCATOR={0xc}}, @NHA_GROUP={0x4}, @NHA_FDB={0x4}]}, 0x38}}, 0x0) 17:52:55 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) set_mempolicy(0x3, &(0x7f00000000c0)=0x9, 0xd0) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000000000)=0x8) 17:52:55 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) set_mempolicy(0x3, &(0x7f00000000c0)=0x9, 0xd0) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000000000)=0x8) 17:52:55 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) set_mempolicy(0x3, &(0x7f00000000c0)=0x9, 0xd0) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000000000)=0x8) 17:52:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newnexthop={0x38, 0x68, 0x7a1, 0x0, 0x0, {}, [@NHA_ID={0x8}, @NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @ILA_ATTR_LOCATOR={0xc}}, @NHA_GROUP={0x4}, @NHA_FDB={0x4}]}, 0x38}}, 0x0) 17:52:55 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) set_mempolicy(0x3, &(0x7f00000000c0)=0x9, 0xd0) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000000000)=0x8) 17:52:55 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) dup2(r2, r0) 17:52:55 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) set_mempolicy(0x3, &(0x7f00000000c0)=0x9, 0xd0) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000000000)=0x8) [ 63.804913][ T4235] team0: Device ipvlan2 failed to register rx_handler 17:52:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket(0xa, 0x3, 0x102) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x1bc, &(0x7f0000000580)={&(0x7f00000004c0)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 17:52:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@can_newroute={0x154, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0xfffffffffffffff7}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6cc19c843825f37857cf1dba4abe26aac7703e85"}}, @CGW_MOD_XOR={0x15, 0x3, {{{}, 0x0, 0x0, 0x0, 0x0, "b06e002ecf0b6d23"}, 0x1}}]}, 0x154}}, 0x0) 17:52:55 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) set_mempolicy(0x3, &(0x7f00000000c0)=0x9, 0xd0) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000000000)=0x8) 17:52:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000000)=r3, 0x4) 17:52:55 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) dup2(r2, r0) 17:52:55 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) dup2(r2, r0) 17:52:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000000)=r3, 0x4) 17:52:55 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) dup2(r2, r0) 17:52:55 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) dup2(r2, r0) 17:52:55 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000000)=r3, 0x4) 17:52:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000000)=r3, 0x4) [ 63.939849][ T4258] team0: Device ipvlan2 failed to register rx_handler 17:52:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@can_newroute={0x154, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0xfffffffffffffff7}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6cc19c843825f37857cf1dba4abe26aac7703e85"}}, @CGW_MOD_XOR={0x15, 0x3, {{{}, 0x0, 0x0, 0x0, 0x0, "b06e002ecf0b6d23"}, 0x1}}]}, 0x154}}, 0x0) 17:52:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket(0xa, 0x3, 0x102) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x1bc, &(0x7f0000000580)={&(0x7f00000004c0)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 17:52:55 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000000)=r3, 0x4) 17:52:55 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) dup2(r2, r0) 17:52:55 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) dup2(r2, r0) 17:52:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000000)=r3, 0x4) 17:52:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@can_newroute={0x154, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0xfffffffffffffff7}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6cc19c843825f37857cf1dba4abe26aac7703e85"}}, @CGW_MOD_XOR={0x15, 0x3, {{{}, 0x0, 0x0, 0x0, 0x0, "b06e002ecf0b6d23"}, 0x1}}]}, 0x154}}, 0x0) 17:52:55 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000000)=r3, 0x4) 17:52:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000000)=r3, 0x4) 17:52:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@can_newroute={0x154, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0x0, 0xfffffffffffffff7}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6cc19c843825f37857cf1dba4abe26aac7703e85"}}, @CGW_MOD_XOR={0x15, 0x3, {{{}, 0x0, 0x0, 0x0, 0x0, "b06e002ecf0b6d23"}, 0x1}}]}, 0x154}}, 0x0) 17:52:55 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) dup2(r2, r0) 17:52:55 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x1, 0x2, 0x0, 0x5, 0xffffffffffffffff}) 17:52:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, 0xfffffffffffffffc, 0x2}) [ 64.114163][ T4293] team0: Device ipvlan2 failed to register rx_handler 17:52:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket(0xa, 0x3, 0x102) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x1bc, &(0x7f0000000580)={&(0x7f00000004c0)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 17:52:56 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x1, 0x2, 0x0, 0x5, 0xffffffffffffffff}) 17:52:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000000)=r3, 0x4) 17:52:56 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) dup2(r2, r0) 17:52:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, 0xfffffffffffffffc, 0x2}) 17:52:56 executing program 4: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 17:52:56 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x1, 0x2, 0x0, 0x5, 0xffffffffffffffff}) 17:52:56 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) dup2(r2, r0) 17:52:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000000)=r3, 0x4) 17:52:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, 0xfffffffffffffffc, 0x2}) 17:52:56 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x1, 0x2, 0x0, 0x5, 0xffffffffffffffff}) 17:52:56 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) [ 64.266007][ T4318] team0: Device ipvlan2 failed to register rx_handler 17:52:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, 0xfffffffffffffffc, 0x2}) 17:52:56 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8992, &(0x7f0000001780)='\x86v$)\xec:W\x1apLbD\xc0\xfeh\xa6L^\xab\x1c\x8f?\x9c\xd4kl\xfb\xd4\xe3\be\xa1\xfaS\x9a\xdf_(\x1b\xba\xec\xde4\xbf\x8b\xc5\x83\xdaA$\xe0\x8f\xfbi\x7f\xfb\xe0RP\x94\x00\x8eO\x01\xc0`\x1b\xaag\x0e\vA\n\x82\xb0\xfe\xebQ\x12\xe4c\xda\x93\xfd \x01\x1c\xf1M\xa0\x1c \xedM\x9d\x10\xa4\x12\xe5\xa2z\x9d\xa44gC~1\xb0\x87\xc6\xe3)\x87\x10\xd5\x1a#\x93T\xdfB') 17:52:56 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20040054, 0x0, 0x0) 17:52:56 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20040054, 0x0, 0x0) 17:52:56 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20040054, 0x0, 0x0) 17:52:56 executing program 4: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 17:52:56 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20040054, 0x0, 0x0) 17:52:56 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20040054, 0x0, 0x0) 17:52:56 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8992, &(0x7f0000001780)='\x86v$)\xec:W\x1apLbD\xc0\xfeh\xa6L^\xab\x1c\x8f?