[ 5.808159][ T1476] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 12.049569][ T24] kauditd_printk_skb: 27 callbacks suppressed [ 12.049581][ T24] audit: type=1400 audit(1639753109.840:72): avc: denied { transition } for pid=1633 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.057496][ T24] audit: type=1400 audit(1639753109.840:73): avc: denied { write } for pid=1633 comm="sh" path="pipe:[14638]" dev="pipefs" ino=14638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 12.720071][ T1634] sshd (1634) used greatest stack depth: 11448 bytes left Warning: Permanently added '10.128.1.43' (ECDSA) to the list of known hosts. 2021/12/17 14:58:36 fuzzer started 2021/12/17 14:58:36 dialing manager at 10.128.0.163:44655 [ 18.667205][ T24] audit: type=1400 audit(1639753116.450:74): avc: denied { mounton } for pid=1804 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.670208][ T1804] cgroup: Unknown subsys name 'net' [ 18.690035][ T24] audit: type=1400 audit(1639753116.460:75): avc: denied { mount } for pid=1804 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.717346][ T24] audit: type=1400 audit(1639753116.480:76): avc: denied { unmount } for pid=1804 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.737223][ T1804] cgroup: Unknown subsys name 'devices' [ 18.742881][ T1804] cgroup: Unknown subsys name 'blkio' [ 18.830132][ T1804] cgroup: Unknown subsys name 'hugetlb' [ 18.835775][ T1804] cgroup: Unknown subsys name 'rlimit' 2021/12/17 14:58:36 syscalls: 2717 2021/12/17 14:58:36 code coverage: enabled 2021/12/17 14:58:36 comparison tracing: enabled 2021/12/17 14:58:36 extra coverage: enabled 2021/12/17 14:58:36 delay kcov mmap: mmap returned an invalid pointer 2021/12/17 14:58:36 setuid sandbox: enabled 2021/12/17 14:58:36 namespace sandbox: enabled 2021/12/17 14:58:36 Android sandbox: enabled 2021/12/17 14:58:36 fault injection: enabled 2021/12/17 14:58:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/12/17 14:58:36 net packet injection: enabled 2021/12/17 14:58:36 net device setup: enabled 2021/12/17 14:58:36 concurrency sanitizer: enabled 2021/12/17 14:58:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/12/17 14:58:36 USB emulation: /dev/raw-gadget does not exist 2021/12/17 14:58:36 hci packet injection: /dev/vhci does not exist 2021/12/17 14:58:36 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/12/17 14:58:36 802.15.4 emulation: enabled [ 18.930052][ T24] audit: type=1400 audit(1639753116.720:77): avc: denied { mounton } for pid=1804 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 18.954851][ T24] audit: type=1400 audit(1639753116.720:78): avc: denied { mount } for pid=1804 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 18.978128][ T24] audit: type=1400 audit(1639753116.720:79): avc: denied { create } for pid=1804 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 18.998657][ T24] audit: type=1400 audit(1639753116.720:80): avc: denied { write } for pid=1804 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 19.019009][ T24] audit: type=1400 audit(1639753116.720:81): avc: denied { read } for pid=1804 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2021/12/17 14:58:37 suppressing KCSAN reports in functions: 'do_select' 'jbd2_journal_dirty_metadata' 'generic_write_end' 'do_sys_poll' 'ext4_writepages' 'ext4_free_inodes_count' 'ext4_fill_raw_inode' 'detach_buf_split' 'step_into' 2021/12/17 14:58:37 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/17 14:58:37 fetching corpus: 46, signal 10758/14560 (executing program) 2021/12/17 14:58:37 fetching corpus: 96, signal 20042/25514 (executing program) 2021/12/17 14:58:37 fetching corpus: 146, signal 23945/31114 (executing program) 2021/12/17 14:58:37 fetching corpus: 196, signal 28170/36941 (executing program) 2021/12/17 14:58:37 fetching corpus: 246, signal 32108/42429 (executing program) 2021/12/17 14:58:37 fetching corpus: 295, signal 36696/48469 (executing program) 2021/12/17 14:58:37 fetching corpus: 345, signal 41394/54581 (executing program) 2021/12/17 14:58:37 fetching corpus: 395, signal 46600/60977 (executing program) 2021/12/17 14:58:37 fetching corpus: 445, signal 48721/64496 (executing program) 2021/12/17 14:58:37 fetching corpus: 495, signal 51838/68912 (executing program) 2021/12/17 14:58:38 fetching corpus: 544, signal 54530/72945 (executing program) 2021/12/17 14:58:38 fetching corpus: 594, signal 56735/76456 (executing program) 2021/12/17 14:58:38 fetching corpus: 642, signal 58722/79746 (executing program) 2021/12/17 14:58:38 fetching corpus: 692, signal 60551/82865 (executing program) 2021/12/17 14:58:38 fetching corpus: 742, signal 62295/85833 (executing program) 2021/12/17 14:58:38 fetching corpus: 790, signal 64120/88877 (executing program) 2021/12/17 14:58:38 fetching corpus: 840, signal 65477/91471 (executing program) 2021/12/17 14:58:38 fetching corpus: 888, signal 66729/93975 (executing program) 2021/12/17 14:58:38 fetching corpus: 938, signal 68244/96635 (executing program) 2021/12/17 14:58:38 fetching corpus: 988, signal 70450/99873 (executing program) 2021/12/17 14:58:38 fetching corpus: 1037, signal 71983/102551 (executing program) 2021/12/17 14:58:38 fetching corpus: 1087, signal 76622/107666 (executing program) 2021/12/17 14:58:38 fetching corpus: 1136, signal 77750/109929 (executing program) 2021/12/17 14:58:38 fetching corpus: 1185, signal 78856/112119 (executing program) 2021/12/17 14:58:38 fetching corpus: 1235, signal 79892/114263 (executing program) 2021/12/17 14:58:39 fetching corpus: 1285, signal 81262/116652 (executing program) 2021/12/17 14:58:39 fetching corpus: 1335, signal 83102/119371 (executing program) 2021/12/17 14:58:39 fetching corpus: 1385, signal 84572/121775 (executing program) 2021/12/17 14:58:39 fetching corpus: 1435, signal 86108/124183 (executing program) 2021/12/17 14:58:39 fetching corpus: 1485, signal 86837/125998 (executing program) 2021/12/17 14:58:39 fetching corpus: 1535, signal 88107/128150 (executing program) 2021/12/17 14:58:39 fetching corpus: 1585, signal 88904/130029 (executing program) 2021/12/17 14:58:39 fetching corpus: 1635, signal 89656/131798 (executing program) 2021/12/17 14:58:39 fetching corpus: 1685, signal 90849/133877 (executing program) 2021/12/17 14:58:39 fetching corpus: 1735, signal 92194/136069 (executing program) 2021/12/17 14:58:39 fetching corpus: 1785, signal 93478/138158 (executing program) 2021/12/17 14:58:39 fetching corpus: 1833, signal 94655/140149 (executing program) 2021/12/17 14:58:39 fetching corpus: 1881, signal 95827/142151 (executing program) 2021/12/17 14:58:39 fetching corpus: 1929, signal 96659/143902 (executing program) 2021/12/17 14:58:39 fetching corpus: 1977, signal 97535/145667 (executing program) 2021/12/17 14:58:40 fetching corpus: 2027, signal 98986/147753 (executing program) 2021/12/17 14:58:40 fetching corpus: 2077, signal 100258/149677 (executing program) 2021/12/17 14:58:40 fetching corpus: 2127, signal 101070/151322 (executing program) 2021/12/17 14:58:40 fetching corpus: 2177, signal 101604/152786 (executing program) 2021/12/17 14:58:40 fetching corpus: 2227, signal 102736/154589 (executing program) 2021/12/17 14:58:40 fetching corpus: 2277, signal 103361/156091 (executing program) 2021/12/17 14:58:40 fetching corpus: 2326, signal 105411/158452 (executing program) 2021/12/17 14:58:40 fetching corpus: 2376, signal 107129/160516 (executing program) 2021/12/17 14:58:40 fetching corpus: 2426, signal 108181/162222 (executing program) 2021/12/17 14:58:40 fetching corpus: 2476, signal 109554/164035 (executing program) 2021/12/17 14:58:40 fetching corpus: 2526, signal 110443/165596 (executing program) 2021/12/17 14:58:40 fetching corpus: 2576, signal 111105/167079 (executing program) 2021/12/17 14:58:40 fetching corpus: 2626, signal 112395/168880 (executing program) 2021/12/17 14:58:40 fetching corpus: 2674, signal 113223/170426 (executing program) 2021/12/17 14:58:40 fetching corpus: 2724, signal 113826/171757 (executing program) 2021/12/17 14:58:40 fetching corpus: 2774, signal 114553/173175 (executing program) 2021/12/17 14:58:41 fetching corpus: 2822, signal 115228/174566 (executing program) 2021/12/17 14:58:41 fetching corpus: 2872, signal 115656/175769 (executing program) 2021/12/17 14:58:41 fetching corpus: 2922, signal 116653/177302 (executing program) 2021/12/17 14:58:41 fetching corpus: 2972, signal 117387/178663 (executing program) 2021/12/17 14:58:41 fetching corpus: 3022, signal 117925/179937 (executing program) 2021/12/17 14:58:41 fetching corpus: 3072, signal 118534/181190 (executing program) 2021/12/17 14:58:41 fetching corpus: 3121, signal 119054/182411 (executing program) 2021/12/17 14:58:41 fetching corpus: 3170, signal 119630/183676 (executing program) 2021/12/17 14:58:41 fetching corpus: 3220, signal 120456/185069 (executing program) 2021/12/17 14:58:41 fetching corpus: 3270, signal 121086/186294 (executing program) 2021/12/17 14:58:41 fetching corpus: 3320, signal 121862/187568 (executing program) 2021/12/17 14:58:41 fetching corpus: 3370, signal 122452/188815 (executing program) 2021/12/17 14:58:41 fetching corpus: 3420, signal 123416/190143 (executing program) 2021/12/17 14:58:41 fetching corpus: 3469, signal 124029/191320 (executing program) 2021/12/17 14:58:41 fetching corpus: 3516, signal 125210/192735 (executing program) 2021/12/17 14:58:41 fetching corpus: 3562, signal 126000/194014 (executing program) 2021/12/17 14:58:42 fetching corpus: 3611, signal 127143/195374 (executing program) 2021/12/17 14:58:42 fetching corpus: 3660, signal 127599/196430 (executing program) 2021/12/17 14:58:42 fetching corpus: 3710, signal 128155/197549 (executing program) 2021/12/17 14:58:42 fetching corpus: 3760, signal 128788/198632 (executing program) 2021/12/17 14:58:42 fetching corpus: 3810, signal 129461/199754 (executing program) 2021/12/17 14:58:42 fetching corpus: 3859, signal 129968/200817 (executing program) 2021/12/17 14:58:42 fetching corpus: 3909, signal 130563/201956 (executing program) 2021/12/17 14:58:42 fetching corpus: 3958, signal 131163/203047 (executing program) 2021/12/17 14:58:42 fetching corpus: 4008, signal 131666/204105 (executing program) 2021/12/17 14:58:42 fetching corpus: 4058, signal 132332/205124 (executing program) 2021/12/17 14:58:42 fetching corpus: 4108, signal 132920/206173 (executing program) 2021/12/17 14:58:42 fetching corpus: 4158, signal 133543/207213 (executing program) 2021/12/17 14:58:42 fetching corpus: 4208, signal 134241/208247 (executing program) 2021/12/17 14:58:42 fetching corpus: 4257, signal 135019/209269 (executing program) 2021/12/17 14:58:42 fetching corpus: 4307, signal 136017/210422 (executing program) 2021/12/17 14:58:42 fetching corpus: 4357, signal 136485/211404 (executing program) 2021/12/17 14:58:42 fetching corpus: 4407, signal 137182/212466 (executing program) 2021/12/17 14:58:42 fetching corpus: 4457, signal 137675/213424 (executing program) 2021/12/17 14:58:43 fetching corpus: 4507, signal 138184/214417 (executing program) 2021/12/17 14:58:43 fetching corpus: 4556, signal 138711/215327 (executing program) 2021/12/17 14:58:43 fetching corpus: 4606, signal 139240/216298 (executing program) 2021/12/17 14:58:43 fetching corpus: 4654, signal 139724/217244 (executing program) 2021/12/17 14:58:43 fetching corpus: 4704, signal 140224/218182 (executing program) 2021/12/17 14:58:43 fetching corpus: 4753, signal 140660/219073 (executing program) 2021/12/17 14:58:43 fetching corpus: 4801, signal 141169/219933 (executing program) 2021/12/17 14:58:43 fetching corpus: 4851, signal 141658/220841 (executing program) 2021/12/17 14:58:43 fetching corpus: 4900, signal 142269/221749 (executing program) 2021/12/17 14:58:43 fetching corpus: 4950, signal 142673/222595 (executing program) 2021/12/17 14:58:43 fetching corpus: 5000, signal 143320/223484 (executing program) 2021/12/17 14:58:43 fetching corpus: 5050, signal 143781/224343 (executing program) 2021/12/17 14:58:43 fetching corpus: 5097, signal 144387/225233 (executing program) 2021/12/17 14:58:43 fetching corpus: 5147, signal 144844/226036 (executing program) 2021/12/17 14:58:43 fetching corpus: 5196, signal 145451/226923 (executing program) 2021/12/17 14:58:43 fetching corpus: 5246, signal 146010/227772 (executing program) 2021/12/17 14:58:44 fetching corpus: 5295, signal 146546/228573 (executing program) 2021/12/17 14:58:44 fetching corpus: 5345, signal 146824/229388 (executing program) 2021/12/17 14:58:44 fetching corpus: 5395, signal 147380/230153 (executing program) 2021/12/17 14:58:44 fetching corpus: 5445, signal 147988/230926 (executing program) 2021/12/17 14:58:44 fetching corpus: 5495, signal 148340/231672 (executing program) 2021/12/17 14:58:44 fetching corpus: 5545, signal 149293/232414 (executing program) 2021/12/17 14:58:44 fetching corpus: 5593, signal 149869/233165 (executing program) 2021/12/17 14:58:44 fetching corpus: 5643, signal 150219/233887 (executing program) 2021/12/17 14:58:44 fetching corpus: 5693, signal 150713/234622 (executing program) 2021/12/17 14:58:44 fetching corpus: 5743, signal 151116/235375 (executing program) 2021/12/17 14:58:44 fetching corpus: 5792, signal 151496/236073 (executing program) 2021/12/17 14:58:44 fetching corpus: 5840, signal 151910/236145 (executing program) 2021/12/17 14:58:44 fetching corpus: 5890, signal 152244/236146 (executing program) 2021/12/17 14:58:44 fetching corpus: 5940, signal 152628/236149 (executing program) 2021/12/17 14:58:44 fetching corpus: 5990, signal 153373/236149 (executing program) 2021/12/17 14:58:44 fetching corpus: 6040, signal 154096/236157 (executing program) 2021/12/17 14:58:44 fetching corpus: 6090, signal 154460/236157 (executing program) 2021/12/17 14:58:44 fetching corpus: 6140, signal 154805/236157 (executing program) 2021/12/17 14:58:45 fetching corpus: 6190, signal 155337/236158 (executing program) 2021/12/17 14:58:45 fetching corpus: 6240, signal 155730/236158 (executing program) 2021/12/17 14:58:45 fetching corpus: 6290, signal 156297/236165 (executing program) 2021/12/17 14:58:45 fetching corpus: 6338, signal 156645/236166 (executing program) 2021/12/17 14:58:45 fetching corpus: 6386, signal 157037/236176 (executing program) 2021/12/17 14:58:45 fetching corpus: 6435, signal 157669/236176 (executing program) 2021/12/17 14:58:45 fetching corpus: 6485, signal 158146/236176 (executing program) 2021/12/17 14:58:45 fetching corpus: 6535, signal 158461/236193 (executing program) 2021/12/17 14:58:45 fetching corpus: 6585, signal 158907/236193 (executing program) 2021/12/17 14:58:45 fetching corpus: 6635, signal 159320/236212 (executing program) 2021/12/17 14:58:45 fetching corpus: 6685, signal 159727/236212 (executing program) 2021/12/17 14:58:45 fetching corpus: 6735, signal 160188/236212 (executing program) 2021/12/17 14:58:45 fetching corpus: 6785, signal 160855/236243 (executing program) 2021/12/17 14:58:45 fetching corpus: 6835, signal 161315/236246 (executing program) 2021/12/17 14:58:45 fetching corpus: 6885, signal 161802/236251 (executing program) 2021/12/17 14:58:45 fetching corpus: 6935, signal 162157/236251 (executing program) 2021/12/17 14:58:45 fetching corpus: 6984, signal 162935/236256 (executing program) 2021/12/17 14:58:45 fetching corpus: 7034, signal 163405/236260 (executing program) 2021/12/17 14:58:46 fetching corpus: 7084, signal 163744/236264 (executing program) 2021/12/17 14:58:46 fetching corpus: 7134, signal 164295/236286 (executing program) 2021/12/17 14:58:46 fetching corpus: 7184, signal 164652/236286 (executing program) 2021/12/17 14:58:46 fetching corpus: 7234, signal 165094/236286 (executing program) 2021/12/17 14:58:46 fetching corpus: 7283, signal 165585/236296 (executing program) 2021/12/17 14:58:46 fetching corpus: 7332, signal 165946/236296 (executing program) 2021/12/17 14:58:46 fetching corpus: 7382, signal 166382/236296 (executing program) 2021/12/17 14:58:46 fetching corpus: 7432, signal 166703/236297 (executing program) 2021/12/17 14:58:46 fetching corpus: 7482, signal 167165/236298 (executing program) 2021/12/17 14:58:46 fetching corpus: 7532, signal 167735/236298 (executing program) 2021/12/17 14:58:46 fetching corpus: 7582, signal 168443/236306 (executing program) 2021/12/17 14:58:46 fetching corpus: 7631, signal 168889/236320 (executing program) 2021/12/17 14:58:46 fetching corpus: 7680, signal 169220/236320 (executing program) 2021/12/17 14:58:46 fetching corpus: 7730, signal 169789/236320 (executing program) 2021/12/17 14:58:46 fetching corpus: 7780, signal 170153/236320 (executing program) 2021/12/17 14:58:46 fetching corpus: 7830, signal 170726/236320 (executing program) 2021/12/17 14:58:46 fetching corpus: 7880, signal 171183/236321 (executing program) 2021/12/17 14:58:47 fetching corpus: 7929, signal 171695/236333 (executing program) 2021/12/17 14:58:47 fetching corpus: 7979, signal 172083/236334 (executing program) 2021/12/17 14:58:47 fetching corpus: 8028, signal 172443/236337 (executing program) 2021/12/17 14:58:47 fetching corpus: 8077, signal 172977/236351 (executing program) 2021/12/17 14:58:47 fetching corpus: 8126, signal 173261/236351 (executing program) 2021/12/17 14:58:47 fetching corpus: 8173, signal 173647/236375 (executing program) 2021/12/17 14:58:47 fetching corpus: 8223, signal 174275/236375 (executing program) 2021/12/17 14:58:47 fetching corpus: 8272, signal 175037/236376 (executing program) 2021/12/17 14:58:47 fetching corpus: 8322, signal 175463/236382 (executing program) 2021/12/17 14:58:47 fetching corpus: 8372, signal 175775/236392 (executing program) 2021/12/17 14:58:47 fetching corpus: 8422, signal 176036/236392 (executing program) 2021/12/17 14:58:47 fetching corpus: 8472, signal 176512/236394 (executing program) 2021/12/17 14:58:47 fetching corpus: 8518, signal 176852/236413 (executing program) 2021/12/17 14:58:47 fetching corpus: 8567, signal 177246/236413 (executing program) 2021/12/17 14:58:47 fetching corpus: 8617, signal 177854/236416 (executing program) 2021/12/17 14:58:47 fetching corpus: 8666, signal 178180/236418 (executing program) 2021/12/17 14:58:47 fetching corpus: 8716, signal 178627/236422 (executing program) 2021/12/17 14:58:47 fetching corpus: 8766, signal 178903/236422 (executing program) 2021/12/17 14:58:48 fetching corpus: 8816, signal 179385/236433 (executing program) 2021/12/17 14:58:48 fetching corpus: 8866, signal 179724/236480 (executing program) 2021/12/17 14:58:48 fetching corpus: 8915, signal 180385/236480 (executing program) 2021/12/17 14:58:48 fetching corpus: 8965, signal 180852/236490 (executing program) 2021/12/17 14:58:48 fetching corpus: 9014, signal 181380/236490 (executing program) 2021/12/17 14:58:48 fetching corpus: 9064, signal 181688/236490 (executing program) 2021/12/17 14:58:48 fetching corpus: 9114, signal 182062/236494 (executing program) 2021/12/17 14:58:48 fetching corpus: 9164, signal 182431/236520 (executing program) 2021/12/17 14:58:48 fetching corpus: 9214, signal 182777/236551 (executing program) 2021/12/17 14:58:48 fetching corpus: 9264, signal 183573/236551 (executing program) 2021/12/17 14:58:48 fetching corpus: 9314, signal 183870/236552 (executing program) 2021/12/17 14:58:48 fetching corpus: 9364, signal 184315/236556 (executing program) 2021/12/17 14:58:48 fetching corpus: 9414, signal 184854/236556 (executing program) 2021/12/17 14:58:48 fetching corpus: 9463, signal 185138/236565 (executing program) 2021/12/17 14:58:48 fetching corpus: 9513, signal 185436/236571 (executing program) 2021/12/17 14:58:48 fetching corpus: 9563, signal 185700/236571 (executing program) 2021/12/17 14:58:49 fetching corpus: 9613, signal 185936/236578 (executing program) 2021/12/17 14:58:49 fetching corpus: 9663, signal 186325/236583 (executing program) 2021/12/17 14:58:49 fetching corpus: 9713, signal 186957/236592 (executing program) 2021/12/17 14:58:49 fetching corpus: 9763, signal 187396/236592 (executing program) 2021/12/17 14:58:49 fetching corpus: 9813, signal 187900/236592 (executing program) 2021/12/17 14:58:49 fetching corpus: 9863, signal 188317/236592 (executing program) 