\x9c\xd4kl\xfb\xd4\xe3\be\xa1\xfaS\x9a\xdf_(\x1b\xba\xec\xde4\xbf\x8b\xc5\x83\xdaA$\xe0\x8f\xfbi\x7f\xfb\xe0RP\x94\x00\x8eO\x01\xc0`\x1b\xaag\x0e\vA\n\x82\xb0\xfe\xebQ\x12\xe4c\xda\x93\xfd \x01\x1c\xf1M\xa0\x1c \xedM\x9d\x10\xa4\x12\xe5\xa2z\x9d\xa44gC~1\xb0\x87\xc6\xe3)\x87\x10\xd5\x1a#\x93T\xdfB') 17:52:56 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20040054, 0x0, 0x0) 17:52:56 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20040054, 0x0, 0x0) 17:52:56 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000700000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d75357f216907dc6751dfb265a0e3ccae669e173a649c1cfd6587d472d64e7cc955d77578f4c35235138d5421f9453559c35da860e8ef14142b2a3e314422b854421eed734ceb1efeecb9c66c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe3e26e7a23129d6606fd28a697a9d552af6d9a9df2c3af36e0360050011bbec0727cb3f647535deb6277f5696833a71011a7d06602e2fd5234712596b696418f163d1a13ed38a682f87925bfa753f541cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b4efab57644ccb1973d7879b70a70001040000000000000000d7900a820b63278f4e9a217b98ef7042ad2a923132f208fd8289eaf8cd50cbe43a1ed25268816b00000000000009d27d753a30a147c24a48435bd8a5686f2fccc33e3e34c3969c5ad781302d40e97a8ad10ce0cbe17366d5ac6af2fca2360a15b8d5b1d52040ef7b28d300747877e176fe4c4b8e40dbf260f5a9f7eee30293c1b163b795d0aef4deb851a3fc9df569dc8f39943f889008e1ec914faa9e6cd0b3b4b3b5dbf48126516c3c94f1e376459e70b459543c4ac42e53b4ad4c77cff373ebd95848f01864e456969cd28000170996016aceb583d95dd148a0620d000af489f9a900000000a0dcc36b3d7c734a9cce0439f8ba92dd66afb9d74aa222038994dcd3e7784dbea1e51a15b0f1a040cc63177f8fafa3192fc8e5552da1c882ab8dfe31ad1a0968faa47c2069d6bf09c3aa4f0fc128cb578d99b08a150b4cc4b22f6a464c6398c952519818a44a1b223ff502df878c5c276588ea478e328e8277e811b99ce1acfecaf8e2c55ccc4b8eae0a61635514e99ffd438784060f23ba74c0b30b1180d935832debf76d789ba1d436d116394534e88492a42b8bf050c719661a2dc50b3a1dcfbc871e5c27e3d7260f6fa589e40000b89db451ff994845f6b49c12e89291398bcb3c06ef1289f74e0b0e2cab592d35f82a69e72842230b3076e8e852f6efafd8a171c616b1f0fee6c4711d7aecb69746064d2c096554975d605ebebf3d5cf32a9a09915ae3f3d4eb96615d7b237da56cd5e9904a19e145f25b6d98eb2c019967f553b61d0e80d6913cee9f8d18469a654a239a8fa85debbc02846ac5791278f18c6759e3b513a68284d2efc30587e433431b2896a3bd48020af67e9ac071b2dd6dc3b9efae4ff03558fa619aea909c7f2416e7e7da1c51ccc7e6ac27412f728dc6d80da8adf317ca863ed683897321f8c8bb5a5d953d6783b7a06353ee496bbdff41bb8cbb4534df87756eb99e330253cf5d14aadaa4aa1a9648a38f"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 17:52:56 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20040054, 0x0, 0x0) 17:52:56 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20040054, 0x0, 0x0) 17:52:56 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8992, &(0x7f0000001780)='\x86v$)\xec:W\x1apLbD\xc0\xfeh\xa6L^\xab\x1c\x8f?\x9c\xd4kl\xfb\xd4\xe3\be\xa1\xfaS\x9a\xdf_(\x1b\xba\xec\xde4\xbf\x8b\xc5\x83\xdaA$\xe0\x8f\xfbi\x7f\xfb\xe0RP\x94\x00\x8eO\x01\xc0`\x1b\xaag\x0e\vA\n\x82\xb0\xfe\xebQ\x12\xe4c\xda\x93\xfd \x01\x1c\xf1M\xa0\x1c \xedM\x9d\x10\xa4\x12\xe5\xa2z\x9d\xa44gC~1\xb0\x87\xc6\xe3)\x87\x10\xd5\x1a#\x93T\xdfB') 17:52:56 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20040054, 0x0, 0x0) 17:52:56 executing program 4: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 17:52:56 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 17:52:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 17:52:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 17:52:56 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8992, &(0x7f0000001780)='\x86v$)\xec:W\x1apLbD\xc0\xfeh\xa6L^\xab\x1c\x8f?\x9c\xd4kl\xfb\xd4\xe3\be\xa1\xfaS\x9a\xdf_(\x1b\xba\xec\xde4\xbf\x8b\xc5\x83\xdaA$\xe0\x8f\xfbi\x7f\xfb\xe0RP\x94\x00\x8eO\x01\xc0`\x1b\xaag\x0e\vA\n\x82\xb0\xfe\xebQ\x12\xe4c\xda\x93\xfd \x01\x1c\xf1M\xa0\x1c \xedM\x9d\x10\xa4\x12\xe5\xa2z\x9d\xa44gC~1\xb0\x87\xc6\xe3)\x87\x10\xd5\x1a#\x93T\xdfB') 17:52:56 executing program 3: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 17:52:56 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 17:52:56 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 17:52:56 executing program 3: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03076044238cb89e14f008001be0ffff00004000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) 17:52:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 17:52:56 executing program 4: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 17:52:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 17:52:56 executing program 4: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 17:52:56 executing program 3: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 17:52:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 17:52:56 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 17:52:57 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 17:52:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad403e850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='global_dirty_state\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) 17:52:57 executing program 4: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 17:52:57 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x1, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) 17:52:57 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x1, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) 17:52:57 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x1, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) 17:52:57 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x1, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) 17:52:57 executing program 5: r0 = syz_io_uring_setup(0x66b7, &(0x7f0000000340), &(0x7f0000196000/0x2000)=nil, &(0x7f0000193000/0x4000)=nil, &(0x7f0000000240), &(0x7f00000004c0)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xc, 0x0, 0x0) 17:52:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), r1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x14, r2, 0x519}, 0x14}}, 0x0) 17:52:57 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xcb, 0x0, 0x0) 17:52:57 executing program 0: unshare(0x2a000400) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x20000000, 0x10000003, 0x2}) 17:52:57 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xcb, 0x0, 0x0) 17:52:57 executing program 5: r0 = syz_io_uring_setup(0x66b7, &(0x7f0000000340), &(0x7f0000196000/0x2000)=nil, &(0x7f0000193000/0x4000)=nil, &(0x7f0000000240), &(0x7f00000004c0)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xc, 0x0, 0x0) [ 65.515373][ T24] kauditd_printk_skb: 588 callbacks suppressed [ 65.515386][ T24] audit: type=1400 audit(1652032377.316:762): avc: denied { create } for pid=4421 comm="syz-executor.5" dev="anon_inodefs" ino=22419 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 17:52:57 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xcb, 0x0, 0x0) 17:52:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), r1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x14, r2, 0x519}, 0x14}}, 0x0) 17:52:57 executing program 4: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e0700897a74a0091ff1100213cc04c7867a4e1a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6148ba532e6ea09c346dfebd38608b32800800000000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae1bd4f4390af9a9ceafd07ed00b0000002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f979ca9857399537f5dc2acb72c7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9624d37c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b40000000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b60c2499d5d16d7d9158ffffffff00000000ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b2042b8ff8c21ad702cca54728acad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd20785f653b621491dc6aaee0d40973109644fb94c06006e3c1be2f633c1d987591ec3db58a7bb3042ec3f771f7abd19a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e1590bab105b0cb578af7dc7d5e87d48d376444e2de02f47c61e8e84ff828de453f34c2b08660b080efc7eae676e1fb4d5865c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f47ffb966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d3676329bb8cda690d192a070886df42b2708398773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169cdfaa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c30930804fdc3690d10ecb65dc5b47481edbf1eee2e8893e903054d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf817becd9e5a225d67521d1128eac7d80a5656ac2cbde21d3ea9bf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f324661fdcfa68f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986bf56c747d9a1cc500bb892c3a16ff10feea20bdac89bfb758cf35401c7b9eb9ae358028ab"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 17:52:57 executing program 0: unshare(0x2a000400) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x20000000, 0x10000003, 0x2}) 17:52:57 executing program 5: r0 = syz_io_uring_setup(0x66b7, &(0x7f0000000340), &(0x7f0000196000/0x2000)=nil, &(0x7f0000193000/0x4000)=nil, &(0x7f0000000240), &(0x7f00000004c0)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xc, 0x0, 0x0) [ 65.578229][ T24] audit: type=1400 audit(1652032377.316:763): avc: denied { map } for pid=4421 comm="syz-executor.5" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22419 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 65.602689][ T24] audit: type=1400 audit(1652032377.316:764): avc: denied { read write } for pid=4421 comm="syz-executor.5" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22419 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 17:52:57 executing program 1: r0 = syz_io_uring_setup(0x66b7, &(0x7f0000000340), &(0x7f0000196000/0x2000)=nil, &(0x7f0000193000/0x4000)=nil, &(0x7f0000000240), &(0x7f00000004c0)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xc, 0x0, 0x0) 17:52:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), r1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x14, r2, 0x519}, 0x14}}, 0x0) 17:52:57 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xcb, 0x0, 0x0) 17:52:57 executing program 0: unshare(0x2a000400) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x20000000, 0x10000003, 0x2}) 17:52:57 executing program 5: r0 = syz_io_uring_setup(0x66b7, &(0x7f0000000340), &(0x7f0000196000/0x2000)=nil, &(0x7f0000193000/0x4000)=nil, &(0x7f0000000240), &(0x7f00000004c0)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xc, 0x0, 0x0) 17:52:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000280)={0x2, 0x18, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@remote, @in=@remote}}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0xc0}}, 0x0) 17:52:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), r1) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x14, r2, 0x519}, 0x14}}, 0x0) 17:52:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x2, &(0x7f0000000340)=@raw=[@jmp={0x5, 0x0, 0xd, 0xa}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}], &(0x7f0000000140)='syzkaller\x00', 0x4, 0xbc, &(0x7f0000000180)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000280)={0x2, 0x18, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@remote, @in=@remote}}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0xc0}}, 0x0) [ 65.721574][ T24] audit: type=1400 audit(1652032377.526:765): avc: denied { create } for pid=4449 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 17:52:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000280)={0x2, 0x18, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@remote, @in=@remote}}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0xc0}}, 0x0) 17:52:57 executing program 0: unshare(0x2a000400) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x20000000, 0x10000003, 0x2}) 17:52:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x103182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 17:52:57 executing program 1: r0 = syz_io_uring_setup(0x66b7, &(0x7f0000000340), &(0x7f0000196000/0x2000)=nil, &(0x7f0000193000/0x4000)=nil, &(0x7f0000000240), &(0x7f00000004c0)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xc, 0x0, 0x0) 17:52:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x2, &(0x7f0000000340)=@raw=[@jmp={0x5, 0x0, 0xd, 0xa}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}], &(0x7f0000000140)='syzkaller\x00', 0x4, 0xbc, &(0x7f0000000180)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:57 executing program 4: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x400000000009) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) 17:52:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x2, &(0x7f0000000340)=@raw=[@jmp={0x5, 0x0, 0xd, 0xa}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}], &(0x7f0000000140)='syzkaller\x00', 0x4, 0xbc, &(0x7f0000000180)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000280)={0x2, 0x18, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@remote, @in=@remote}}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0xc0}}, 0x0) [ 65.783600][ T24] audit: type=1400 audit(1652032377.526:766): avc: denied { write } for pid=4449 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 17:52:57 executing program 0: bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) 17:52:57 executing program 1: r0 = syz_io_uring_setup(0x66b7, &(0x7f0000000340), &(0x7f0000196000/0x2000)=nil, &(0x7f0000193000/0x4000)=nil, &(0x7f0000000240), &(0x7f00000004c0)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xc, 0x0, 0x0) 17:52:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x2, &(0x7f0000000340)=@raw=[@jmp={0x5, 0x0, 0xd, 0xa}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}], &(0x7f0000000140)='syzkaller\x00', 0x4, 0xbc, &(0x7f0000000180)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:52:57 executing program 3: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) 17:52:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x103182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 17:52:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x103182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 17:52:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002700)={&(0x7f0000002640)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x38}}, 0x0) 17:52:57 executing program 3: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) 17:52:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002700)={&(0x7f0000002640)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x38}}, 0x0) 17:52:57 executing program 4: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x400000000009) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) 17:52:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002700)={&(0x7f0000002640)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x38}}, 0x0) 17:52:57 executing program 3: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) 17:52:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x103182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 17:52:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x103182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 17:52:57 executing program 0: bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) 17:52:57 executing program 0: bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) 17:52:57 executing program 3: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) 17:52:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002700)={&(0x7f0000002640)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x38}}, 0x0) 17:52:57 executing program 2: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x400000000009) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) 17:52:57 executing program 3: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x400000000009) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) 17:52:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x103182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 17:52:58 executing program 4: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x400000000009) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) 17:52:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x103182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 17:52:58 executing program 5: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) 17:52:58 executing program 0: bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) 17:52:58 executing program 0: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) 17:52:58 executing program 5: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) 17:52:58 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) 17:52:58 executing program 3: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x400000000009) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) 17:52:58 executing program 2: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x400000000009) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) 17:52:58 executing program 5: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) 17:52:58 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) 17:52:58 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) 17:52:58 executing program 4: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x400000000009) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) 17:52:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x10}, 0x10}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="5000000024000b1d000800800000000000000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000003000d00010066715f636f64656c"], 0x50}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@newtfilter={0x17c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x7}}, [@filter_kind_options=@f_flow={{0x9}, {0x14c, 0x2, [@TCA_FLOW_ACT={0x148, 0x9, 0x0, 0x1, [@m_simple={0x144, 0x1, 0x0, 0x0, {{0xb}, {0x118, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x114, 0x3, 'uH2\x10\x832{\xb8:\x94\xdf\xa0\xebH!