2021/12/17 14:58:49 fetching corpus: 9913, signal 188664/236592 (executing program) 2021/12/17 14:58:49 fetching corpus: 9963, signal 188910/236598 (executing program) 2021/12/17 14:58:49 fetching corpus: 10013, signal 189207/236602 (executing program) 2021/12/17 14:58:49 fetching corpus: 10063, signal 189432/236602 (executing program) 2021/12/17 14:58:49 fetching corpus: 10113, signal 189850/236602 (executing program) 2021/12/17 14:58:49 fetching corpus: 10163, signal 190140/236618 (executing program) 2021/12/17 14:58:49 fetching corpus: 10213, signal 190699/236625 (executing program) 2021/12/17 14:58:49 fetching corpus: 10263, signal 191232/236629 (executing program) 2021/12/17 14:58:49 fetching corpus: 10313, signal 191600/236673 (executing program) 2021/12/17 14:58:49 fetching corpus: 10363, signal 191937/236673 (executing program) 2021/12/17 14:58:49 fetching corpus: 10413, signal 192169/236673 (executing program) 2021/12/17 14:58:49 fetching corpus: 10463, signal 192548/236675 (executing program) 2021/12/17 14:58:50 fetching corpus: 10512, signal 192910/236675 (executing program) 2021/12/17 14:58:50 fetching corpus: 10562, signal 193335/236745 (executing program) 2021/12/17 14:58:50 fetching corpus: 10612, signal 193666/236758 (executing program) 2021/12/17 14:58:50 fetching corpus: 10662, signal 193891/236758 (executing program) 2021/12/17 14:58:50 fetching corpus: 10712, signal 194151/236758 (executing program) 2021/12/17 14:58:50 fetching corpus: 10762, signal 194573/236758 (executing program) 2021/12/17 14:58:50 fetching corpus: 10812, signal 194815/236758 (executing program) 2021/12/17 14:58:50 fetching corpus: 10860, signal 195216/236778 (executing program) 2021/12/17 14:58:50 fetching corpus: 10909, signal 195783/236778 (executing program) 2021/12/17 14:58:50 fetching corpus: 10959, signal 196035/236778 (executing program) 2021/12/17 14:58:50 fetching corpus: 11009, signal 196450/236784 (executing program) 2021/12/17 14:58:50 fetching corpus: 11059, signal 196677/236784 (executing program) 2021/12/17 14:58:50 fetching corpus: 11109, signal 196991/236784 (executing program) 2021/12/17 14:58:50 fetching corpus: 11159, signal 197243/236786 (executing program) 2021/12/17 14:58:50 fetching corpus: 11209, signal 197415/236799 (executing program) 2021/12/17 14:58:50 fetching corpus: 11259, signal 197820/236824 (executing program) 2021/12/17 14:58:50 fetching corpus: 11309, signal 198063/236824 (executing program) 2021/12/17 14:58:51 fetching corpus: 11359, signal 198391/236824 (executing program) 2021/12/17 14:58:51 fetching corpus: 11409, signal 198730/236824 (executing program) 2021/12/17 14:58:51 fetching corpus: 11459, signal 199531/236824 (executing program) 2021/12/17 14:58:51 fetching corpus: 11509, signal 199821/236824 (executing program) 2021/12/17 14:58:51 fetching corpus: 11559, signal 200140/236824 (executing program) 2021/12/17 14:58:51 fetching corpus: 11609, signal 200447/236824 (executing program) 2021/12/17 14:58:51 fetching corpus: 11659, signal 200931/236824 (executing program) 2021/12/17 14:58:51 fetching corpus: 11709, signal 201127/236824 (executing program) 2021/12/17 14:58:51 fetching corpus: 11759, signal 201345/236824 (executing program) 2021/12/17 14:58:51 fetching corpus: 11809, signal 201740/236824 (executing program) 2021/12/17 14:58:51 fetching corpus: 11859, signal 201992/236826 (executing program) 2021/12/17 14:58:51 fetching corpus: 11909, signal 202249/236835 (executing program) 2021/12/17 14:58:51 fetching corpus: 11959, signal 202505/236840 (executing program) 2021/12/17 14:58:51 fetching corpus: 12009, signal 202962/236849 (executing program) 2021/12/17 14:58:52 fetching corpus: 12059, signal 203225/236849 (executing program) 2021/12/17 14:58:52 fetching corpus: 12109, signal 203641/236852 (executing program) 2021/12/17 14:58:52 fetching corpus: 12159, signal 203854/236852 (executing program) 2021/12/17 14:58:52 fetching corpus: 12209, signal 204109/236858 (executing program) 2021/12/17 14:58:52 fetching corpus: 12259, signal 204320/236858 (executing program) 2021/12/17 14:58:52 fetching corpus: 12309, signal 204623/236858 (executing program) 2021/12/17 14:58:52 fetching corpus: 12359, signal 205150/236858 (executing program) 2021/12/17 14:58:52 fetching corpus: 12409, signal 205449/236858 (executing program) 2021/12/17 14:58:52 fetching corpus: 12459, signal 205810/236858 (executing program) 2021/12/17 14:58:52 fetching corpus: 12509, signal 206082/236858 (executing program) 2021/12/17 14:58:52 fetching corpus: 12559, signal 206365/236858 (executing program) 2021/12/17 14:58:52 fetching corpus: 12608, signal 206647/236858 (executing program) 2021/12/17 14:58:52 fetching corpus: 12658, signal 206919/236861 (executing program) 2021/12/17 14:58:52 fetching corpus: 12708, signal 207286/236861 (executing program) 2021/12/17 14:58:52 fetching corpus: 12758, signal 207532/236861 (executing program) 2021/12/17 14:58:52 fetching corpus: 12808, signal 207855/236864 (executing program) 2021/12/17 14:58:53 fetching corpus: 12857, signal 208112/236866 (executing program) 2021/12/17 14:58:53 fetching corpus: 12907, signal 208508/236868 (executing program) 2021/12/17 14:58:53 fetching corpus: 12957, signal 208877/236868 (executing program) 2021/12/17 14:58:53 fetching corpus: 13007, signal 209189/236868 (executing program) 2021/12/17 14:58:53 fetching corpus: 13055, signal 209521/236877 (executing program) 2021/12/17 14:58:53 fetching corpus: 13104, signal 210027/236877 (executing program) 2021/12/17 14:58:53 fetching corpus: 13154, signal 210294/236877 (executing program) 2021/12/17 14:58:53 fetching corpus: 13204, signal 210606/236880 (executing program) 2021/12/17 14:58:53 fetching corpus: 13254, signal 210812/236910 (executing program) 2021/12/17 14:58:53 fetching corpus: 13304, signal 211082/236910 (executing program) 2021/12/17 14:58:53 fetching corpus: 13354, signal 211320/236910 (executing program) 2021/12/17 14:58:53 fetching corpus: 13404, signal 211696/236922 (executing program) 2021/12/17 14:58:53 fetching corpus: 13454, signal 211918/236922 (executing program) 2021/12/17 14:58:53 fetching corpus: 13504, signal 212383/236922 (executing program) 2021/12/17 14:58:53 fetching corpus: 13554, signal 212627/236925 (executing program) 2021/12/17 14:58:53 fetching corpus: 13604, signal 212881/236925 (executing program) 2021/12/17 14:58:54 fetching corpus: 13654, signal 213139/236926 (executing program) 2021/12/17 14:58:54 fetching corpus: 13703, signal 213358/236931 (executing program) 2021/12/17 14:58:54 fetching corpus: 13753, signal 213674/236989 (executing program) 2021/12/17 14:58:54 fetching corpus: 13803, signal 213918/236989 (executing program) 2021/12/17 14:58:54 fetching corpus: 13853, signal 214217/236989 (executing program) 2021/12/17 14:58:54 fetching corpus: 13902, signal 214608/236989 (executing program) 2021/12/17 14:58:54 fetching corpus: 13952, signal 214823/236993 (executing program) 2021/12/17 14:58:54 fetching corpus: 14001, signal 215009/236998 (executing program) 2021/12/17 14:58:54 fetching corpus: 14051, signal 215500/236998 (executing program) 2021/12/17 14:58:54 fetching corpus: 14101, signal 216094/237001 (executing program) 2021/12/17 14:58:54 fetching corpus: 14151, signal 216328/237003 (executing program) 2021/12/17 14:58:54 fetching corpus: 14201, signal 216554/237003 (executing program) 2021/12/17 14:58:54 fetching corpus: 14250, signal 216916/237003 (executing program) 2021/12/17 14:58:54 fetching corpus: 14299, signal 217078/237023 (executing program) 2021/12/17 14:58:54 fetching corpus: 14349, signal 217304/237026 (executing program) 2021/12/17 14:58:54 fetching corpus: 14399, signal 217480/237026 (executing program) 2021/12/17 14:58:54 fetching corpus: 14449, signal 217698/237026 (executing program) 2021/12/17 14:58:54 fetching corpus: 14499, signal 217977/237026 (executing program) 2021/12/17 14:58:54 fetching corpus: 14549, signal 218398/237041 (executing program) 2021/12/17 14:58:55 fetching corpus: 14599, signal 218579/237044 (executing program) 2021/12/17 14:58:55 fetching corpus: 14649, signal 218891/237062 (executing program) 2021/12/17 14:58:55 fetching corpus: 14698, signal 219115/237077 (executing program) 2021/12/17 14:58:55 fetching corpus: 14747, signal 219311/237077 (executing program) 2021/12/17 14:58:55 fetching corpus: 14795, signal 219651/237091 (executing program) 2021/12/17 14:58:55 fetching corpus: 14844, signal 219957/237093 (executing program) 2021/12/17 14:58:55 fetching corpus: 14894, signal 220175/237112 (executing program) 2021/12/17 14:58:55 fetching corpus: 14944, signal 220534/237114 (executing program) 2021/12/17 14:58:55 fetching corpus: 14993, signal 220866/237115 (executing program) 2021/12/17 14:58:55 fetching corpus: 15042, signal 221087/237139 (executing program) 2021/12/17 14:58:55 fetching corpus: 15092, signal 221322/237139 (executing program) 2021/12/17 14:58:55 fetching corpus: 15142, signal 221648/237145 (executing program) 2021/12/17 14:58:55 fetching corpus: 15190, signal 221850/237148 (executing program) 2021/12/17 14:58:55 fetching corpus: 15240, signal 222086/237162 (executing program) 2021/12/17 14:58:55 fetching corpus: 15290, signal 222375/237162 (executing program) 2021/12/17 14:58:55 fetching corpus: 15339, signal 222624/237162 (executing program) 2021/12/17 14:58:56 fetching corpus: 15388, signal 222874/237198 (executing program) 2021/12/17 14:58:56 fetching corpus: 15438, signal 223049/237198 (executing program) 2021/12/17 14:58:56 fetching corpus: 15488, signal 223410/237198 (executing program) 2021/12/17 14:58:56 fetching corpus: 15537, signal 223591/237199 (executing program) 2021/12/17 14:58:56 fetching corpus: 15587, signal 223991/237217 (executing program) 2021/12/17 14:58:56 fetching corpus: 15637, signal 224256/237217 (executing program) 2021/12/17 14:58:56 fetching corpus: 15687, signal 224673/237217 (executing program) 2021/12/17 14:58:56 fetching corpus: 15737, signal 224951/237217 (executing program) 2021/12/17 14:58:56 fetching corpus: 15787, signal 225153/237232 (executing program) 2021/12/17 14:58:56 fetching corpus: 15837, signal 225430/237232 (executing program) 2021/12/17 14:58:56 fetching corpus: 15887, signal 225607/237232 (executing program) 2021/12/17 14:58:56 fetching corpus: 15937, signal 225868/237232 (executing program) 2021/12/17 14:58:56 fetching corpus: 15987, signal 226196/237232 (executing program) 2021/12/17 14:58:56 fetching corpus: 16037, signal 226398/237247 (executing program) 2021/12/17 14:58:56 fetching corpus: 16087, signal 226658/237265 (executing program) 2021/12/17 14:58:56 fetching corpus: 16137, signal 226936/237266 (executing program) 2021/12/17 14:58:56 fetching corpus: 16187, signal 227156/237266 (executing program) 2021/12/17 14:58:57 fetching corpus: 16237, signal 227528/237266 (executing program) 2021/12/17 14:58:57 fetching corpus: 16287, signal 227697/237266 (executing program) 2021/12/17 14:58:57 fetching corpus: 16337, signal 227887/237268 (executing program) 2021/12/17 14:58:57 fetching corpus: 16387, signal 228176/237269 (executing program) 2021/12/17 14:58:57 fetching corpus: 16437, signal 228397/237289 (executing program) 2021/12/17 14:58:57 fetching corpus: 16486, signal 228664/237316 (executing program) 2021/12/17 14:58:57 fetching corpus: 16536, signal 228896/237317 (executing program) 2021/12/17 14:58:57 fetching corpus: 16585, signal 229277/237324 (executing program) 2021/12/17 14:58:57 fetching corpus: 16634, signal 229529/237324 (executing program) 2021/12/17 14:58:57 fetching corpus: 16684, signal 229801/237336 (executing program) 2021/12/17 14:58:57 fetching corpus: 16734, signal 230304/237336 (executing program) 2021/12/17 14:58:57 fetching corpus: 16783, signal 230476/237349 (executing program) 2021/12/17 14:58:57 fetching corpus: 16833, signal 230696/237349 (executing program) 2021/12/17 14:58:57 fetching corpus: 16883, signal 230941/237351 (executing program) 2021/12/17 14:58:58 fetching corpus: 16932, signal 231256/237386 (executing program) 2021/12/17 14:58:58 fetching corpus: 16982, signal 231417/237386 (executing program) 2021/12/17 14:58:58 fetching corpus: 17032, signal 231551/237401 (executing program) 2021/12/17 14:58:58 fetching corpus: 17082, signal 231753/237404 (executing program) 2021/12/17 14:58:58 fetching corpus: 17132, signal 231973/237404 (executing program) 2021/12/17 14:58:58 fetching corpus: 17182, signal 232197/237410 (executing program) 2021/12/17 14:58:58 fetching corpus: 17230, signal 232359/237411 (executing program) 2021/12/17 14:58:58 fetching corpus: 17280, signal 232609/237450 (executing program) 2021/12/17 14:58:58 fetching corpus: 17329, signal 232826/237450 (executing program) 2021/12/17 14:58:58 fetching corpus: 17379, signal 233102/237503 (executing program) 2021/12/17 14:58:58 fetching corpus: 17429, signal 233304/237503 (executing program) 2021/12/17 14:58:58 fetching corpus: 17479, signal 233623/237513 (executing program) 2021/12/17 14:58:58 fetching corpus: 17528, signal 233849/237513 (executing program) 2021/12/17 14:58:58 fetching corpus: 17578, signal 234051/237513 (executing program) 2021/12/17 14:58:58 fetching corpus: 17628, signal 234297/237518 (executing program) 2021/12/17 14:58:58 fetching corpus: 17678, signal 234471/237536 (executing program) 2021/12/17 14:58:58 fetching corpus: 17728, signal 234737/237536 (executing program) 2021/12/17 14:58:58 fetching corpus: 17778, signal 235089/237536 (executing program) 2021/12/17 14:58:58 fetching corpus: 17828, signal 235261/237538 (executing program) 2021/12/17 14:58:59 fetching corpus: 17877, signal 235494/237542 (executing program) 2021/12/17 14:58:59 fetching corpus: 17927, signal 235657/237542 (executing program) 2021/12/17 14:58:59 fetching corpus: 17977, signal 235871/237545 (executing program) 2021/12/17 14:58:59 fetching corpus: 17988, signal 235911/237545 (executing program) 2021/12/17 14:58:59 fetching corpus: 17988, signal 235911/237545 (executing program) 2021/12/17 14:59:00 starting 6 fuzzer processes 14:59:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000002700)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettclass={0x24, 0x2a, 0x933, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x9}}}, 0x24}}, 0x0) 14:59:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) 14:59:00 executing program 5: io_setup(0x7, &(0x7f00000000c0)=0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000980)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 14:59:00 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x5e) pipe(&(0x7f0000000040)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xffffffffffffff2a, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000002100000127bd7000ffdbdff704341408030000000f0000000800012008000f000000000008000200e0000001fa000200a91414aa"], 0x1}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000002dc0)=[{&(0x7f00000014c0)=ANY=[@ANYBLOB="c40f0003000000010000000000000000b40f00b715f24c8b50c4320ef3b64471ff00b9009c05bfdf91a5c2c439ed8b11fe06a2e52ac611123e7a83c6"], 0x1}], 0x1}, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x60, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x400}, 0x2c) 14:59:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000001d40)=[{0x35, 0x0, 0x0, 0xfffffffe}, {0x24}, {0x6, 0x0, 0x0, 0x7ffffdba}]}) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000001a80)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 14:59:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) [ 43.063243][ T24] audit: type=1400 audit(1639753140.850:82): avc: denied { execmem } for pid=1814 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 43.082655][ T24] audit: type=1400 audit(1639753140.860:83): avc: denied { read } for pid=1817 comm="syz-executor.0" dev="nsfs" ino=4026531992 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 43.103954][ T24] audit: type=1400 audit(1639753140.860:84): avc: denied { open } for pid=1817 comm="syz-executor.0" path="net:[4026531992]" dev="nsfs" ino=4026531992 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 43.127413][ T24] audit: type=1400 audit(1639753140.860:85): avc: denied { mounton } for pid=1817 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 43.148872][ T24] audit: type=1400 audit(1639753140.860:86): avc: denied { module_request } for pid=1817 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 43.170744][ T24] audit: type=1400 audit(1639753140.870:87): avc: denied { sys_module } for pid=1817 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 43.244505][ T1817] chnl_net:caif_netlink_parms(): no params data found [ 43.353877][ T1817] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.361106][ T1817] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.372230][ T1817] device bridge_slave_0 entered promiscuous mode [ 43.381131][ T1817] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.388230][ T1817] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.409531][ T1817] device bridge_slave_1 entered promiscuous mode [ 43.431045][ T1817] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 43.443944][ T1817] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 43.501030][ T1817] team0: Port device team_slave_0 added [ 43.517798][ T1817] team0: Port device team_slave_1 added [ 43.574662][ T1826] chnl_net:caif_netlink_parms(): no params data found [ 43.591353][ T1817] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 43.598295][ T1817] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 43.624571][ T1817] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 43.637284][ T1817] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 43.644233][ T1817] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 43.670547][ T1817] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 43.711299][ T1817] device hsr_slave_0 entered promiscuous mode [ 43.717627][ T1817] device hsr_slave_1 entered promiscuous mode [ 43.753839][ T1832] chnl_net:caif_netlink_parms(): no params data found [ 43.819821][ T1826] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.826861][ T1826] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.834458][ T1826] device bridge_slave_0 entered promiscuous mode [ 43.844894][ T1826] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.851956][ T1826] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.859830][ T1826] device bridge_slave_1 entered promiscuous mode [ 43.904674][ T1826] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 43.915154][ T1845] chnl_net:caif_netlink_parms(): no params data found [ 43.942477][ T1826] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 43.955242][ T1839] chnl_net:caif_netlink_parms(): no params data found [ 43.978473][ T1852] chnl_net:caif_netlink_parms(): no params data found [ 44.004021][ T1832] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.011076][ T1832] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.018542][ T1832] device bridge_slave_0 entered promiscuous mode [ 44.041038][ T1832] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.048074][ T1832] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.055798][ T1832] device bridge_slave_1 entered promiscuous mode [ 44.072055][ T1826] team0: Port device team_slave_0 added [ 44.097090][ T1826] team0: Port device team_slave_1 added [ 44.117452][ T1832] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.130228][ T1817] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 44.151666][ T1832] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 44.160773][ T1845] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.167787][ T1845] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.175405][ T1845] device bridge_slave_0 entered promiscuous mode [ 44.182558][ T1817] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 44.191234][ T1826] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 44.198359][ T1826] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.224329][ T1826] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.235310][ T1826] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 