\x00\xa6\xbePL\xdf`YQ\xf8b\xbdJ\xa4\x820\xf2\t#Y\x92\xa9\x93Er\xd9\xca|\x04\x7f\xf0\xf3\xf520[\x14\xc71U\'\x0e\xd4\xa3\x0fj*\xc1Q\x87jKg\x06%k\x9a\"[\xe9\x9cK\x9c\x01\xa5\xe7=Of]@\x01\xeb\xae\\r\xd5X3\xab\xa3\x93<\x96\x87\x1f!S\xe1\xa2/_\xda\xeb@q\xe2\x19\x9f\xd8\\\xb3\x9d\xca\xc1\xda\xbf/\xd6;\xd8-Q\x171y\x15\x81;\xb4\x1c\x8e\xb7\xf6\v\x94\xba\xbd\xf6\x03\x9c\f>\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb5\xb6\xc8\x91:\x8a5\x11\xe0\xce\x00Q\x7fa\xbf\x12\x1c\xac\xf5\xa0\xd9\xea5\xa6U-\x92\xc1\xe4\xf6\xeb\xe4\xcf|\xc9\xbb\xc3X\x91Jj#\x95\x01\xf1m_\a\x13\xd3\xb0;\x9a\xea\x7fC\xf0\x10R7\xcb\"a\xaa\x0fecO\x154\xacd\xf7{\xd2\x0e\xec\xe7_\xb3\ns\xf7\xf2\xc0\xa4\x1c\xe1\xd69|&\x836\xf0\x83I\x0e[\x9e\xb2\xd7T\xdco\xb8O'}]}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x17c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 17:52:58 executing program 0: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) 17:52:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000f12000)={0x400000010, 0x0, 0x0, 0x70a1}, 0xc) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f0000000080)=0x47) 17:52:58 executing program 0: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) fcntl$setown(r0, 0x8, r2) creat(&(0x7f0000000580)='./file0\x00', 0x0) [ 66.690937][ T24] audit: type=1400 audit(1652032378.496:767): avc: denied { create } for pid=4552 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 66.691504][ T4558] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=4558 comm=syz-executor.5 17:52:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x1d}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) socket$inet6(0xa, 0x2, 0x0) [ 66.724943][ T24] audit: type=1400 audit(1652032378.536:768): avc: denied { append } for pid=1423 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 66.747222][ T24] audit: type=1400 audit(1652032378.536:769): avc: denied { open } for pid=1423 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 66.749750][ T4558] __nla_validate_parse: 16 callbacks suppressed [ 66.749762][ T4558] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 17:52:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000f12000)={0x400000010, 0x0, 0x0, 0x70a1}, 0xc) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f0000000080)=0x47) [ 66.769649][ T24] audit: type=1400 audit(1652032378.536:770): avc: denied { getattr } for pid=1423 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 66.778572][ T24] audit: type=1400 audit(1652032378.536:771): avc: denied { bind } for pid=4552 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 66.830356][ T4561] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 17:52:58 executing program 3: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x400000000009) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) 17:52:58 executing program 2: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x400000000009) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1cdb42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) 17:52:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000f12000)={0x400000010, 0x0, 0x0, 0x70a1}, 0xc) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f0000000080)=0x47) 17:52:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x1d}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) socket$inet6(0xa, 0x2, 0x0) 17:52:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x10}, 0x10}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="5000000024000b1d000800800000000000000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000003000d00010066715f636f64656c"], 0x50}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@newtfilter={0x17c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x7}}, [@filter_kind_options=@f_flow={{0x9}, {0x14c, 0x2, [@TCA_FLOW_ACT={0x148, 0x9, 0x0, 0x1, [@m_simple={0x144, 0x1, 0x0, 0x0, {{0xb}, {0x118, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x114, 0x3, 'uH2\x10\x832{\xb8:\x94\xdf\xa0\xebH!\x00\xa6\xbePL\xdf`YQ\xf8b\xbdJ\xa4\x820\xf2\t#Y\x92\xa9\x93Er\xd9\xca|\x04\x7f\xf0\xf3\xf520[\x14\xc71U\'\x0e\xd4\xa3\x0fj*\xc1Q\x87jKg\x06%k\x9a\"[\xe9\x9cK\x9c\x01\xa5\xe7=Of]@\x01\xeb\xae\\r\xd5X3\xab\xa3\x93<\x96\x87\x1f!S\xe1\xa2/_\xda\xeb@q\xe2\x19\x9f\xd8\\\xb3\x9d\xca\xc1\xda\xbf/\xd6;\xd8-Q\x171y\x15\x81;\xb4\x1c\x8e\xb7\xf6\v\x94\xba\xbd\xf6\x03\x9c\f>\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb5\xb6\xc8\x91:\x8a5\x11\xe0\xce\x00Q\x7fa\xbf\x12\x1c\xac\xf5\xa0\xd9\xea5\xa6U-\x92\xc1\xe4\xf6\xeb\xe4\xcf|\xc9\xbb\xc3X\x91Jj#\x95\x01\xf1m_\a\x13\xd3\xb0;\x9a\xea\x7fC\xf0\x10R7\xcb\"a\xaa\x0fecO\x154\xacd\xf7{\xd2\x0e\xec\xe7_\xb3\ns\xf7\xf2\xc0\xa4\x1c\xe1\xd69|&\x836\xf0\x83I\x0e[\x9e\xb2\xd7T\xdco\xb8O'}]}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x17c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) [ 66.913397][ T4575] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=4575 comm=syz-executor.5 [ 66.933679][ T4575] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 66.956700][ T4575] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 66.985184][ T4555] ================================================================== [ 66.993266][ T4555] BUG: KCSAN: data-race in ext4_mark_iloc_dirty / ext4_mark_iloc_dirty [ 67.001488][ T4555] [ 67.003796][ T4555] write to 0xffff88812393d5a8 of 4 bytes by task 4577 on cpu 1: [ 67.011424][ T4555] ext4_mark_iloc_dirty+0x75d/0x860 [ 67.016606][ T4555] ext4_orphan_del+0x583/0x6f0 [ 67.021350][ T4555] ext4_file_write_iter+0x1020/0x1210 [ 67.026711][ T4555] do_iter_readv_writev+0x27b/0x300 [ 67.031900][ T4555] do_iter_write+0x16f/0x5c0 [ 67.036470][ T4555] vfs_iter_write+0x4c/0x70 [ 67.040960][ T4555] iter_file_splice_write+0x44a/0x7c0 [ 67.046316][ T4555] direct_splice_actor+0x80/0xa0 [ 67.051245][ T4555] splice_direct_to_actor+0x345/0x660 [ 67.056607][ T4555] do_splice_direct+0xfb/0x180 [ 67.061362][ T4555] do_sendfile+0x3ad/0x900 [ 67.065757][ T4555] __x64_sys_sendfile64+0x10c/0x150 [ 67.070953][ T4555] do_syscall_64+0x2b/0x70 [ 67.075354][ T4555] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 67.081230][ T4555] [ 67.083530][ T4555] write to 0xffff88812393d5a8 of 4 bytes by task 4555 on cpu 0: [ 67.091132][ T4555] ext4_mark_iloc_dirty+0x75d/0x860 [ 67.096317][ T4555] __ext4_mark_inode_dirty+0x452/0x610 [ 67.101772][ T4555] ext4_file_write_iter+0xedb/0x1210 [ 67.107042][ T4555] do_iter_readv_writev+0x27b/0x300 [ 67.112224][ T4555] do_iter_write+0x16f/0x5c0 [ 67.116791][ T4555] vfs_iter_write+0x4c/0x70 [ 67.121271][ T4555] iter_file_splice_write+0x44a/0x7c0 [ 67.126639][ T4555] direct_splice_actor+0x80/0xa0 [ 67.131569][ T4555] splice_direct_to_actor+0x345/0x660 [ 67.136915][ T4555] do_splice_direct+0xfb/0x180 [ 67.141654][ T4555] do_sendfile+0x3ad/0x900 [ 67.146043][ T4555] __x64_sys_sendfile64+0x10c/0x150 [ 67.151215][ T4555] do_syscall_64+0x2b/0x70 [ 67.155610][ T4555] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 67.161486][ T4555] [ 67.163793][ T4555] value changed: 0x000001e6 -> 0x000001e7 [ 67.169483][ T4555] [ 67.171788][ T4555] Reported by Kernel Concurrency Sanitizer on: 17:52:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x1d}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) socket$inet6(0xa, 0x2, 0x0) 17:52:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000f12000)={0x400000010, 0x0, 0x0, 0x70a1}, 0xc) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f0000000080)=0x47) 17:52:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x10}, 0x10}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="5000000024000b1d000800800000000000000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000003000d00010066715f636f64656c"], 0x50}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@newtfilter={0x17c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x7}}, [@filter_kind_options=@f_flow={{0x9}, {0x14c, 0x2, [@TCA_FLOW_ACT={0x148, 0x9, 0x0, 0x1, [@m_simple={0x144, 0x1, 0x0, 0x0, {{0xb}, {0x118, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x114, 0x3, 'uH2\x10\x832{\xb8:\x94\xdf\xa0\xebH!