44.242287][ T1826] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.268267][ T1826] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 44.290140][ T1845] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.297230][ T1845] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.305753][ T1845] device bridge_slave_1 entered promiscuous mode [ 44.312393][ T1817] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 44.323574][ T1817] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 44.331849][ T1839] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.338869][ T1839] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.346803][ T1839] device bridge_slave_0 entered promiscuous mode [ 44.353881][ T1852] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.360966][ T1852] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.368466][ T1852] device bridge_slave_0 entered promiscuous mode [ 44.389914][ T1845] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.399188][ T1839] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.406283][ T1839] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.413863][ T1839] device bridge_slave_1 entered promiscuous mode [ 44.420825][ T1852] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.427996][ T1852] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.435508][ T1852] device bridge_slave_1 entered promiscuous mode [ 44.447292][ T1832] team0: Port device team_slave_0 added [ 44.461118][ T1845] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 44.483290][ T1852] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.492905][ T1832] team0: Port device team_slave_1 added [ 44.508076][ T1826] device hsr_slave_0 entered promiscuous mode [ 44.514439][ T1826] device hsr_slave_1 entered promiscuous mode [ 44.520906][ T1826] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 44.528447][ T1826] Cannot create hsr debugfs directory [ 44.542514][ T1852] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 44.556839][ T1845] team0: Port device team_slave_0 added [ 44.563348][ T1839] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.575964][ T1832] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 44.582985][ T1832] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.609011][ T1832] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.620138][ T1832] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 44.627071][ T1832] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.653160][ T1832] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 44.666608][ T1845] team0: Port device team_slave_1 added [ 44.674305][ T1839] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 44.708398][ T1852] team0: Port device team_slave_0 added [ 44.721516][ T1832] device hsr_slave_0 entered promiscuous mode [ 44.727847][ T1832] device hsr_slave_1 entered promiscuous mode [ 44.734256][ T1832] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 44.741883][ T1832] Cannot create hsr debugfs directory [ 44.751992][ T1839] team0: Port device team_slave_0 added [ 44.767929][ T1817] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.776602][ T1852] team0: Port device team_slave_1 added [ 44.788207][ T1845] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 44.795193][ T1845] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.821390][ T1845] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.832630][ T1839] team0: Port device team_slave_1 added [ 44.847016][ T1852] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 44.854042][ T1852] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.880106][ T1852] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.891009][ T1845] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 44.897938][ T1845] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.923897][ T1845] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 44.944808][ T1839] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 44.951772][ T1839] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.978533][ T1839] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.992455][ T1852] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 44.999458][ T1852] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.025639][ T1852] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.040994][ T1839] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.048035][ T1839] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.074060][ T1839] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.093142][ T1845] device hsr_slave_0 entered promiscuous mode [ 45.099775][ T1845] device hsr_slave_1 entered promiscuous mode [ 45.106045][ T1845] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 45.113987][ T1845] Cannot create hsr debugfs directory [ 45.126756][ T1903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.134534][ T1903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.153590][ T1817] 8021q: adding VLAN 0 to HW filter on device team0 [ 45.171555][ T1839] device hsr_slave_0 entered promiscuous mode [ 45.177985][ T1839] device hsr_slave_1 entered promiscuous mode [ 45.184457][ T1839] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 45.192280][ T1839] Cannot create hsr debugfs directory [ 45.207042][ T1852] device hsr_slave_0 entered promiscuous mode [ 45.213941][ T1852] device hsr_slave_1 entered promiscuous mode [ 45.220547][ T1852] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 45.228121][ T1852] Cannot create hsr debugfs directory [ 45.248758][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.257172][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.265637][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.272722][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.293570][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 45.301640][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.310074][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.318348][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.325377][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.333008][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 45.341838][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 45.355512][ T1826] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 45.374933][ T1826] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 45.386665][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 45.395508][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 45.408910][ T1826] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 45.422416][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 45.430362][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 45.438734][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 45.447153][ T24] audit: type=1400 audit(1639753143.230:88): avc: denied { remove_name } for pid=1421 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 45.469599][ T24] audit: type=1400 audit(1639753143.230:89): avc: denied { rename } for pid=1421 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 45.495472][ T1832] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 45.504296][ T1832] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 45.518123][ T1826] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 45.534534][ T1832] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 45.551046][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 45.559480][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.567553][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 45.575976][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.590858][ T1832] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 45.606632][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 45.628885][ T1845] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 45.645760][ T1845] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 45.655174][ T1845] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 45.665850][ T1817] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 45.677592][ T1826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 45.687476][ T1852] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 45.695920][ T1845] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 45.704401][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 45.713431][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 45.735280][ T1826] 8021q: adding VLAN 0 to HW filter on device team0 [ 45.751145][ T1852] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 45.761726][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 45.770588][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.778926][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.786617][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.794428][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.802890][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.811229][ T1912] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.818342][ T1912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.826045][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.834610][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.842833][ T1912] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.849854][ T1912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.869438][ T1852] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 45.879002][ T1852] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 45.887478][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 45.896916][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 45.905564][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 45.914744][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 45.923016][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 45.931476][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 45.939912][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 45.948150][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 45.956268][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.968585][ T1826] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 45.980683][ T1826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 45.994654][ T1817] device veth0_vlan entered promiscuous mode [ 46.002814][ T1832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.010286][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 46.018086][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.029847][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.037920][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.046361][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.059999][ T1839] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 46.069913][ T1817] device veth1_vlan entered promiscuous mode [ 46.083408][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.091032][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.099041][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 46.106958][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 46.114996][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.122565][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.131796][ T1839] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 46.140633][ T1839] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 46.149005][ T1839] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 46.159394][ T1832] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.168060][ T1826] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.178848][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 46.186450][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 46.211273][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 46.219688][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.230329][ T1845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.248826][ T1832] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 46.259331][ T1832] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 46.270871][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.279744][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.288387][ T1911] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.295451][ T1911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.303254][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.311738][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.319967][ T1911] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.326989][ T1911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.334765][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 46.343483][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 46.352035][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 46.360451][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 46.368896][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 46.377303][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 46.385681][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 46.393967][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.402460][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.410595][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.418864][ T1817] device veth0_macvtap entered promiscuous mode [ 46.428299][ T1845] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.441677][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 46.449796][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 46.457623][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 46.465542][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 46.473028][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.480697][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.488268][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.496876][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.505073][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.512108][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.520641][ T1817] device veth1_macvtap entered promiscuous mode [ 46.529459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 46.541171][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.549807][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.564931][ T1832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.582035][ T1845] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 46.592436][ T1845] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 46.605479][ T1852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.617497][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 46.626367][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 46.633964][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.643450][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.651828][ T1914] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.658911][ T1914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.667442][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 46.676201][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 46.684978][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 46.693446][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 46.702109][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 46.710495][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 46.718801][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 46.727245][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.735519][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.743955][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.754162][ T1817] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 46.767587][ T1852] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.787889][ T1845] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.795505][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 46.803293][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 46.810956][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 46.819510][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.827910][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.835642][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.843276][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 46.850728][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 46.860210][ T1839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.879619][ T1817] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 46.895128][ T1839] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.905174][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.913702][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.922316][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.930739][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.939211][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.947775][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.956104][ T1911] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.963143][ T1911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.970949][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.979441][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.987732][ T1911] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.994873][ T1911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.002466][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.010062][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.017604][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 47.034688][ T1826] device veth0_vlan entered promiscuous mode [ 47.043878][ T1817] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.052629][ T1817] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.061372][ T1817] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.070160][ T1817] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.083837][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 47.091701][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 47.100624][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 47.109358][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.117789][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 47.126419][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.135154][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 47.144102][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.152575][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.160772][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.169403][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 47.177618][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.185756][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 47.194012][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.202463][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 47.210239][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.217877][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.233051][ T1826] device veth1_vlan entered promiscuous mode [ 47.240959][ T1852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 47.263499][ T1839] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 47.273890][ T1839] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 47.285397][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.293603][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.302003][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.310607][ T1912] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.317651][ T1912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.325446][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.333889][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.342187][ T1912] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.349196][ T1912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.356928][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 47.365472][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 47.374143][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 47.382408][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.390815][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 47.399193][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.407917][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 47.416026][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.424247][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 