\x00\xa6\xbePL\xdf`YQ\xf8b\xbdJ\xa4\x820\xf2\t#Y\x92\xa9\x93Er\xd9\xca|\x04\x7f\xf0\xf3\xf520[\x14\xc71U\'\x0e\xd4\xa3\x0fj*\xc1Q\x87jKg\x06%k\x9a\"[\xe9\x9cK\x9c\x01\xa5\xe7=Of]@\x01\xeb\xae\\r\xd5X3\xab\xa3\x93<\x96\x87\x1f!S\xe1\xa2/_\xda\xeb@q\xe2\x19\x9f\xd8\\\xb3\x9d\xca\xc1\xda\xbf/\xd6;\xd8-Q\x171y\x15\x81;\xb4\x1c\x8e\xb7\xf6\v\x94\xba\xbd\xf6\x03\x9c\f>\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb5\xb6\xc8\x91:\x8a5\x11\xe0\xce\x00Q\x7fa\xbf\x12\x1c\xac\xf5\xa0\xd9\xea5\xa6U-\x92\xc1\xe4\xf6\xeb\xe4\xcf|\xc9\xbb\xc3X\x91Jj#\x95\x01\xf1m_\a\x13\xd3\xb0;\x9a\xea\x7fC\xf0\x10R7\xcb\"a\xaa\x0fecO\x154\xacd\xf7{\xd2\x0e\xec\xe7_\xb3\ns\xf7\xf2\xc0\xa4\x1c\xe1\xd69|&\x836\xf0\x83I\x0e[\x9e\xb2\xd7T\xdco\xb8O'}]}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x17c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) [ 67.178002][ T4555] CPU: 0 PID: 4555 Comm: syz-executor.4 Not tainted 5.18.0-rc5-syzkaller-00207-g379c72654524 #0 [ 67.188414][ T4555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.198446][ T4555] ================================================================== 17:52:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x1d}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) socket$inet6(0xa, 0x2, 0x0) 17:52:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x1d}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) socket$inet6(0xa, 0x2, 0x0) 17:52:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000f12000)={0x400000010, 0x0, 0x0, 0x70a1}, 0xc) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f0000000080)=0x47) 17:52:59 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) [ 67.244004][ T4587] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=4587 comm=syz-executor.5 [ 67.282801][ T4587] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 17:52:59 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x2, 0x6, 0x5f8, 0xd0, 0x310, 0x310, 0xd0, 0x1b0, 0x528, 0x528, 0x528, 0x528, 0x528, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0, 0x0, {0x7a00000000000310}}, @HL={0x28}}, {{@ipv6={@dev, @private0, [], [], 'syzkaller0\x00', 'team_slave_1\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], '\x00', 'bond_slave_0\x00'}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @empty}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@eui64={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x658) 17:52:59 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 17:52:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x10}, 0x10}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="5000000024000b1d000800800000000000000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000003000d00010066715f636f64656c"], 0x50}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@newtfilter={0x17c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x7}}, [@filter_kind_options=@f_flow={{0x9}, {0x14c, 0x2, [@TCA_FLOW_ACT={0x148, 0x9, 0x0, 0x1, [@m_simple={0x144, 0x1, 0x0, 0x0, {{0xb}, {0x118, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x114, 0x3, 'uH2\x10\x832{\xb8:\x94\xdf\xa0\xebH!\x00\xa6\xbePL\xdf`YQ\xf8b\xbdJ\xa4\x820\xf2\t#Y\x92\xa9\x93Er\xd9\xca|\x04\x7f\xf0\xf3\xf520[\x14\xc71U\'\x0e\xd4\xa3\x0fj*\xc1Q\x87jKg\x06%k\x9a\"[\xe9\x9cK\x9c\x01\xa5\xe7=Of]@\x01\xeb\xae\\r\xd5X3\xab\xa3\x93<\x96\x87\x1f!S\xe1\xa2/_\xda\xeb@q\xe2\x19\x9f\xd8\\\xb3\x9d\xca\xc1\xda\xbf/\xd6;\xd8-Q\x171y\x15\x81;\xb4\x1c\x8e\xb7\xf6\v\x94\xba\xbd\xf6\x03\x9c\f>\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb5\xb6\xc8\x91:\x8a5\x11\xe0\xce\x00Q\x7fa\xbf\x12\x1c\xac\xf5\xa0\xd9\xea5\xa6U-\x92\xc1\xe4\xf6\xeb\xe4\xcf|\xc9\xbb\xc3X\x91Jj#\x95\x01\xf1m_\a\x13\xd3\xb0;\x9a\xea\x7fC\xf0\x10R7\xcb\"a\xaa\x0fecO\x154\xacd\xf7{\xd2\x0e\xec\xe7_\xb3\ns\xf7\xf2\xc0\xa4\x1c\xe1\xd69|&\x836\xf0\x83I\x0e[\x9e\xb2\xd7T\xdco\xb8O'}]}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x17c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 17:52:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000f12000)={0x400000010, 0x0, 0x0, 0x70a1}, 0xc) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f0000000080)=0x47) 17:52:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x1d}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) socket$inet6(0xa, 0x2, 0x0) 17:52:59 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$inet_int(r0, 0x10d, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 67.318884][ T4587] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 17:52:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000f12000)={0x400000010, 0x0, 0x0, 0x70a1}, 0xc) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00005c6000)=""/6, &(0x7f0000000080)=0x47) 17:52:59 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 17:52:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x1d}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) socket$inet6(0xa, 0x2, 0x0) 17:52:59 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 17:52:59 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x7db4a73d, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a00)={0x0, &(0x7f0000001980)=""/96, 0x0, 0x60}, 0x20) 17:52:59 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=@known='security.selinux\x00', &(0x7f0000000640)='\x00\x00\x00\x00\x00', 0x5, 0x0) [ 67.386011][ T4606] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=4606 comm=syz-executor.5 [ 67.390501][ T4607] Cannot find map_set index 0 as target [ 67.407272][ T4609] do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 17:52:59 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x2, 0x6, 0x5f8, 0xd0, 0x310, 0x310, 0xd0, 0x1b0, 0x528, 0x528, 0x528, 0x528, 0x528, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0, 0x0, {0x7a00000000000310}}, @HL={0x28}}, {{@ipv6={@dev, @private0, [], [], 'syzkaller0\x00', 'team_slave_1\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], '\x00', 'bond_slave_0\x00'}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @empty}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@eui64={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x658) 17:52:59 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x7db4a73d, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a00)={0x0, &(0x7f0000001980)=""/96, 0x0, 0x60}, 0x20) 17:52:59 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$inet_int(r0, 0x10d, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 17:52:59 executing program 1: r0 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x83) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_FALLOCATE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x4000)=nil, 0x4000}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x1000)=nil, 0x1000}, 0x0) io_uring_enter(r0, 0x409e, 0x0, 0x0, 0x0, 0x0) [ 67.458045][ T4606] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 67.471327][ T4621] SELinux: Context is not valid (left unmapped). [ 67.491061][ T4628] Cannot find map_set index 0 as target 17:52:59 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x2, 0x6, 0x5f8, 0xd0, 0x310, 0x310, 0xd0, 0x1b0, 0x528, 0x528, 0x528, 0x528, 0x528, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0, 0x0, {0x7a00000000000310}}, @HL={0x28}}, {{@ipv6={@dev, @private0, [], [], 'syzkaller0\x00', 'team_slave_1\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], '\x00', 'bond_slave_0\x00'}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @empty}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@eui64={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x658) 17:52:59 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=@known='security.selinux\x00', &(0x7f0000000640)='\x00\x00\x00\x00\x00', 0x5, 0x0) 17:52:59 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x7db4a73d, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a00)={0x0, &(0x7f0000001980)=""/96, 0x0, 0x60}, 0x20) 17:52:59 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$inet_int(r0, 0x10d, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 17:52:59 executing program 1: r0 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x83) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_FALLOCATE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x4000)=nil, 0x4000}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x1000)=nil, 0x1000}, 0x0) io_uring_enter(r0, 0x409e, 0x0, 0x0, 0x0, 0x0) [ 67.502874][ T4627] do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app [ 67.526608][ T4630] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 17:52:59 executing program 5: r0 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x83) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_FALLOCATE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x4000)=nil, 0x4000}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x1000)=nil, 0x1000}, 0x0) io_uring_enter(r0, 0x409e, 0x0, 0x0, 0x0, 0x0) 17:52:59 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x7db4a73d, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a00)={0x0, &(0x7f0000001980)=""/96, 0x0, 0x60}, 0x20) 17:52:59 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=@known='security.selinux\x00', &(0x7f0000000640)='\x00\x00\x00\x00\x00', 0x5, 0x0) 17:52:59 executing program 1: r0 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x83) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_FALLOCATE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x4000)=nil, 0x4000}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x1000)=nil, 0x1000}, 0x0) io_uring_enter(r0, 0x409e, 0x0, 0x0, 0x0, 0x0) 17:52:59 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$inet_int(r0, 0x10d, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 17:52:59 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x2, 0x6, 0x5f8, 0xd0, 0x310, 0x310, 0xd0, 0x1b0, 0x528, 0x528, 0x528, 0x528, 0x528, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0, 0x0, {0x7a00000000000310}}, @HL={0x28}}, {{@ipv6={@dev, @private0, [], [], 'syzkaller0\x00', 'team_slave_1\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @remote, [], [], '\x00', 'bond_slave_0\x00'}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback, @empty}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@eui64={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x658) 17:52:59 executing program 0: r0 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x83) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_FALLOCATE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x4000)=nil, 0x4000}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x1000)=nil, 0x1000}, 0x0) io_uring_enter(r0, 0x409e, 0x0, 0x0, 0x0, 0x0) [ 67.561243][ T4637] do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app [ 67.576196][ T4640] Cannot find map_set index 0 as target 17:52:59 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=@known='security.selinux\x00', &(0x7f0000000640)='\x00\x00\x00\x00\x00', 0x5, 0x0) 17:52:59 executing program 5: r0 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x83) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_FALLOCATE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x4000)=nil, 0x4000}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x1000)=nil, 0x1000}, 0x0) io_uring_enter(r0, 0x409e, 0x0, 0x0, 0x0, 0x0) 17:52:59 executing program 1: r0 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x83) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_FALLOCATE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x4000)=nil, 0x4000}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x1000)=nil, 0x1000}, 0x0) io_uring_enter(r0, 0x409e, 0x0, 0x0, 0x0, 0x0) 17:52:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}]}, 0x28}}, 0x0) socket$packet(0x11, 0x0, 0x300) 17:52:59 executing program 0: r0 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x83) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_FALLOCATE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x4000)=nil, 0x4000}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x1000)=nil, 0x1000}, 0x0) io_uring_enter(r0, 0x409e, 0x0, 0x0, 0x0, 0x0) 17:52:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x5}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r0, 0x5}, 0x10) 17:52:59 executing program 3: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='./file0\x00') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00', 0x0, 0x0) 17:52:59 executing program 5: r0 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x83) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_FALLOCATE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x4000)=nil, 0x4000}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x1000)=nil, 0x1000}, 0x0) io_uring_enter(r0, 0x409e, 0x0, 0x0, 0x0, 0x0) [ 67.630810][ T4653] Cannot find map_set index 0 as target [ 67.637762][ T4654] do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 17:52:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{}]}]}}, &(0x7f0000000400)=""/225, 0x2e, 0xe1, 0x1}, 0x20) 17:52:59 executing program 0: r0 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x83) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_FALLOCATE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x4000)=nil, 0x4000}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000180)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_setup(0x184, &(0x7f00000002c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000dc000/0x1000)=nil, 0x1000}, 0x0) io_uring_enter(r0, 0x409e, 0x0, 0x0, 0x0, 0x0) 17:52:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="b4050000200080006110600000000000c60000000000000095000000000000009f33ef6091a06b633c1eeb0be2566cd0723043c47c896ce0bce66a245ad99b817fd98cd824498949714ffaac8a6f77ef26dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb2c5ca683a4b6fc89ffff2b9000f224891060017cfa6fa26fa7a34700458c60897d4a6148a1c11428607c40de60beac671e8e8fdecb03588aa623fa71f871ab5c2ff88a000002084e5b52710aeee835cf0d78e45f70983826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632fd30bf05121438bb74e4670ab5dfe447a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffb426e1230bc1cd4c024460ceb44276e9bd94d1c2bbfcfd78a9f3fdc1f50c445e3f30e703cf05b90fbf940e6652d37747f834f816f66ac3027460ae991e7f834d8b5bfc2a7003d1a6cf5478533584961c329fcf4fed5c9455640dcd28273dc9753cc979113f2915a3039c3ca60ec53bb1130c2d27fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc5117"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x5}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r0, 0x5}, 0x10) 17:52:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{}]}]}}, &(0x7f0000000400)=""/225, 0x2e, 0xe1, 0x1}, 0x20) 17:52:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}]}, 0x28}}, 0x0) socket$packet(0x11, 0x0, 0x300) 17:52:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x5}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r0, 0x5}, 0x10) 17:52:59 executing program 3: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='./file0\x00') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00', 0x0, 0x0) 17:52:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x5}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r0, 0x5}, 0x10) 17:52:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x5}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r0, 0x5}, 0x10) 17:52:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}]}, 0x28}}, 0x0) socket$packet(0x11, 0x0, 0x300) 17:52:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="b4050000200080006110600000000000c60000000000000095000000000000009f33ef6091a06b633c1eeb0be2566cd0723043c47c896ce0bce66a245ad99b817fd98cd824498949714ffaac8a6f77ef26dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb2c5ca683a4b6fc89ffff2b9000f224891060017cfa6fa26fa7a34700458c60897d4a6148a1c11428607c40de60beac671e8e8fdecb03588aa623fa71f871ab5c2ff88a000002084e5b52710aeee835cf0d78e45f70983826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632fd30bf05121438bb74e4670ab5dfe447a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffb426e1230bc1cd4c024460ceb44276e9bd94d1c2bbfcfd78a9f3fdc1f50c445e3f30e703cf05b90fbf940e6652d37747f834f816f66ac3027460ae991e7f834d8b5bfc2a7003d1a6cf5478533584961c329fcf4fed5c9455640dcd28273dc9753cc979113f2915a3039c3ca60ec53bb1130c2d27fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc5117"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x5}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r0, 0x5}, 0x10) 