47.432443][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.445679][ T1826] device veth0_macvtap entered promiscuous mode [ 47.456166][ T1826] device veth1_macvtap entered promiscuous mode [ 47.466653][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 47.474824][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 47.482657][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 47.490641][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 47.498012][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.506417][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.514714][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.522811][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 47.533223][ T24] audit: type=1400 audit(1639753145.320:90): avc: denied { mounton } for pid=1817 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 47.546947][ T1832] device veth0_vlan entered promiscuous mode [ 47.571822][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.582299][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.593655][ T1826] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 47.603414][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.611800][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.620377][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 47.627744][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 47.635367][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.643819][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.652626][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.660708][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.671364][ T1852] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.679565][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.687160][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.694822][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.702621][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.714094][ T1839] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.722356][ T1845] device veth0_vlan entered promiscuous mode [ 47.728356][ T24] audit: type=1400 audit(1639753145.510:91): avc: denied { read write } for pid=1817 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 47.747114][ T1845] device veth1_vlan entered promiscuous mode [ 47.760806][ T1832] device veth1_vlan entered promiscuous mode [ 47.770618][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.778596][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 47.786859][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 47.794890][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 47.802324][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 47.810546][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 14:59:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000002700)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettclass={0x24, 0x2a, 0x933, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x9}}}, 0x24}}, 0x0) [ 47.821046][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.837868][ T1826] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 47.847134][ T1826] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.855879][ T1826] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.864578][ T1826] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 14:59:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000002700)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettclass={0x24, 0x2a, 0x933, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x9}}}, 0x24}}, 0x0) [ 47.873317][ T1826] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.895511][ T1832] device veth0_macvtap entered promiscuous mode [ 47.902885][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 47.914825][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 47.927581][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.936141][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 47.945047][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.953575][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.962043][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.971450][ T812] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 47.990775][ T1832] device veth1_macvtap entered promiscuous mode [ 48.002703][ T1845] device veth0_macvtap entered promiscuous mode 14:59:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000002700)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettclass={0x24, 0x2a, 0x933, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x9}}}, 0x24}}, 0x0) [ 48.021099][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 48.031473][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 48.041734][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.057873][ T1845] device veth1_macvtap entered promiscuous mode [ 48.070425][ T1832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.080895][ T1832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.088925][ T24] kauditd_printk_skb: 2 callbacks suppressed [ 48.088937][ T24] audit: type=1400 audit(1639753145.870:94): avc: denied { create } for pid=1971 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 48.090779][ T1832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 14:59:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) 14:59:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) 14:59:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) [ 48.090792][ T1832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.098468][ T1832] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.117594][ T24] audit: type=1400 audit(1639753145.870:95): avc: denied { write } for pid=1971 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 48.166741][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 14:59:05 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f00000007c0)=""/236, 0xec}, {&(0x7f0000000a40)=""/79, 0x4f}, {&(0x7f0000000bc0)=""/183, 0xb7}, {&(0x7f0000000c80)=""/130, 0x82}], 0x4, 0x3, 0x0, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = gettid() ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000001c0)={0x79, 0x19, 0x0}) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/246, 0xf6}], 0x1, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) move_pages(0x0, 0x2, &(0x7f0000000200)=[&(0x7f0000336000/0x1000)=nil], &(0x7f000026bfec), &(0x7f0000000140)=[0x0, 0x0], 0x0) [ 48.175212][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 48.184272][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 48.191249][ T24] audit: type=1400 audit(1639753145.970:96): avc: denied { open } for pid=1980 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 48.193242][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 14:59:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWSETELEM={0x4c, 0xe, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_KEY_END={0x10, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd0}}, 0x0) [ 48.223355][ T24] audit: type=1400 audit(1639753146.010:97): avc: denied { perfmon } for pid=1980 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 48.225456][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 48.254637][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.276476][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.287004][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.296942][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.307473][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.317285][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.327803][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.338823][ T1845] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.348837][ T1832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.359369][ T1832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.369171][ T1832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.379604][ T1832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.391559][ T1832] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.399196][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 48.407394][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.416057][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 48.424531][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.433250][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 48.442042][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.450957][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.458626][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.468514][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.478966][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.488951][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.499394][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.509186][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.519601][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.531644][ T1845] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.540275][ T1832] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.549147][ T1832] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.557936][ T1832] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.566907][ T1832] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.577934][ T1852] device veth0_vlan entered promiscuous mode [ 48.584792][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 48.593453][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.603930][ T1845] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.612841][ T1845] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.621538][ T1845] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.630215][ T1845] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.673851][ T1852] device veth1_vlan entered promiscuous mode [ 48.683184][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 48.692481][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.704987][ T1839] device veth0_vlan entered promiscuous mode [ 48.721265][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.728626][ T24] audit: type=1400 audit(1639753146.510:98): avc: denied { create } for pid=1990 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 48.748544][ T24] audit: type=1400 audit(1639753146.510:99): avc: denied { bind } for pid=1990 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 48.768734][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.780728][ T1839] device veth1_vlan entered promiscuous mode [ 48.803319][ T1839] device veth0_macvtap entered promiscuous mode [ 48.808756][ T24] audit: type=1400 audit(1639753146.590:100): avc: denied { create } for pid=1992 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 48.814315][ T1852] device veth0_macvtap entered promiscuous mode [ 48.836312][ T24] audit: type=1400 audit(1639753146.620:101): avc: denied { write } for pid=1992 comm="syz-executor.5" path="socket:[16132]" dev="sockfs" ino=16132 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 48.860652][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 48.868528][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 48.876877][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 48.885315][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.893693][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 48.902259][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.912535][ T1839] device veth1_macvtap entered promiscuous mode 14:59:06 executing program 5: io_setup(0x7, &(0x7f00000000c0)=0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000980)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 14:59:06 executing program 0: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) chroot(&(0x7f00000000c0)='./file0\x00') syz_usbip_server_init(0x0) [ 48.930130][ T1852] device veth1_macvtap entered promiscuous mode [ 48.941629][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 48.945902][ T24] audit: type=1400 audit(1639753146.730:102): avc: denied { mounton } for pid=1994 comm="syz-executor.0" path="/root/syzkaller-testdir644480554/syzkaller.kZa3Nk/5/file0" dev="sda1" ino=1163 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 48.949854][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 48.976060][ T24] audit: type=1400 audit(1639753146.730:103): avc: denied { mount } for pid=1994 comm="syz-executor.0" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 48.984051][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 49.020445][ T1922] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 49.034029][ T1839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.044563][ T1839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.054381][ T1839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.065022][ T1839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.074879][ T1839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.085284][ T1839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.095075][ T1839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.105653][ T1839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.116951][ T1839] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.128988][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.139572][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.149406][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.160023][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.169836][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.180265][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.190097][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.200607][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.210490][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.220953][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.232415][ T1852] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.243338][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.252471][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.261044][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.269906][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.279213][ T1839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.289754][ T1839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.299573][ T1839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.309982][ T1839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.319784][ T1839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.330225][ T1839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.340054][ T1839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.350462][ T1839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.361566][ T1839] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.369969][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.380451][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.390279][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.400714][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.410783][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.422323][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.433331][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.444055][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.454483][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.464972][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.478829][ T1852] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.486613][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.496484][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.505763][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.515071][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.525549][ T1839] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.534701][ T1839] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.543839][ T1839] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.552693][ T1839] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.570628][ T1852] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.579360][ T1852] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.588274][ T1852] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.596968][ T1852] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 14:59:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000001d40)=[{0x35, 0x0, 0x0, 0xfffffffe}, {0x24}, {0x6, 0x0, 0x0, 0x7ffffdba}]}) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000001a80)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 14:59:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:59:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWSETELEM={0x4c, 0xe, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_KEY_END={0x10, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd0}}, 0x0) 14:59:07 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x5e) pipe(&(0x7f0000000040)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xffffffffffffff2a, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000002100000127bd7000ffdbdff704341408030000000f0000000800012008000f000000000008000200e0000001fa000200a91414aa"], 0x1}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000002dc0)=[{&(0x7f00000014c0)=ANY=[@ANYBLOB="c40f0003000000010000000000000000b40f00b715f24c8b50c4320ef3b64471ff00b9009c05bfdf91a5c2c439ed8b11fe06a2e52ac611123e7a83c6"], 0x1}], 0x1}, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x60, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x400}, 0x2c) 14:59:07 executing program 5: io_setup(0x7, &(0x7f00000000c0)=0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000980)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 14:59:07 executing program 0: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) chroot(&(0x7f00000000c0)='./file0\x00') syz_usbip_server_init(0x0) 14:59:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000001d40)=[{0x35, 0x0, 0x0, 0xfffffffe}, {0x24}, {0x6, 0x0, 0x0, 0x7ffffdba}]}) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000001a80)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 14:59:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWSETELEM={0x4c, 0xe, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_KEY_END={0x10, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd0}}, 0x0) 14:59:07 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x5e) pipe(&(0x7f0000000040)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xffffffffffffff2a, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000002100000127bd7000ffdbdff704341408030000000f0000000800012008000f000000000008000200e0000001fa000200a91414aa"], 0x1}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000002dc0)=[{&(0x7f00000014c0)=ANY=[@ANYBLOB="c40f0003000000010000000000000000b40f00b715f24c8b50c4320ef3b64471ff00b9009c05bfdf91a5c2c439ed8b11fe06a2e52ac611123e7a83c6"], 0x1}], 0x1}, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x60, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x400}, 0x2c) 14:59:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWSETELEM={0x4c, 0xe, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_KEY_END={0x10, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd0}}, 0x0) 14:59:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:59:07 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x5e) pipe(&(0x7f0000000040)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xffffffffffffff2a, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000002100000127bd7000ffdbdff704341408030000000f0000000800012008000f000000000008000200e0000001fa000200a91414aa"], 0x1}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000002dc0)=[{&(0x7f00000014c0)=ANY=[@ANYBLOB="c40f0003000000010000000000000000b40f00b715f24c8b50c4320ef3b64471ff00b9009c05bfdf91a5c2c439ed8b11fe06a2e52ac611123e7a83c6"], 0x1}], 0x1}, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x60, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x400}, 0x2c) 14:59:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000001d40)=[{0x35, 0x0, 0x0, 0xfffffffe}, {0x24}, {0x6, 0x0, 0x0, 0x7ffffdba}]}) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000001a80)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 14:59:07 executing program 5: io_setup(0x7, &(0x7f00000000c0)=0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000980)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 14:59:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @empty}], 0x10) listen(r0, 0x1f) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000300)='.', 0xff04, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @local}, 0x10) 14:59:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:59:07 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="74756e6ccd71c39bbb2d147a5faa3ab9", @ANYRES32=0x0, @ANYBLOB="0000000000000000dfffffff4500001f009078"]}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 14:59:07 executing program 0: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) chroot(&(0x7f00000000c0)='./file0\x00') syz_usbip_server_init(0x0) 14:59:07 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fchown(r0, 0x0, 0x0) 14:59:07 executing program 1: setuid(0xee01) timer_create(0x8, 0x0, &(0x7f0000000180)) 14:59:07 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="74756e6ccd71c39bbb2d147a5faa3ab9", @ANYRES32=0x0, @ANYBLOB="0000000000000000dfffffff4500001f009078"]}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 14:59:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @empty}], 0x10) listen(r0, 0x1f) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000300)='.', 0xff04, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @local}, 0x10) 14:59:07 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @empty}], 0x10) listen(r0, 0x1f) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000300)='.', 0xff04, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @local}, 0x10) 14:59:08 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="74756e6ccd71c39bbb2d147a5faa3ab9", @ANYRES32=0x0, @ANYBLOB="0000000000000000dfffffff4500001f009078"]}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 14:59:08 executing program 1: setuid(0xee01) timer_create(0x8, 0x0, &(0x7f0000000180)) [ 50.211276][ T2048] loop4: detected capacity change from 0 to 16 14:59:08 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="74756e6ccd71c39bbb2d147a5faa3ab9", @ANYRES32=0x0, @ANYBLOB="0000000000000000dfffffff4500001f009078"]}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 14:59:08 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fchown(r0, 0x0, 0x0) 14:59:08 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @empty}], 0x10) listen(r0, 0x1f) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000300)='.', 0xff04, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @local}, 0x10) 14:59:08 executing program 1: setuid(0xee01) timer_create(0x8, 0x0, &(0x7f0000000180)) [ 50.338312][ T2065] loop4: detected capacity change from 0 to 16 14:59:08 executing program 0: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) chroot(&(0x7f00000000c0)='./file0\x00') syz_usbip_server_init(0x0) 14:59:08 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$cont(0x420e, r1, 0x0, 0xf0ffffff7f0000) 14:59:08 executing program 1: setuid(0xee01) timer_create(0x8, 0x0, &(0x7f0000000180)) 14:59:08 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @empty}], 0x10) listen(r0, 0x1f) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000300)='.', 0xff04, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @local}, 0x10) 14:59:08 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fchown(r0, 0x0, 0x0) 14:59:08 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @empty}], 0x10) listen(r0, 0x1f) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000300)='.', 0xff04, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @local}, 0x10) 14:59:08 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$cont(0x420e, r1, 0x0, 0xf0ffffff7f0000) 14:59:08 executing program 1: r0 = fork() r1 = getpgrp(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, 0x0) 14:59:08 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fchown(r0, 0x0, 0x0) 14:59:08 executing program 1: r0 = fork() r1 = getpgrp(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, 0x0) [ 50.762468][ T2074] loop4: detected capacity change from 0 to 16 14:59:08 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$cont(0x420e, r1, 0x0, 0xf0ffffff7f0000) 14:59:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 50.872872][ T2091] loop4: detected capacity change from 0 to 16 14:59:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 14:59:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @empty}], 0x10) listen(r0, 0x1f) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000300)='.', 0xff04, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @local}, 0x10) 14:59:09 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$cont(0x420e, r1, 0x0, 0xf0ffffff7f0000) 14:59:09 executing program 1: r0 = fork() r1 = getpgrp(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, 0x0) 14:59:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newrule={0x28, 0x20, 0x1aa50909956695cb, 0x0, 0x0, {}, [@FRA_TUN_ID={0xc, 0x3, 0x1, 0x0, 0x2}]}, 0x28}}, 0x0) 14:59:09 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="ff617f13a72d96600500a198f190d09283b22d5ad308971ff2c2035a", 0x1c}, {&(0x7f00000000c0)="ff0f00000897c11e3bf35b83b1baf6b6e797054d019a0000000000000e86b58cb91d7268171e2f567d2573084b33ac9e0fb58cd2dc644685", 0x38}], 0x2) 14:59:09 executing program 1: r0 = fork() r1 = getpgrp(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, 0x0) 14:59:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 14:59:09 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="ff617f13a72d96600500a198f190d09283b22d5ad308971ff2c2035a", 0x1c}, {&(0x7f00000000c0)="ff0f00000897c11e3bf35b83b1baf6b6e797054d019a0000000000000e86b58cb91d7268171e2f567d2573084b33ac9e0fb58cd2dc644685", 0x38}], 0x2) 14:59:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=""/39, 0x27}, 0x0) shutdown(r1, 0x2) 14:59:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newrule={0x28, 0x20, 0x1aa50909956695cb, 0x0, 0x0, {}, [@FRA_TUN_ID={0xc, 0x3, 0x1, 0x0, 0x2}]}, 0x28}}, 0x0) 14:59:09 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/schedstat\x00', 0x0, 0x0) 14:59:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 14:59:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084502, 0x0) 14:59:09 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="ff617f13a72d96600500a198f190d09283b22d5ad308971ff2c2035a", 0x1c}, {&(0x7f00000000c0)="ff0f00000897c11e3bf35b83b1baf6b6e797054d019a0000000000000e86b58cb91d7268171e2f567d2573084b33ac9e0fb58cd2dc644685", 0x38}], 0x2) 14:59:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newrule={0x28, 0x20, 0x1aa50909956695cb, 0x0, 0x0, {}, [@FRA_TUN_ID={0xc, 0x3, 0x1, 0x0, 0x2}]}, 0x28}}, 0x0) 14:59:09 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x29, 0x5, 0x0, 0x0) 14:59:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=""/39, 0x27}, 0x0) shutdown(r1, 0x2) 14:59:09 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x29, 0x5, 0x0, 0x0) 14:59:09 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="ff617f13a72d96600500a198f190d09283b22d5ad308971ff2c2035a", 0x1c}, {&(0x7f00000000c0)="ff0f00000897c11e3bf35b83b1baf6b6e797054d019a0000000000000e86b58cb91d7268171e2f567d2573084b33ac9e0fb58cd2dc644685", 0x38}], 0x2) 14:59:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084502, 0x0) 14:59:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=""/39, 0x27}, 0x0) shutdown(r1, 0x2) 14:59:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_newrule={0x28, 0x20, 0x1aa50909956695cb, 0x0, 0x0, {}, [@FRA_TUN_ID={0xc, 0x3, 0x1, 0x0, 0x2}]}, 0x28}}, 0x0) 14:59:09 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x29, 0x5, 0x0, 0x0) 14:59:09 executing program 0: r0 = syz_io_uring_setup(0x3ff0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000ee7000/0xf000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) r4 = mmap$IORING_OFF_SQES(&(0x7f00006d4000/0x4000)=nil, 0x4000, 0x2, 0x4010, r0, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000100)=@IORING_OP_NOP={0x0, 0x5}, 0x3ff) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_POLL_REMOVE={0x7, 0x2}, 0x8) io_uring_enter(r0, 0x688c, 0x0, 0x0, 0x0, 0x10) 14:59:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084502, 0x0) 14:59:09 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x29, 0x5, 0x0, 0x0) 14:59:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084502, 0x0) 14:59:09 executing program 4: socketpair(0x18, 0x0, 0x1, &(0x7f00000001c0)) 14:59:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=""/39, 0x27}, 0x0) shutdown(r1, 0x2) 14:59:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=""/39, 0x27}, 0x0) shutdown(r1, 0x2) 14:59:09 executing program 2: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x4, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "000200", 0x0, 0x21, 0x0, @mcast2, @loopback, [@routing]}}}}}}}, 0x0) 14:59:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_ERSPAN_INDEX={0x8}]}}}]}, 0x48}}, 0x0) 14:59:09 executing program 4: socketpair(0x18, 0x0, 0x1, &(0x7f00000001c0)) 14:59:09 executing program 2: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x4, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "000200", 0x0, 0x21, 0x0, @mcast2, @loopback, [@routing]}}}}}}}, 0x0) 14:59:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_ERSPAN_INDEX={0x8}]}}}]}, 0x48}}, 0x0) [ 51.699248][ C1] hrtimer: interrupt took 17522 ns 14:59:09 executing program 0: r0 = syz_io_uring_setup(0x3ff0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000ee7000/0xf000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) r4 = mmap$IORING_OFF_SQES(&(0x7f00006d4000/0x4000)=nil, 0x4000, 0x2, 0x4010, r0, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000100)=@IORING_OP_NOP={0x0, 0x5}, 0x3ff) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_POLL_REMOVE={0x7, 0x2}, 0x8) io_uring_enter(r0, 0x688c, 0x0, 0x0, 0x0, 0x10) 14:59:09 executing program 4: socketpair(0x18, 0x0, 0x1, &(0x7f00000001c0)) 14:59:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=""/39, 0x27}, 0x0) shutdown(r1, 0x2) 14:59:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=""/39, 0x27}, 0x0) shutdown(r1, 0x2) 14:59:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_ERSPAN_INDEX={0x8}]}}}]}, 0x48}}, 0x0) 14:59:09 executing program 2: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x4, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "000200", 0x0, 0x21, 0x0, @mcast2, @loopback, [@routing]}}}}}}}, 0x0) 14:59:09 executing program 2: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x4, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "000200", 0x0, 0x21, 0x0, @mcast2, @loopback, [@routing]}}}}}}}, 0x0) 14:59:09 executing program 4: socketpair(0x18, 0x0, 0x1, &(0x7f00000001c0)) 14:59:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x30}, @IFLA_GRE_ERSPAN_INDEX={0x8}]}}}]}, 0x48}}, 0x0) 14:59:09 executing program 2: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = dup(r1) write$P9_RWALK(r2, &(0x7f0000000280)=ANY=[], 0x12) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa, 0x80003, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4}, 0x0, 0x9, 0xffffffffffffffff, 0xb) socket$nl_route(0x10, 0x3, 0x0) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x40, 0xe3, 0x0, 0x1, 0x0, 0x8, 0x0, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x200000000000aa5, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0xb160000, 0x0, 0x82}, 0x0, 0x1, r0, 0xd) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @mcast2, 0x8000}, 0x80, 0x0, 0x4e, 0x0, 0x3}}], 0x1, 0x0) io_uring_enter(r3, 0x2ff, 0x0, 0x0, 0x0, 0x0) 14:59:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a09000000000000000000000000000900010073797a3000000000080002400000000214000000110001"], 0x50}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a3000000000080005400000003c14000000110001"], 0x64}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xe, 0xa, 0x9, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) 14:59:09 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000003440)={{r0}, 0x0, 0x0, @inherit={0x78, 0x0}, @devid}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/dev\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) socket$nl_generic(0x10, 0x3, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0x0, 0x5, 0x5a, 0x3, 0x0, 0x529}, 0x0) r2 = socket(0xa, 0x0, 0x102) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) 14:59:10 executing program 0: r0 = syz_io_uring_setup(0x3ff0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000ee7000/0xf000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) r4 = mmap$IORING_OFF_SQES(&(0x7f00006d4000/0x4000)=nil, 0x4000, 0x2, 0x4010, r0, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000100)=@IORING_OP_NOP={0x0, 0x5}, 0x3ff) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_POLL_REMOVE={0x7, 0x2}, 0x8) io_uring_enter(r0, 0x688c, 0x0, 0x0, 0x0, 0x10) 14:59:10 executing program 3: write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xd, 0x0, {{0x10}, 0x400004}}, 0x18) sigaltstack(&(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000000000/0x1000)=nil, 0x0) 14:59:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x5}, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x6, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x4a, 0xd3, 0x8}, 0x20) 14:59:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a09000000000000000000000000000900010073797a3000000000080002400000000214000000110001"], 0x50}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a3000000000080005400000003c14000000110001"], 0x64}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xe, 0xa, 0x9, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) 14:59:10 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000003440)={{r0}, 0x0, 0x0, @inherit={0x78, 0x0}, @devid}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/dev\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) socket$nl_generic(0x10, 0x3, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0x0, 0x5, 0x5a, 0x3, 0x0, 0x529}, 0x0) r2 = socket(0xa, 0x0, 0x102) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) 14:59:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x28, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x3}, [@typed={0x14, 0x7, 0x0, 0x0, @ipv6=@dev}]}, 0x28}}, 0x0) 14:59:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x5}, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x6, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x4a, 0xd3, 0x8}, 0x20) 14:59:10 executing program 3: write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xd, 0x0, {{0x10}, 0x400004}}, 0x18) sigaltstack(&(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000000000/0x1000)=nil, 0x0) 14:59:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x5}, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x6, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x4a, 0xd3, 0x8}, 0x20) 14:59:10 executing program 3: write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xd, 0x0, {{0x10}, 0x400004}}, 0x18) sigaltstack(&(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000000000/0x1000)=nil, 0x0) 14:59:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a09000000000000000000000000000900010073797a3000000000080002400000000214000000110001"], 0x50}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a3000000000080005400000003c14000000110001"], 0x64}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xe, 0xa, 0x9, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) [ 52.297369][ T2209] netlink: 'syz-executor.2': attribute type 7 has an invalid length. 14:59:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x5}, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x6, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x4a, 0xd3, 0x8}, 0x20) 14:59:10 executing program 0: r0 = syz_io_uring_setup(0x3ff0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000ee7000/0xf000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) r4 = mmap$IORING_OFF_SQES(&(0x7f00006d4000/0x4000)=nil, 0x4000, 0x2, 0x4010, r0, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000100)=@IORING_OP_NOP={0x0, 0x5}, 0x3ff) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_POLL_REMOVE={0x7, 0x2}, 0x8) io_uring_enter(r0, 0x688c, 0x0, 0x0, 0x0, 0x10) 14:59:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x28, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x3}, [@typed={0x14, 0x7, 0x0, 0x0, @ipv6=@dev}]}, 0x28}}, 0x0) 14:59:10 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000003440)={{r0}, 0x0, 0x0, @inherit={0x78, 0x0}, @devid}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/dev\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) socket$nl_generic(0x10, 0x3, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0x0, 0x5, 0x5a, 0x3, 0x0, 0x529}, 0x0) r2 = socket(0xa, 0x0, 0x102) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) 14:59:10 executing program 3: write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xd, 0x0, {{0x10}, 0x400004}}, 0x18) sigaltstack(&(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000000000/0x1000)=nil, 0x0) 14:59:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x1d, 0x0, 0x1}, {0x2c}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 14:59:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a09000000000000000000000000000900010073797a3000000000080002400000000214000000110001"], 0x50}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a3000000000080005400000003c14000000110001"], 0x64}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xe, 0xa, 0x9, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) 14:59:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x1d, 0x0, 0x1}, {0x2c}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 14:59:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x6, 0x20, &(0x7f0000000140)="0a000000af6ea2420956ef3cf6b269936f68c4a4690646425d94206d1a5e40c8faee0c364d2535676263554b335a4a9d1dd8eb6e12a9f5a0724cd2a32478e7ef8395232089dd09f2791e4164e700a08d0b8360852f51e56e6e766d1df2b831b4fa7077adbcdcad7615bb82e5e5c780c7aa461db043291790c64384d308b14dc8e85c149e40350bc0be80f469d332fe32d2e4d97a84caab374fedcce84aa02e12e50a5e4ffa44c7e05de2f8835f526b556cb03460c7cf56624eaa207e156c84abfcf051b68d7f61b5f5b89e7e", 0xcc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) writev(r0, &(0x7f0000001540)=[{&(0x7f00000012c0)}, {&(0x7f0000001300)="050b258ec8cdc96f66ca9056143e5516169ce7e8b3d7c39f35cac20ec9bc37c4d5a00cf75eaed6ddaac168c141165b9cd7bbb28bd5c7032f23e07ccbf6a7963e5f76cdf8965ce3e40f9e1ceda5a09ce7fac429b930b9abb2a0bb2e4ae2df5f8b6ad6f35f268f53c18742a357381d876d8f8f09deb417542e0e3fe68601f3813f94dc09efa1ee", 0x86}, {&(0x7f00000013c0)="358dc5c26b3aaaf349c398e77ff8ac9e6dadfbf6", 0x14}, {&(0x7f0000001400)="69fe7e07fd87ec363325dfaeef21c9f7368e75ec3a3227ba347d72cf6d4052a3a970f436380359f89ec4f83dc4a330022f1b667c1fb706982e5201e827f9ba6dafe5296496005ad8c975c7965181796b76b32d736109053250b6e8d8c52cc36bde9900f29692c53bc2a5591f49eea96078b64028b39a1c94b4abe60176f56d4a27806af91da5d591bf10814861e9d6dbb03be49a9c7d974b0e39e4868d9483785dbfd7e1cb348aa2a0afcafc7371e641ed493651", 0xb4}, {&(0x7f00000014c0)="5492ce4be5dcf95fa5e04439a350f4cffd8e16b9e74ec74f52276ebf00ec50f7533624e0", 0x24}, {&(0x7f0000001500)="4959696f015ff93b93c7d0463b58578ba4f1cc0113636ce0107254", 0x1b}], 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/12, 0xc}], 0x1, 0xff, 0x0) 14:59:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x28, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x3}, [@typed={0x14, 0x7, 0x0, 0x0, @ipv6=@dev}]}, 0x28}}, 0x0) [ 52.649469][ T2237] netlink: 'syz-executor.2': attribute type 7 has an invalid length. 