17:52:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="b4050000200080006110600000000000c60000000000000095000000000000009f33ef6091a06b633c1eeb0be2566cd0723043c47c896ce0bce66a245ad99b817fd98cd824498949714ffaac8a6f77ef26dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb2c5ca683a4b6fc89ffff2b9000f224891060017cfa6fa26fa7a34700458c60897d4a6148a1c11428607c40de60beac671e8e8fdecb03588aa623fa71f871ab5c2ff88a000002084e5b52710aeee835cf0d78e45f70983826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632fd30bf05121438bb74e4670ab5dfe447a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffb426e1230bc1cd4c024460ceb44276e9bd94d1c2bbfcfd78a9f3fdc1f50c445e3f30e703cf05b90fbf940e6652d37747f834f816f66ac3027460ae991e7f834d8b5bfc2a7003d1a6cf5478533584961c329fcf4fed5c9455640dcd28273dc9753cc979113f2915a3039c3ca60ec53bb1130c2d27fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc5117"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x5}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r0, 0x5}, 0x10) 17:52:59 executing program 3: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='./file0\x00') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00', 0x0, 0x0) 17:52:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{}]}]}}, &(0x7f0000000400)=""/225, 0x2e, 0xe1, 0x1}, 0x20) 17:52:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4050000200080006110600000000000c60000000000000095000000000000009f33ef60916e6e893f1eeb0be2566cd0723043c47c896ce0bce66a245ad99b817fd98cd824498949714f82054d54d53cd2b6db714e4b94bdae210e52455c59f9869f1e2c5843f34fa68a0557eb2c5ca683a4b6fc89398f2b9000f224891060017cfa6fa26fa7a34700458c60897d4a6148a1c11428607c40de60beac671e8e8fdecb03588aa623fa71f871ab5c2ff88afc6002084e5b52710aeee835cf0d78e45f70983826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632fd30bf05121438bb74e4670ab5dfe4c7a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffb426e1230bc1cd4c02c460ceb44276e9bd94d1c2e6d17dc5c2edf332a62f5fe68fbbbbfcfd78a9f3fdc1f50c445e3f30e703cf05b90fbf940e6652d377474ed5f816f66ac3027460ae991e7f834dd7a7fc2a7003d1a6cf5478533584961c329fcf4fed5c9455640dcd28273dc9753cc979113f2915a3039c3ca60ec53bb1130c2d27fed7d67c440e23d130e51eea1e085bebabe7059de9cbf95117"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x5}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r0, 0x5}, 0x10) 17:52:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{}]}]}}, &(0x7f0000000400)=""/225, 0x2e, 0xe1, 0x1}, 0x20) 17:52:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}]}, 0x28}}, 0x0) socket$packet(0x11, 0x0, 0x300) 17:52:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x5}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r0, 0x5}, 0x10) 17:52:59 executing program 3: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='./file0\x00') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00', 0x0, 0x0) 17:52:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x5}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r0, 0x5}, 0x10) 17:52:59 executing program 4: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 17:52:59 executing program 1: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) 17:52:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x8f, 0x0) fcntl$setpipe(r3, 0x4, 0xfffffffffffffffd) close_range(r0, 0xffffffffffffffff, 0x0) 17:52:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x74, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x60, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8a}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x74}}, 0x0) 17:52:59 executing program 4: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 17:52:59 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 17:52:59 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 17:52:59 executing program 1: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) 17:52:59 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 17:52:59 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 17:52:59 executing program 1: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) 17:52:59 executing program 4: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 17:52:59 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 17:52:59 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) [ 67.906527][ T4717] tipc: Started in network mode [ 67.911427][ T4717] tipc: Node identity 00000000000000000000ffffac1e0004, cluster identity 4711 [ 67.920309][ T4717] tipc: Enabling of bearer rejected, failed to enable media 17:52:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x8f, 0x0) fcntl$setpipe(r3, 0x4, 0xfffffffffffffffd) close_range(r0, 0xffffffffffffffff, 0x0) 17:52:59 executing program 4: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 17:52:59 executing program 1: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) 17:52:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x74, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x60, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8a}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x74}}, 0x0) 17:52:59 executing program 5: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) 17:52:59 executing program 0: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) 17:52:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x8f, 0x0) fcntl$setpipe(r3, 0x4, 0xfffffffffffffffd) close_range(r0, 0xffffffffffffffff, 0x0) 17:52:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x8f, 0x0) fcntl$setpipe(r3, 0x4, 0xfffffffffffffffd) close_range(r0, 0xffffffffffffffff, 0x0) 17:52:59 executing program 0: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) 17:52:59 executing program 5: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) 17:52:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x74, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x60, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8a}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x74}}, 0x0) [ 68.029831][ T4748] tipc: Enabling of bearer rejected, failed to enable media 17:52:59 executing program 0: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) [ 68.082092][ T4763] tipc: Enabling of bearer rejected, failed to enable media 17:52:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x8f, 0x0) fcntl$setpipe(r3, 0x4, 0xfffffffffffffffd) close_range(r0, 0xffffffffffffffff, 0x0) 17:52:59 executing program 5: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) 17:52:59 executing program 0: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) 17:52:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x74, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x60, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8a}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x74}}, 0x0) 17:52:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x8f, 0x0) fcntl$setpipe(r3, 0x4, 0xfffffffffffffffd) close_range(r0, 0xffffffffffffffff, 0x0) 17:52:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x8f, 0x0) fcntl$setpipe(r3, 0x4, 0xfffffffffffffffd) close_range(r0, 0xffffffffffffffff, 0x0) 17:53:00 executing program 0: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) 17:53:00 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 17:53:00 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 0: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0xc8, 0x0, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000d1, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0xc8, 0x0, 0x4) 17:53:00 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) [ 68.170861][ T4776] tipc: Enabling of bearer rejected, failed to enable media 17:53:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x8f, 0x0) fcntl$setpipe(r3, 0x4, 0xfffffffffffffffd) close_range(r0, 0xffffffffffffffff, 0x0) 17:53:00 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 17:53:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x8f, 0x0) fcntl$setpipe(r3, 0x4, 0xfffffffffffffffd) close_range(r0, 0xffffffffffffffff, 0x0) 17:53:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x8f, 0x0) fcntl$setpipe(r3, 0x4, 0xfffffffffffffffd) close_range(r0, 0xffffffffffffffff, 0x0) 17:53:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x14e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) 17:53:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x8, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) readv(r1, &(0x7f0000002700)=[{&(0x7f0000001240)=""/193, 0xc1}], 0x1) 17:53:00 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x8, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) readv(r1, &(0x7f0000002700)=[{&(0x7f0000001240)=""/193, 0xc1}], 0x1) 17:53:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x8, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) readv(r1, &(0x7f0000002700)=[{&(0x7f0000001240)=""/193, 0xc1}], 0x1) 17:53:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x8, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) readv(r1, &(0x7f0000002700)=[{&(0x7f0000001240)=""/193, 0xc1}], 0x1) 17:53:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x8, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) readv(r1, &(0x7f0000002700)=[{&(0x7f0000001240)=""/193, 0xc1}], 0x1) 17:53:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x8, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) readv(r1, &(0x7f0000002700)=[{&(0x7f0000001240)=""/193, 0xc1}], 0x1) 17:53:00 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x8, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) readv(r1, &(0x7f0000002700)=[{&(0x7f0000001240)=""/193, 0xc1}], 0x1) 17:53:00 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = creat(0x0, 0x0) ftruncate(r3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x205000, 0x1000}, 0x20) socket(0x0, 0x2, 0x0) 17:53:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000600), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0xd, 0x1, ')&}+)[\'%\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}]}, 0x48}}, 0x0) 17:53:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000600), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0xd, 0x1, ')&}+)[\'%\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}]}, 0x48}}, 0x0) 17:53:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000600), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0xd, 0x1, ')&}+)[\'%\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}]}, 0x48}}, 0x0) 17:53:01 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000600), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0xd, 0x1, ')&}+)[\'%\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}]}, 0x48}}, 0x0) 17:53:01 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40187014, &(0x7f0000000100)={0xfffffffd}) 17:53:01 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40187014, &(0x7f0000000100)={0xfffffffd}) 17:53:01 executing program 3: set_mempolicy(0x3, &(0x7f00000000c0)=0xffff, 0x7) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x3c, r0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x2604c004) 17:53:01 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40187014, &(0x7f0000000100)={0xfffffffd}) 17:53:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x4, 0xc00, '\x00', [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, {0xffffffff}]}) 17:53:01 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x4c, 0x12, 0x99b315740c087a43, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0x400}}, 0x4c}}, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 17:53:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 17:53:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000100)={0x2, 0x18, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xfffe}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@private0, @in=@remote}}]}, 0x80}}, 0x0) 17:53:01 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40187014, &(0x7f0000000100)={0xfffffffd}) 17:53:01 executing program 3: set_mempolicy(0x3, &(0x7f00000000c0)=0xffff, 0x7) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x3c, r0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x2604c004) 17:53:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x4, 0xc00, '\x00', [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, {0xffffffff}]}) 17:53:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 17:53:01 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x4c, 0x12, 0x99b315740c087a43, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0x400}}, 0x4c}}, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 17:53:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x4, 0xc00, '\x00', [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, {0xffffffff}]}) 17:53:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000100)={0x2, 0x18, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xfffe}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@private0, @in=@remote}}]}, 0x80}}, 0x0) [ 69.396044][ T4932] IPVS: sync thread started: state = MASTER, mcast_ifn = vcan0, syncid = 0, id = 0 17:53:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 17:53:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x4, 0xc00, '\x00', [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, {0xffffffff}]}) 17:53:01 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x4c, 0x12, 0x99b315740c087a43, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0x400}}, 0x4c}}, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 17:53:01 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x4c, 0x12, 0x99b315740c087a43, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0x400}}, 0x4c}}, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 17:53:01 executing program 3: set_mempolicy(0x3, &(0x7f00000000c0)=0xffff, 0x7) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x3c, r0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x2604c004) 17:53:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 17:53:01 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x4c, 0x12, 0x99b315740c087a43, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0x400}}, 0x4c}}, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 17:53:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 17:53:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000100)={0x2, 0x18, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xfffe}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@private0, @in=@remote}}]}, 0x80}}, 0x0) 17:53:01 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x4c, 0x12, 0x99b315740c087a43, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0x400}}, 0x4c}}, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 17:53:01 executing program 3: set_mempolicy(0x3, &(0x7f00000000c0)=0xffff, 0x7) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x3c, r0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x2604c004) 17:53:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000100)={0x2, 0x18, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xfffe}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@private0, @in=@remote}}]}, 0x80}}, 0x0) 17:53:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 17:53:01 executing program 4: set_mempolicy(0x3, &(0x7f00000000c0)=0xffff, 0x7) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x3c, r0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x2604c004) 17:53:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2a, 0x0, 0x20000000) 17:53:01 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x24, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0xb, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_DATA={0x10, 0x5, 0x0, 0x1, [{0xa, 0x5, @random="248ca6d661e6"}]}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x3}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x5c}}, 0x0) 17:53:01 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x4c, 0x12, 0x99b315740c087a43, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0x400}}, 0x4c}}, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 17:53:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2a, 0x0, 0x20000000) 17:53:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 17:53:01 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x11, 0x3, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x107, 0x15, 0x0, 0x20000000) 17:53:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x24}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:53:01 executing program 4: set_mempolicy(0x3, &(0x7f00000000c0)=0xffff, 0x7) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x3c, r0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x2604c004) 17:53:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2a, 0x0, 0x20000000) 17:53:01 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x11, 0x3, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x107, 0x15, 0x0, 0x20000000) 17:53:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001400)=ANY=[@ANYBLOB="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