14:59:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x6, 0x20, &(0x7f0000000140)="0a000000af6ea2420956ef3cf6b269936f68c4a4690646425d94206d1a5e40c8faee0c364d2535676263554b335a4a9d1dd8eb6e12a9f5a0724cd2a32478e7ef8395232089dd09f2791e4164e700a08d0b8360852f51e56e6e766d1df2b831b4fa7077adbcdcad7615bb82e5e5c780c7aa461db043291790c64384d308b14dc8e85c149e40350bc0be80f469d332fe32d2e4d97a84caab374fedcce84aa02e12e50a5e4ffa44c7e05de2f8835f526b556cb03460c7cf56624eaa207e156c84abfcf051b68d7f61b5f5b89e7e", 0xcc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) writev(r0, &(0x7f0000001540)=[{&(0x7f00000012c0)}, {&(0x7f0000001300)="050b258ec8cdc96f66ca9056143e5516169ce7e8b3d7c39f35cac20ec9bc37c4d5a00cf75eaed6ddaac168c141165b9cd7bbb28bd5c7032f23e07ccbf6a7963e5f76cdf8965ce3e40f9e1ceda5a09ce7fac429b930b9abb2a0bb2e4ae2df5f8b6ad6f35f268f53c18742a357381d876d8f8f09deb417542e0e3fe68601f3813f94dc09efa1ee", 0x86}, {&(0x7f00000013c0)="358dc5c26b3aaaf349c398e77ff8ac9e6dadfbf6", 0x14}, {&(0x7f0000001400)="69fe7e07fd87ec363325dfaeef21c9f7368e75ec3a3227ba347d72cf6d4052a3a970f436380359f89ec4f83dc4a330022f1b667c1fb706982e5201e827f9ba6dafe5296496005ad8c975c7965181796b76b32d736109053250b6e8d8c52cc36bde9900f29692c53bc2a5591f49eea96078b64028b39a1c94b4abe60176f56d4a27806af91da5d591bf10814861e9d6dbb03be49a9c7d974b0e39e4868d9483785dbfd7e1cb348aa2a0afcafc7371e641ed493651", 0xb4}, {&(0x7f00000014c0)="5492ce4be5dcf95fa5e04439a350f4cffd8e16b9e74ec74f52276ebf00ec50f7533624e0", 0x24}, {&(0x7f0000001500)="4959696f015ff93b93c7d0463b58578ba4f1cc0113636ce0107254", 0x1b}], 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/12, 0xc}], 0x1, 0xff, 0x0) 14:59:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x6, 0x20, &(0x7f0000000140)="0a000000af6ea2420956ef3cf6b269936f68c4a4690646425d94206d1a5e40c8faee0c364d2535676263554b335a4a9d1dd8eb6e12a9f5a0724cd2a32478e7ef8395232089dd09f2791e4164e700a08d0b8360852f51e56e6e766d1df2b831b4fa7077adbcdcad7615bb82e5e5c780c7aa461db043291790c64384d308b14dc8e85c149e40350bc0be80f469d332fe32d2e4d97a84caab374fedcce84aa02e12e50a5e4ffa44c7e05de2f8835f526b556cb03460c7cf56624eaa207e156c84abfcf051b68d7f61b5f5b89e7e", 0xcc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) writev(r0, &(0x7f0000001540)=[{&(0x7f00000012c0)}, {&(0x7f0000001300)="050b258ec8cdc96f66ca9056143e5516169ce7e8b3d7c39f35cac20ec9bc37c4d5a00cf75eaed6ddaac168c141165b9cd7bbb28bd5c7032f23e07ccbf6a7963e5f76cdf8965ce3e40f9e1ceda5a09ce7fac429b930b9abb2a0bb2e4ae2df5f8b6ad6f35f268f53c18742a357381d876d8f8f09deb417542e0e3fe68601f3813f94dc09efa1ee", 0x86}, {&(0x7f00000013c0)="358dc5c26b3aaaf349c398e77ff8ac9e6dadfbf6", 0x14}, {&(0x7f0000001400)="69fe7e07fd87ec363325dfaeef21c9f7368e75ec3a3227ba347d72cf6d4052a3a970f436380359f89ec4f83dc4a330022f1b667c1fb706982e5201e827f9ba6dafe5296496005ad8c975c7965181796b76b32d736109053250b6e8d8c52cc36bde9900f29692c53bc2a5591f49eea96078b64028b39a1c94b4abe60176f56d4a27806af91da5d591bf10814861e9d6dbb03be49a9c7d974b0e39e4868d9483785dbfd7e1cb348aa2a0afcafc7371e641ed493651", 0xb4}, {&(0x7f00000014c0)="5492ce4be5dcf95fa5e04439a350f4cffd8e16b9e74ec74f52276ebf00ec50f7533624e0", 0x24}, {&(0x7f0000001500)="4959696f015ff93b93c7d0463b58578ba4f1cc0113636ce0107254", 0x1b}], 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/12, 0xc}], 0x1, 0xff, 0x0) 14:59:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x1d, 0x0, 0x1}, {0x2c}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) [ 52.750347][ T2252] netlink: 'syz-executor.2': attribute type 7 has an invalid length. 14:59:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x6, 0x20, &(0x7f0000000140)="0a000000af6ea2420956ef3cf6b269936f68c4a4690646425d94206d1a5e40c8faee0c364d2535676263554b335a4a9d1dd8eb6e12a9f5a0724cd2a32478e7ef8395232089dd09f2791e4164e700a08d0b8360852f51e56e6e766d1df2b831b4fa7077adbcdcad7615bb82e5e5c780c7aa461db043291790c64384d308b14dc8e85c149e40350bc0be80f469d332fe32d2e4d97a84caab374fedcce84aa02e12e50a5e4ffa44c7e05de2f8835f526b556cb03460c7cf56624eaa207e156c84abfcf051b68d7f61b5f5b89e7e", 0xcc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) writev(r0, &(0x7f0000001540)=[{&(0x7f00000012c0)}, {&(0x7f0000001300)="050b258ec8cdc96f66ca9056143e5516169ce7e8b3d7c39f35cac20ec9bc37c4d5a00cf75eaed6ddaac168c141165b9cd7bbb28bd5c7032f23e07ccbf6a7963e5f76cdf8965ce3e40f9e1ceda5a09ce7fac429b930b9abb2a0bb2e4ae2df5f8b6ad6f35f268f53c18742a357381d876d8f8f09deb417542e0e3fe68601f3813f94dc09efa1ee", 0x86}, {&(0x7f00000013c0)="358dc5c26b3aaaf349c398e77ff8ac9e6dadfbf6", 0x14}, {&(0x7f0000001400)="69fe7e07fd87ec363325dfaeef21c9f7368e75ec3a3227ba347d72cf6d4052a3a970f436380359f89ec4f83dc4a330022f1b667c1fb706982e5201e827f9ba6dafe5296496005ad8c975c7965181796b76b32d736109053250b6e8d8c52cc36bde9900f29692c53bc2a5591f49eea96078b64028b39a1c94b4abe60176f56d4a27806af91da5d591bf10814861e9d6dbb03be49a9c7d974b0e39e4868d9483785dbfd7e1cb348aa2a0afcafc7371e641ed493651", 0xb4}, {&(0x7f00000014c0)="5492ce4be5dcf95fa5e04439a350f4cffd8e16b9e74ec74f52276ebf00ec50f7533624e0", 0x24}, {&(0x7f0000001500)="4959696f015ff93b93c7d0463b58578ba4f1cc0113636ce0107254", 0x1b}], 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/12, 0xc}], 0x1, 0xff, 0x0) 14:59:10 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000003440)={{r0}, 0x0, 0x0, @inherit={0x78, 0x0}, @devid}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/dev\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) socket$nl_generic(0x10, 0x3, 0x10) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x0, 0x0, 0x5, 0x5a, 0x3, 0x0, 0x529}, 0x0) r2 = socket(0xa, 0x0, 0x102) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) 14:59:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x6, 0x20, &(0x7f0000000140)="0a000000af6ea2420956ef3cf6b269936f68c4a4690646425d94206d1a5e40c8faee0c364d2535676263554b335a4a9d1dd8eb6e12a9f5a0724cd2a32478e7ef8395232089dd09f2791e4164e700a08d0b8360852f51e56e6e766d1df2b831b4fa7077adbcdcad7615bb82e5e5c780c7aa461db043291790c64384d308b14dc8e85c149e40350bc0be80f469d332fe32d2e4d97a84caab374fedcce84aa02e12e50a5e4ffa44c7e05de2f8835f526b556cb03460c7cf56624eaa207e156c84abfcf051b68d7f61b5f5b89e7e", 0xcc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) writev(r0, &(0x7f0000001540)=[{&(0x7f00000012c0)}, {&(0x7f0000001300)="050b258ec8cdc96f66ca9056143e5516169ce7e8b3d7c39f35cac20ec9bc37c4d5a00cf75eaed6ddaac168c141165b9cd7bbb28bd5c7032f23e07ccbf6a7963e5f76cdf8965ce3e40f9e1ceda5a09ce7fac429b930b9abb2a0bb2e4ae2df5f8b6ad6f35f268f53c18742a357381d876d8f8f09deb417542e0e3fe68601f3813f94dc09efa1ee", 0x86}, {&(0x7f00000013c0)="358dc5c26b3aaaf349c398e77ff8ac9e6dadfbf6", 0x14}, {&(0x7f0000001400)="69fe7e07fd87ec363325dfaeef21c9f7368e75ec3a3227ba347d72cf6d4052a3a970f436380359f89ec4f83dc4a330022f1b667c1fb706982e5201e827f9ba6dafe5296496005ad8c975c7965181796b76b32d736109053250b6e8d8c52cc36bde9900f29692c53bc2a5591f49eea96078b64028b39a1c94b4abe60176f56d4a27806af91da5d591bf10814861e9d6dbb03be49a9c7d974b0e39e4868d9483785dbfd7e1cb348aa2a0afcafc7371e641ed493651", 0xb4}, {&(0x7f00000014c0)="5492ce4be5dcf95fa5e04439a350f4cffd8e16b9e74ec74f52276ebf00ec50f7533624e0", 0x24}, {&(0x7f0000001500)="4959696f015ff93b93c7d0463b58578ba4f1cc0113636ce0107254", 0x1b}], 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/12, 0xc}], 0x1, 0xff, 0x0) 14:59:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x28, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x3}, [@typed={0x14, 0x7, 0x0, 0x0, @ipv6=@dev}]}, 0x28}}, 0x0) 14:59:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x1d, 0x0, 0x1}, {0x2c}, {0x6}]}, 0x10) sendmsg$inet(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 14:59:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x6, 0x20, &(0x7f0000000140)="0a000000af6ea2420956ef3cf6b269936f68c4a4690646425d94206d1a5e40c8faee0c364d2535676263554b335a4a9d1dd8eb6e12a9f5a0724cd2a32478e7ef8395232089dd09f2791e4164e700a08d0b8360852f51e56e6e766d1df2b831b4fa7077adbcdcad7615bb82e5e5c780c7aa461db043291790c64384d308b14dc8e85c149e40350bc0be80f469d332fe32d2e4d97a84caab374fedcce84aa02e12e50a5e4ffa44c7e05de2f8835f526b556cb03460c7cf56624eaa207e156c84abfcf051b68d7f61b5f5b89e7e", 0xcc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) writev(r0, &(0x7f0000001540)=[{&(0x7f00000012c0)}, {&(0x7f0000001300)="050b258ec8cdc96f66ca9056143e5516169ce7e8b3d7c39f35cac20ec9bc37c4d5a00cf75eaed6ddaac168c141165b9cd7bbb28bd5c7032f23e07ccbf6a7963e5f76cdf8965ce3e40f9e1ceda5a09ce7fac429b930b9abb2a0bb2e4ae2df5f8b6ad6f35f268f53c18742a357381d876d8f8f09deb417542e0e3fe68601f3813f94dc09efa1ee", 0x86}, {&(0x7f00000013c0)="358dc5c26b3aaaf349c398e77ff8ac9e6dadfbf6", 0x14}, {&(0x7f0000001400)="69fe7e07fd87ec363325dfaeef21c9f7368e75ec3a3227ba347d72cf6d4052a3a970f436380359f89ec4f83dc4a330022f1b667c1fb706982e5201e827f9ba6dafe5296496005ad8c975c7965181796b76b32d736109053250b6e8d8c52cc36bde9900f29692c53bc2a5591f49eea96078b64028b39a1c94b4abe60176f56d4a27806af91da5d591bf10814861e9d6dbb03be49a9c7d974b0e39e4868d9483785dbfd7e1cb348aa2a0afcafc7371e641ed493651", 0xb4}, {&(0x7f00000014c0)="5492ce4be5dcf95fa5e04439a350f4cffd8e16b9e74ec74f52276ebf00ec50f7533624e0", 0x24}, {&(0x7f0000001500)="4959696f015ff93b93c7d0463b58578ba4f1cc0113636ce0107254", 0x1b}], 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/12, 0xc}], 0x1, 0xff, 0x0) 14:59:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x6, 0x20, &(0x7f0000000140)="0a000000af6ea2420956ef3cf6b269936f68c4a4690646425d94206d1a5e40c8faee0c364d2535676263554b335a4a9d1dd8eb6e12a9f5a0724cd2a32478e7ef8395232089dd09f2791e4164e700a08d0b8360852f51e56e6e766d1df2b831b4fa7077adbcdcad7615bb82e5e5c780c7aa461db043291790c64384d308b14dc8e85c149e40350bc0be80f469d332fe32d2e4d97a84caab374fedcce84aa02e12e50a5e4ffa44c7e05de2f8835f526b556cb03460c7cf56624eaa207e156c84abfcf051b68d7f61b5f5b89e7e", 0xcc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) writev(r0, &(0x7f0000001540)=[{&(0x7f00000012c0)}, {&(0x7f0000001300)="050b258ec8cdc96f66ca9056143e5516169ce7e8b3d7c39f35cac20ec9bc37c4d5a00cf75eaed6ddaac168c141165b9cd7bbb28bd5c7032f23e07ccbf6a7963e5f76cdf8965ce3e40f9e1ceda5a09ce7fac429b930b9abb2a0bb2e4ae2df5f8b6ad6f35f268f53c18742a357381d876d8f8f09deb417542e0e3fe68601f3813f94dc09efa1ee", 0x86}, {&(0x7f00000013c0)="358dc5c26b3aaaf349c398e77ff8ac9e6dadfbf6", 0x14}, {&(0x7f0000001400)="69fe7e07fd87ec363325dfaeef21c9f7368e75ec3a3227ba347d72cf6d4052a3a970f436380359f89ec4f83dc4a330022f1b667c1fb706982e5201e827f9ba6dafe5296496005ad8c975c7965181796b76b32d736109053250b6e8d8c52cc36bde9900f29692c53bc2a5591f49eea96078b64028b39a1c94b4abe60176f56d4a27806af91da5d591bf10814861e9d6dbb03be49a9c7d974b0e39e4868d9483785dbfd7e1cb348aa2a0afcafc7371e641ed493651", 0xb4}, {&(0x7f00000014c0)="5492ce4be5dcf95fa5e04439a350f4cffd8e16b9e74ec74f52276ebf00ec50f7533624e0", 0x24}, {&(0x7f0000001500)="4959696f015ff93b93c7d0463b58578ba4f1cc0113636ce0107254", 0x1b}], 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/12, 0xc}], 0x1, 0xff, 0x0) 14:59:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e220e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 14:59:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x6, 0x20, &(0x7f0000000140)="0a000000af6ea2420956ef3cf6b269936f68c4a4690646425d94206d1a5e40c8faee0c364d2535676263554b335a4a9d1dd8eb6e12a9f5a0724cd2a32478e7ef8395232089dd09f2791e4164e700a08d0b8360852f51e56e6e766d1df2b831b4fa7077adbcdcad7615bb82e5e5c780c7aa461db043291790c64384d308b14dc8e85c149e40350bc0be80f469d332fe32d2e4d97a84caab374fedcce84aa02e12e50a5e4ffa44c7e05de2f8835f526b556cb03460c7cf56624eaa207e156c84abfcf051b68d7f61b5f5b89e7e", 0xcc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) writev(r0, &(0x7f0000001540)=[{&(0x7f00000012c0)}, {&(0x7f0000001300)="050b258ec8cdc96f66ca9056143e5516169ce7e8b3d7c39f35cac20ec9bc37c4d5a00cf75eaed6ddaac168c141165b9cd7bbb28bd5c7032f23e07ccbf6a7963e5f76cdf8965ce3e40f9e1ceda5a09ce7fac429b930b9abb2a0bb2e4ae2df5f8b6ad6f35f268f53c18742a357381d876d8f8f09deb417542e0e3fe68601f3813f94dc09efa1ee", 0x86}, {&(0x7f00000013c0)="358dc5c26b3aaaf349c398e77ff8ac9e6dadfbf6", 0x14}, {&(0x7f0000001400)="69fe7e07fd87ec363325dfaeef21c9f7368e75ec3a3227ba347d72cf6d4052a3a970f436380359f89ec4f83dc4a330022f1b667c1fb706982e5201e827f9ba6dafe5296496005ad8c975c7965181796b76b32d736109053250b6e8d8c52cc36bde9900f29692c53bc2a5591f49eea96078b64028b39a1c94b4abe60176f56d4a27806af91da5d591bf10814861e9d6dbb03be49a9c7d974b0e39e4868d9483785dbfd7e1cb348aa2a0afcafc7371e641ed493651", 0xb4}, {&(0x7f00000014c0)="5492ce4be5dcf95fa5e04439a350f4cffd8e16b9e74ec74f52276ebf00ec50f7533624e0", 0x24}, {&(0x7f0000001500)="4959696f015ff93b93c7d0463b58578ba4f1cc0113636ce0107254", 0x1b}], 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/12, 0xc}], 0x1, 0xff, 0x0) 14:59:10 executing program 2: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') lremovexattr(&(0x7f00000000c0)='./file0\x00', 0x0) [ 53.030217][ T2261] netlink: 'syz-executor.2': attribute type 7 has an invalid length. 14:59:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e220e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 14:59:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x6, 0x20, &(0x7f0000000140)="0a000000af6ea2420956ef3cf6b269936f68c4a4690646425d94206d1a5e40c8faee0c364d2535676263554b335a4a9d1dd8eb6e12a9f5a0724cd2a32478e7ef8395232089dd09f2791e4164e700a08d0b8360852f51e56e6e766d1df2b831b4fa7077adbcdcad7615bb82e5e5c780c7aa461db043291790c64384d308b14dc8e85c149e40350bc0be80f469d332fe32d2e4d97a84caab374fedcce84aa02e12e50a5e4ffa44c7e05de2f8835f526b556cb03460c7cf56624eaa207e156c84abfcf051b68d7f61b5f5b89e7e", 0xcc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) writev(r0, &(0x7f0000001540)=[{&(0x7f00000012c0)}, {&(0x7f0000001300)="050b258ec8cdc96f66ca9056143e5516169ce7e8b3d7c39f35cac20ec9bc37c4d5a00cf75eaed6ddaac168c141165b9cd7bbb28bd5c7032f23e07ccbf6a7963e5f76cdf8965ce3e40f9e1ceda5a09ce7fac429b930b9abb2a0bb2e4ae2df5f8b6ad6f35f268f53c18742a357381d876d8f8f09deb417542e0e3fe68601f3813f94dc09efa1ee", 0x86}, {&(0x7f00000013c0)="358dc5c26b3aaaf349c398e77ff8ac9e6dadfbf6", 0x14}, {&(0x7f0000001400)="69fe7e07fd87ec363325dfaeef21c9f7368e75ec3a3227ba347d72cf6d4052a3a970f436380359f89ec4f83dc4a330022f1b667c1fb706982e5201e827f9ba6dafe5296496005ad8c975c7965181796b76b32d736109053250b6e8d8c52cc36bde9900f29692c53bc2a5591f49eea96078b64028b39a1c94b4abe60176f56d4a27806af91da5d591bf10814861e9d6dbb03be49a9c7d974b0e39e4868d9483785dbfd7e1cb348aa2a0afcafc7371e641ed493651", 0xb4}, {&(0x7f00000014c0)="5492ce4be5dcf95fa5e04439a350f4cffd8e16b9e74ec74f52276ebf00ec50f7533624e0", 0x24}, {&(0x7f0000001500)="4959696f015ff93b93c7d0463b58578ba4f1cc0113636ce0107254", 0x1b}], 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/12, 0xc}], 0x1, 0xff, 0x0) 14:59:10 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xb, 0x0, 0x0) 14:59:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) set_mempolicy(0x3, &(0x7f0000000000)=0x7ff, 0x5be) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000380)={0x0, 0xffffffffffffff48, &(0x7f0000000340)={&(0x7f0000000300)={0x34, r1, 0x207, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'gre0\x00'}}}}}, 0x34}}, 0x0) 14:59:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e220e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 14:59:10 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000100), 0x4) 14:59:10 executing program 5: syz_emit_ethernet(0x47, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x11, 0x2c, 0x0, @remote, @local, {[@routing={0x3b, 0x0, 0x0, 0x5}], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, ')'}}}}}}, 0x0) 14:59:10 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xb, 0x0, 0x0) 14:59:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x6, 0x20, &(0x7f0000000140)="0a000000af6ea2420956ef3cf6b269936f68c4a4690646425d94206d1a5e40c8faee0c364d2535676263554b335a4a9d1dd8eb6e12a9f5a0724cd2a32478e7ef8395232089dd09f2791e4164e700a08d0b8360852f51e56e6e766d1df2b831b4fa7077adbcdcad7615bb82e5e5c780c7aa461db043291790c64384d308b14dc8e85c149e40350bc0be80f469d332fe32d2e4d97a84caab374fedcce84aa02e12e50a5e4ffa44c7e05de2f8835f526b556cb03460c7cf56624eaa207e156c84abfcf051b68d7f61b5f5b89e7e", 0xcc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) writev(r0, &(0x7f0000001540)=[{&(0x7f00000012c0)}, {&(0x7f0000001300)="050b258ec8cdc96f66ca9056143e5516169ce7e8b3d7c39f35cac20ec9bc37c4d5a00cf75eaed6ddaac168c141165b9cd7bbb28bd5c7032f23e07ccbf6a7963e5f76cdf8965ce3e40f9e1ceda5a09ce7fac429b930b9abb2a0bb2e4ae2df5f8b6ad6f35f268f53c18742a357381d876d8f8f09deb417542e0e3fe68601f3813f94dc09efa1ee", 0x86}, {&(0x7f00000013c0)="358dc5c26b3aaaf349c398e77ff8ac9e6dadfbf6", 0x14}, {&(0x7f0000001400)="69fe7e07fd87ec363325dfaeef21c9f7368e75ec3a3227ba347d72cf6d4052a3a970f436380359f89ec4f83dc4a330022f1b667c1fb706982e5201e827f9ba6dafe5296496005ad8c975c7965181796b76b32d736109053250b6e8d8c52cc36bde9900f29692c53bc2a5591f49eea96078b64028b39a1c94b4abe60176f56d4a27806af91da5d591bf10814861e9d6dbb03be49a9c7d974b0e39e4868d9483785dbfd7e1cb348aa2a0afcafc7371e641ed493651", 0xb4}, {&(0x7f00000014c0)="5492ce4be5dcf95fa5e04439a350f4cffd8e16b9e74ec74f52276ebf00ec50f7533624e0", 0x24}, {&(0x7f0000001500)="4959696f015ff93b93c7d0463b58578ba4f1cc0113636ce0107254", 0x1b}], 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/12, 0xc}], 0x1, 0xff, 0x0) 14:59:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e220e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 14:59:10 executing program 5: syz_emit_ethernet(0x47, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x11, 0x2c, 0x0, @remote, @local, {[@routing={0x3b, 0x0, 0x0, 0x5}], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, ')'}}}}}}, 0x0) 14:59:10 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xb, 0x0, 0x0) 14:59:11 executing program 5: syz_emit_ethernet(0x47, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x11, 0x2c, 0x0, @remote, @local, {[@routing={0x3b, 0x0, 0x0, 0x5}], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, ')'}}}}}}, 0x0) [ 53.176448][ T2290] tipc: Started in network mode [ 53.181412][ T2290] tipc: Node identity , cluster identity 4711 [ 53.187468][ T2290] tipc: Failed to obtain node identity [ 53.193010][ T2290] tipc: Enabling of bearer rejected, failed to enable media [ 53.207503][ T24] kauditd_printk_skb: 36 callbacks suppressed 14:59:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d3f4655fd3f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32373131373433303500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000079d64a30b19941939d5c6a24092e8c9a010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004400000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000010500)="ff000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d3f4655fd3f4655fd3f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d3f4655fd3f4655fd3f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000020000000", 0x40, 0x2400}, {&(0x7f0000011700)="200000004c7ddc8f4c7ddc8f00000000d3f4655f00"/32, 0x20, 0x2480}, {&(0x7f0000011800)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2800}, {&(0x7f0000011900)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2880}, {&(0x7f0000011a00)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000050000000", 0x40, 0x2c00}, {&(0x7f0000011b00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2c80}, {&(0x7f0000011c00)="c041000000380000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000030000000", 0x40, 0x4800}, {&(0x7f0000011d00)="20000000000000000000000000000000d3f4655f000000000000000000000000000002ea00"/64, 0x40, 0x4880}, {&(0x7f0000011e00)="ed4100003c000000d3f4655fd3f4655fd3f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000b65c7bf3000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4c00}, {&(0x7f0000011f00)="ed8100001a040000d3f4655fd3f4655fd3f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000005a0e0125000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xa0, 0x5000}, {&(0x7f0000012000)="ffa1000026000000d3f4655fd3f4655fd3f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3237313137343330352f66696c65302f66696c653000000000000000000000000000000000000000000000b8e8b49f000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xa0, 0x5400}, {&(0x7f0000012100)="ed8100000a000000d3f4655fd3f4655fd3f4655f000000000000010000000000000000100100000073797a6b616c6c65727300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b63b3ec000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x5800}, {&(0x7f0000012200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800010000000af30100040000000000000000000000050000007000000000000000000000000000000000000000000000000000000000000000000000000000000044cd9848000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xc0, 0x5be0}, {&(0x7f0000012300)="ed81000064000000d3f4655fd3f4655fd3f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c4794644c000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x63c0}, {&(0x7f0000012500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000012600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x18000}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x18800}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19000}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19800}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a000}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a800}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1b000}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x20400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x21400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x28000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x28400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x28800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x28c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x29000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x29400}, {&(0x7f0000013900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}], 0x0, &(0x7f0000013e00)) 14:59:11 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xb, 0x0, 0x0) 14:59:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) set_mempolicy(0x3, &(0x7f0000000000)=0x7ff, 0x5be) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000380)={0x0, 0xffffffffffffff48, &(0x7f0000000340)={&(0x7f0000000300)={0x34, r1, 0x207, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'gre0\x00'}}}}}, 0x34}}, 0x0) 14:59:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x74, 0x0, 0x0, 0x3e}]}) 14:59:11 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)={0x14, r0, 0x313}, 0x14}}, 0x0) 14:59:11 executing program 5: syz_emit_ethernet(0x47, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x11, 0x2c, 0x0, @remote, @local, {[@routing={0x3b, 0x0, 0x0, 0x5}], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, ')'}}}}}}, 0x0) 14:59:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6000000}, [@ldst={0x3, 0x2, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:59:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000008c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) [ 53.207515][ T24] audit: type=1400 audit(1639753150.990:140): avc: denied { setopt } for pid=2291 comm="syz-executor.1" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 53.252919][ T2304] loop4: detected capacity change from 0 to 2048 14:59:11 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)={0x14, r0, 0x313}, 0x14}}, 0x0) [ 53.300423][ T2310] tipc: Started in network mode [ 53.305328][ T2310] tipc: Node identity , cluster identity 4711 [ 53.311453][ T2310] tipc: Failed to obtain node identity [ 53.316901][ T2310] tipc: Enabling of bearer rejected, failed to enable media 14:59:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x74, 0x0, 0x0, 0x3e}]}) [ 53.335318][ T24] audit: type=1400 audit(1639753151.120:141): avc: denied { prog_load } for pid=2317 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 53.359339][ T2304] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:59:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000008c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 14:59:11 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)={0x14, r0, 0x313}, 0x14}}, 0x0) 14:59:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d3f4655fd3f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32373131373433303500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000079d64a30b19941939d5c6a24092e8c9a010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004400000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000010500)="ff000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d3f4655fd3f4655fd3f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d3f4655fd3f4655fd3f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000020000000", 0x40, 0x2400}, {&(0x7f0000011700)="200000004c7ddc8f4c7ddc8f00000000d3f4655f00"/32, 0x20, 0x2480}, {&(0x7f0000011800)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2800}, {&(0x7f0000011900)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2880}, {&(0x7f0000011a00)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000050000000", 0x40, 0x2c00}, {&(0x7f0000011b00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2c80}, {&(0x7f0000011c00)="c041000000380000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000030000000", 0x40, 0x4800}, {&(0x7f0000011d00)="20000000000000000000000000000000d3f4655f000000000000000000000000000002ea00"/64, 0x40, 0x4880}, {&(0x7f0000011e00)="ed4100003c000000d3f4655fd3f4655fd3f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000b65c7bf3000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4c00}, {&(0x7f0000011f00)="ed8100001a040000d3f4655fd3f4655fd3f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000005a0e0125000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xa0, 0x5000}, {&(0x7f0000012000)="ffa1000026000000d3f4655fd3f4655fd3f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3237313137343330352f66696c65302f66696c653000000000000000000000000000000000000000000000b8e8b49f000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xa0, 0x5400}, {&(0x7f0000012100)="ed8100000a000000d3f4655fd3f4655fd3f4655f000000000000010000000000000000100100000073797a6b616c6c65727300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b63b3ec000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x5800}, {&(0x7f0000012200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800010000000af30100040000000000000000000000050000007000000000000000000000000000000000000000000000000000000000000000000000000000000044cd9848000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xc0, 0x5be0}, {&(0x7f0000012300)="ed81000064000000d3f4655fd3f4655fd3f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c4794644c000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x63c0}, {&(0x7f0000012500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000012600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x18000}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x18800}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19000}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19800}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a000}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a800}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1b000}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x20400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x21400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x28000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x28400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x28800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x28c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x29000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x29400}, {&(0x7f0000013900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}], 0x0, &(0x7f0000013e00)) 14:59:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x74, 0x0, 0x0, 0x3e}]}) 14:59:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) set_mempolicy(0x3, &(0x7f0000000000)=0x7ff, 0x5be) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000380)={0x0, 0xffffffffffffff48, &(0x7f0000000340)={&(0x7f0000000300)={0x34, r1, 0x207, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'gre0\x00'}}}}}, 0x34}}, 0x0) 14:59:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6000000}, [@ldst={0x3, 0x2, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 53.388872][ T24] audit: type=1400 audit(1639753151.170:142): avc: denied { mount } for pid=2301 comm="syz-executor.4" name="/" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 53.410874][ T24] audit: type=1400 audit(1639753151.170:143): avc: denied { prog_run } for pid=2317 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 14:59:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000008c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 14:59:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) set_mempolicy(0x3, &(0x7f0000000000)=0x7ff, 0x5be) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000380)={0x0, 0xffffffffffffff48, &(0x7f0000000340)={&(0x7f0000000300)={0x34, r1, 0x207, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'gre0\x00'}}}}}, 0x34}}, 0x0) 14:59:11 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)={0x14, r0, 0x313}, 0x14}}, 0x0) [ 53.456954][ T2330] tipc: Started in network mode [ 53.462012][ T2330] tipc: Node identity , cluster identity 4711 [ 53.468116][ T2330] tipc: Failed to obtain node identity [ 53.473583][ T2330] tipc: Enabling of bearer rejected, failed to enable media 14:59:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000008c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 14:59:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x74, 0x0, 0x0, 0x3e}]}) 14:59:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000008c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 14:59:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6000000}, [@ldst={0x3, 0x2, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:59:11 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000000)='W'}, 0x48) [ 53.518127][ T2340] loop4: detected capacity change from 0 to 2048 [ 53.536593][ T2345] tipc: Started in network mode [ 53.541960][ T2345] tipc: Node identity , cluster identity 4711 [ 53.548141][ T2345] tipc: Failed to obtain node identity [ 53.553619][ T2345] tipc: Enabling of bearer rejected, failed to enable media 14:59:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d3f4655fd3f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32373131373433303500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000079d64a30b19941939d5c6a24092e8c9a010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004400000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000010500)="ff000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d3f4655fd3f4655fd3f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d3f4655fd3f4655fd3f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000020000000", 0x40, 0x2400}, {&(0x7f0000011700)="200000004c7ddc8f4c7ddc8f00000000d3f4655f00"/32, 0x20, 0x2480}, {&(0x7f0000011800)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2800}, {&(0x7f0000011900)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2880}, {&(0x7f0000011a00)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000050000000", 0x40, 0x2c00}, {&(0x7f0000011b00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2c80}, {&(0x7f0000011c00)="c041000000380000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000030000000", 0x40, 0x4800}, {&(0x7f0000011d00)="20000000000000000000000000000000d3f4655f000000000000000000000000000002ea00"/64, 0x40, 0x4880}, {&(0x7f0000011e00)="ed4100003c000000d3f4655fd3f4655fd3f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000b65c7bf3000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4c00}, {&(0x7f0000011f00)="ed8100001a040000d3f4655fd3f4655fd3f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000005a0e0125000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xa0, 0x5000}, {&(0x7f0000012000)="ffa1000026000000d3f4655fd3f4655fd3f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3237313137343330352f66696c65302f66696c653000000000000000000000000000000000000000000000b8e8b49f000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xa0, 0x5400}, {&(0x7f0000012100)="ed8100000a000000d3f4655fd3f4655fd3f4655f000000000000010000000000000000100100000073797a6b616c6c65727300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b63b3ec000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x5800}, {&(0x7f0000012200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800010000000af30100040000000000000000000000050000007000000000000000000000000000000000000000000000000000000000000000000000000000000044cd9848000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xc0, 0x5be0}, {&(0x7f0000012300)="ed81000064000000d3f4655fd3f4655fd3f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c4794644c000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x63c0}, {&(0x7f0000012500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000012600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x18000}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x18800}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19000}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19800}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a000}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a800}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1b000}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x20400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x21400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x28000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x28400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x28800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x28c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x29000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x29400}, {&(0x7f0000013900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}], 0x0, &(0x7f0000013e00)) 14:59:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e008105e00f80ecdbc0b9f207c804a01e000000302e200000008303f5000a0002000000da1b40d80589", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 14:59:11 executing program 2: futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 14:59:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000008c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 14:59:11 executing program 2: futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) [ 53.585260][ T2340] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 53.599394][ T24] audit: type=1400 audit(1639753151.230:144): avc: denied { unmount } for pid=1839 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 14:59:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6000000}, [@ldst={0x3, 0x2, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:59:11 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000000)='W'}, 0x48) 14:59:11 executing program 2: futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) [ 53.651004][ T2358] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. 14:59:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e008105e00f80ecdbc0b9f207c804a01e000000302e200000008303f5000a0002000000da1b40d80589", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 14:59:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000008c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 14:59:11 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000000)='W'}, 0x48) 14:59:11 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000000)='W'}, 0x48) [ 53.703022][ T2369] loop4: detected capacity change from 0 to 2048 [ 53.725509][ T2374] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. [ 53.744327][ T2369] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:59:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d3f4655fd3f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32373131373433303500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000079d64a30b19941939d5c6a24092e8c9a010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004400000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000010500)="ff000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d3f4655fd3f4655fd3f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d3f4655fd3f4655fd3f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000020000000", 0x40, 0x2400}, {&(0x7f0000011700)="200000004c7ddc8f4c7ddc8f00000000d3f4655f00"/32, 0x20, 0x2480}, {&(0x7f0000011800)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2800}, {&(0x7f0000011900)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2880}, {&(0x7f0000011a00)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000050000000", 0x40, 0x2c00}, {&(0x7f0000011b00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2c80}, {&(0x7f0000011c00)="c041000000380000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000030000000", 0x40, 0x4800}, {&(0x7f0000011d00)="20000000000000000000000000000000d3f4655f000000000000000000000000000002ea00"/64, 0x40, 0x4880}, {&(0x7f0000011e00)="ed4100003c000000d3f4655fd3f4655fd3f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000b65c7bf3000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4c00}, {&(0x7f0000011f00)="ed8100001a040000d3f4655fd3f4655fd3f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000005a0e0125000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xa0, 0x5000}, {&(0x7f0000012000)="ffa1000026000000d3f4655fd3f4655fd3f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3237313137343330352f66696c65302f66696c653000000000000000000000000000000000000000000000b8e8b49f000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xa0, 0x5400}, {&(0x7f0000012100)="ed8100000a000000d3f4655fd3f4655fd3f4655f000000000000010000000000000000100100000073797a6b616c6c65727300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b63b3ec000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x5800}, {&(0x7f0000012200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800010000000af30100040000000000000000000000050000007000000000000000000000000000000000000000000000000000000000000000000000000000000044cd9848000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xc0, 0x5be0}, {&(0x7f0000012300)="ed81000064000000d3f4655fd3f4655fd3f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c4794644c000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x63c0}, {&(0x7f0000012500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000012600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x18000}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x18800}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19000}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19800}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a000}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a800}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1b000}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x20400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x21400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x28000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x28400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x28800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x28c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x29000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x29400}, {&(0x7f0000013900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}], 0x0, &(0x7f0000013e00)) 14:59:11 executing program 2: futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 14:59:11 executing program 0: futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 14:59:11 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000000)='W'}, 0x48) 14:59:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e008105e00f80ecdbc0b9f207c804a01e000000302e200000008303f5000a0002000000da1b40d80589", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 14:59:11 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000000)='W'}, 0x48) 14:59:11 executing program 0: futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 14:59:11 executing program 1: unshare(0x20000400) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r1, &(0x7f0000000200)={0x53, 0x7d, 0x0, {{0x0, 0x3e, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2, '+^', 0x7, '^*%-,%\x00', 0x0, '', 0x2, '.)'}}}, 0x53) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="b1", 0x1}], 0x1, 0x0) 14:59:11 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000000)='W'}, 0x48) 14:59:11 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) close_range(r0, r0, 0x4) 14:59:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e008105e00f80ecdbc0b9f207c804a01e000000302e200000008303f5000a0002000000da1b40d80589", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 14:59:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000400)) [ 53.820493][ T2390] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. [ 53.871394][ T2400] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. [ 53.875739][ T2402] loop4: detected capacity change from 0 to 2048 14:59:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000400)) 14:59:11 executing program 1: unshare(0x20000400) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r1, &(0x7f0000000200)={0x53, 0x7d, 0x0, {{0x0, 0x3e, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2, '+^', 0x7, '^*%-,%\x00', 0x0, '', 0x2, '.)'}}}, 0x53) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="b1", 0x1}], 0x1, 0x0) 14:59:11 executing program 0: futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 14:59:11 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @empty}, 0x10) 14:59:11 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) close_range(r0, r0, 0x4) [ 53.911246][ T2402] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 53.969461][ T24] audit: type=1400 audit(1639753151.750:145): avc: denied { create } for pid=2411 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 53.989227][ T24] audit: type=1400 audit(1639753151.750:146): avc: denied { bind } for pid=2411 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 14:59:11 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) close_range(r0, r0, 0x4) 14:59:11 executing program 1: unshare(0x20000400) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r1, &(0x7f0000000200)={0x53, 0x7d, 0x0, {{0x0, 0x3e, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2, '+^', 0x7, '^*%-,%\x00', 0x0, '', 0x2, '.)'}}}, 0x53) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="b1", 0x1}], 0x1, 0x0) 14:59:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000400)) 14:59:11 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) close_range(r0, r0, 0x4) 14:59:11 executing program 5: setitimer(0x2, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) setitimer(0x2, 0x0, 0x0) setitimer(0x2, &(0x7f0000000080)={{}, {0x77359400}}, 0x0) 14:59:11 executing program 4: syz_emit_ethernet(0x72, &(0x7f0000000180)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x3c, 0x3c, 0x0, @remote, @local, {[@hopopts={0x0, 0x4, '\x00', [@calipso={0x7, 0x8}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @local}}, @padn={0x1, 0x2, [0x0, 0x0]}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:59:11 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$unix(0x1, 0x0, 0x0) close(r0) 14:59:11 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @multicast2}}, 0x24) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x24) [ 54.008864][ T24] audit: type=1400 audit(1639753151.750:147): avc: denied { name_bind } for pid=2411 comm="syz-executor.5" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 54.029894][ T24] audit: type=1400 audit(1639753151.750:148): avc: denied { node_bind } for pid=2411 comm="syz-executor.5" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=dccp_socket permissive=1 14:59:11 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$unix(0x1, 0x0, 0x0) close(r0) 14:59:11 executing program 1: unshare(0x20000400) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r1, &(0x7f0000000200)={0x53, 0x7d, 0x0, {{0x0, 0x3e, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2, '+^', 0x7, '^*%-,%\x00', 0x0, '', 0x2, '.)'}}}, 0x53) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="b1", 0x1}], 0x1, 0x0) 14:59:11 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @multicast2}}, 0x24) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x24) 14:59:11 executing program 4: syz_emit_ethernet(0x72, &(0x7f0000000180)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x3c, 0x3c, 0x0, @remote, @local, {[@hopopts={0x0, 0x4, '\x00', [@calipso={0x7, 0x8}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @local}}, @padn={0x1, 0x2, [0x0, 0x0]}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:59:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000400)) 14:59:11 executing program 5: setitimer(0x2, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) setitimer(0x2, 0x0, 0x0) setitimer(0x2, &(0x7f0000000080)={{}, {0x77359400}}, 0x0) [ 54.070139][ T2422] syz-executor.5 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 54.083968][ T24] audit: type=1400 audit(1639753151.870:149): avc: denied { create } for pid=2428 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 14:59:11 executing program 1: r0 = socket(0xa, 0x3, 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) ftruncate(r1, 0x47) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x36, 0x0, 0x20000000) 14:59:11 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$unix(0x1, 0x0, 0x0) close(r0) 14:59:11 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @multicast2}}, 0x24) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x24) 14:59:11 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0xa) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:59:11 executing program 4: syz_emit_ethernet(0x72, &(0x7f0000000180)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x3c, 0x3c, 0x0, @remote, @local, {[@hopopts={0x0, 0x4, '\x00', [@calipso={0x7, 0x8}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @local}}, @padn={0x1, 0x2, [0x0, 0x0]}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:59:11 executing program 5: setitimer(0x2, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) setitimer(0x2, 0x0, 0x0) setitimer(0x2, &(0x7f0000000080)={{}, {0x77359400}}, 0x0) 14:59:11 executing program 1: r0 = socket(0xa, 0x3, 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) ftruncate(r1, 0x47) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x36, 0x0, 0x20000000) 14:59:11 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @multicast2}}, 0x24) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x24) 14:59:12 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$unix(0x1, 0x0, 0x0) close(r0) 14:59:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x10, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR={0xa}]}}}]}, 0x40}}, 0x0) 14:59:12 executing program 1: r0 = socket(0xa, 0x3, 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) ftruncate(r1, 0x47) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x36, 0x0, 0x20000000) 14:59:12 executing program 4: syz_emit_ethernet(0x72, &(0x7f0000000180)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x3c, 0x3c, 0x0, @remote, @local, {[@hopopts={0x0, 0x4, '\x00', [@calipso={0x7, 0x8}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @local}}, @padn={0x1, 0x2, [0x0, 0x0]}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:59:12 executing program 5: setitimer(0x2, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) setitimer(0x2, 0x0, 0x0) setitimer(0x2, &(0x7f0000000080)={{}, {0x77359400}}, 0x0) 14:59:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0xa) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:59:12 executing program 1: r0 = socket(0xa, 0x3, 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) ftruncate(r1, 0x47) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x29, 0x36, 0x0, 0x20000000) 14:59:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x10, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR={0xa}]}}}]}, 0x40}}, 0x0) 14:59:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0xa) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:59:12 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r1) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 14:59:12 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f00000001c0)=0x1, 0x4) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, &(0x7f00000000c0)) 14:59:12 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r1) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 14:59:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x10, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR={0xa}]}}}]}, 0x40}}, 0x0) 14:59:12 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) r1 = open(&(0x7f0000000680)='./bus\x00', 0x14527e, 0x65) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = fork() process_vm_writev(r2, &(0x7f0000000180)=[{&(0x7f0000000000)=""/106, 0x6a}], 0x1, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/186, 0x7ffff000}], 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000380)='./bus\x00', 0x4) 14:59:12 executing program 1: set_mempolicy(0x3, &(0x7f0000000040)=0xfffffffffffffff5, 0xfa) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) 14:59:12 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0xa) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:59:12 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f00000001c0)=0x1, 0x4) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, &(0x7f00000000c0)) 14:59:12 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r1) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 14:59:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x10, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR={0xa}]}}}]}, 0x40}}, 0x0) 14:59:12 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f00000001c0)=0x1, 0x4) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, &(0x7f00000000c0)) 14:59:12 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f00000001c0)=0x1, 0x4) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, &(0x7f00000000c0)) 14:59:12 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) r1 = open(&(0x7f0000000680)='./bus\x00', 0x14527e, 0x65) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = fork() process_vm_writev(r2, &(0x7f0000000180)=[{&(0x7f0000000000)=""/106, 0x6a}], 0x1, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/186, 0x7ffff000}], 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000380)='./bus\x00', 0x4) 14:59:12 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) r1 = open(&(0x7f0000000680)='./bus\x00', 0x14527e, 0x65) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = fork() process_vm_writev(r2, &(0x7f0000000180)=[{&(0x7f0000000000)=""/106, 0x6a}], 0x1, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/186, 0x7ffff000}], 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000380)='./bus\x00', 0x4) 14:59:12 executing program 1: set_mempolicy(0x3, &(0x7f0000000040)=0xfffffffffffffff5, 0xfa) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) 14:59:12 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f00000001c0)=0x1, 0x4) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, &(0x7f00000000c0)) 14:59:12 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r1) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 14:59:12 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f00000001c0)=0x1, 0x4) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, &(0x7f00000000c0)) 14:59:12 executing program 1: set_mempolicy(0x3, &(0x7f0000000040)=0xfffffffffffffff5, 0xfa) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) 14:59:12 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f00000001c0)=0x1, 0x4) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, &(0x7f00000000c0)) 14:59:12 executing program 0: r0 = syz_io_uring_setup(0x4959, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_TIMEOUT_REMOVE, 0x6) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000440)=""/247, 0xf7}], 0x2}, 0x1) syz_io_uring_submit(r1, r3, &(0x7f0000000580)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_FADVISE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000180)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x6) syz_io_uring_setup(0x1897, &(0x7f00000003c0)={0x0, 0xf7cc}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000005c0)=0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000600)=@IORING_OP_FSYNC, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000080)=@IORING_OP_EPOLL_CTL=@del, 0x0) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000040)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 14:59:12 executing program 1: set_mempolicy(0x3, &(0x7f0000000040)=0xfffffffffffffff5, 0xfa) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) 14:59:12 executing program 4: r0 = syz_io_uring_setup(0x685e, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x1) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x1) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_POLL_ADD, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 14:59:12 executing program 3: r0 = eventfd2(0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$eventfd(r0, &(0x7f0000000080)=0x9e41, 0x8) read$eventfd(r0, &(0x7f0000000040), 0x8) 14:59:12 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) r1 = open(&(0x7f0000000680)='./bus\x00', 0x14527e, 0x65) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = fork() process_vm_writev(r2, &(0x7f0000000180)=[{&(0x7f0000000000)=""/106, 0x6a}], 0x1, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/186, 0x7ffff000}], 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000380)='./bus\x00', 0x4) 14:59:12 executing program 4: r0 = syz_io_uring_setup(0x685e, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x1) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x1) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_POLL_ADD, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 14:59:12 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) r1 = open(&(0x7f0000000680)='./bus\x00', 0x14527e, 0x65) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = fork() process_vm_writev(r2, &(0x7f0000000180)=[{&(0x7f0000000000)=""/106, 0x6a}], 0x1, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/186, 0x7ffff000}], 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000380)='./bus\x00', 0x4) 14:59:12 executing program 0: r0 = syz_io_uring_setup(0x4959, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_TIMEOUT_REMOVE, 0x6) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000440)=""/247, 0xf7}], 0x2}, 0x1) syz_io_uring_submit(r1, r3, &(0x7f0000000580)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_FADVISE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000180)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x6) syz_io_uring_setup(0x1897, &(0x7f00000003c0)={0x0, 0xf7cc}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000005c0)=0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000600)=@IORING_OP_FSYNC, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000080)=@IORING_OP_EPOLL_CTL=@del, 0x0) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000040)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 14:59:12 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_channels={0x50}}) 14:59:12 executing program 4: r0 = syz_io_uring_setup(0x685e, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x1) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x1) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_POLL_ADD, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 14:59:12 executing program 0: r0 = syz_io_uring_setup(0x4959, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_TIMEOUT_REMOVE, 0x6) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000440)=""/247, 0xf7}], 0x2}, 0x1) syz_io_uring_submit(r1, r3, &(0x7f0000000580)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_FADVISE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000180)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x6) syz_io_uring_setup(0x1897, &(0x7f00000003c0)={0x0, 0xf7cc}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000005c0)=0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000600)=@IORING_OP_FSYNC, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000080)=@IORING_OP_EPOLL_CTL=@del, 0x0) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000040)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 14:59:12 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_channels={0x50}}) 14:59:12 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_channels={0x50}}) 14:59:12 executing program 4: r0 = syz_io_uring_setup(0x685e, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x1) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x1) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_POLL_ADD, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 14:59:12 executing program 0: r0 = syz_io_uring_setup(0x4959, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_TIMEOUT_REMOVE, 0x6) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000440)=""/247, 0xf7}], 0x2}, 0x1) syz_io_uring_submit(r1, r3, &(0x7f0000000580)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_FADVISE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000180)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x6) syz_io_uring_setup(0x1897, &(0x7f00000003c0)={0x0, 0xf7cc}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000005c0)=0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000600)=@IORING_OP_FSYNC, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000080)=@IORING_OP_EPOLL_CTL=@del, 0x0) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000040)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r0, 0x6374, 0x0, 0x0, 0x0, 0x0) 14:59:13 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_channels={0x50}}) 14:59:13 executing program 3: r0 = eventfd2(0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$eventfd(r0, &(0x7f0000000080)=0x9e41, 0x8) read$eventfd(r0, &(0x7f0000000040), 0x8) 14:59:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1e, 0x0, 0x4, 0x1000000, 0xc}, 0x40) 14:59:13 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) r1 = open(&(0x7f0000000680)='./bus\x00', 0x14527e, 0x65) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = fork() process_vm_writev(r2, &(0x7f0000000180)=[{&(0x7f0000000000)=""/106, 0x6a}], 0x1, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/186, 0x7ffff000}], 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000380)='./bus\x00', 0x4) 14:59:13 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:59:13 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) r1 = open(&(0x7f0000000680)='./bus\x00', 0x14527e, 0x65) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = fork() process_vm_writev(r2, &(0x7f0000000180)=[{&(0x7f0000000000)=""/106, 0x6a}], 0x1, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/186, 0x7ffff000}], 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000380)='./bus\x00', 0x4) 14:59:13 executing program 1: r0 = eventfd2(0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$eventfd(r0, &(0x7f0000000080)=0x9e41, 0x8) read$eventfd(r0, &(0x7f0000000040), 0x8) 14:59:13 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:59:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1e, 0x0, 0x4, 0x1000000, 0xc}, 0x40) 14:59:13 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:59:13 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') 14:59:13 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:59:13 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:59:14 executing program 3: r0 = eventfd2(0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$eventfd(r0, &(0x7f0000000080)=0x9e41, 0x8) read$eventfd(r0, &(0x7f0000000040), 0x8) 14:59:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1e, 0x0, 0x4, 0x1000000, 0xc}, 0x40) 14:59:14 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'user_u'}, 0x22}, {@context={'context', 0x22, 'system_u'}}], 0x2}}) 14:59:14 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:59:14 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:59:14 executing program 1: r0 = eventfd2(0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$eventfd(r0, &(0x7f0000000080)=0x9e41, 0x8) read$eventfd(r0, &(0x7f0000000040), 0x8) 14:59:14 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'user_u'}, 0x22}, {@context={'context', 0x22, 'system_u'}}], 0x2}}) 14:59:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1e, 0x0, 0x4, 0x1000000, 0xc}, 0x40) 14:59:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001280)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}, @IFLA_GENEVE_UDP_CSUM={0x5, 0x8, 0x5}, @IFLA_GENEVE_PORT={0x6, 0x5, 0x4e21}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x5c}}, 0x0) [ 56.281268][ T2595] 9pnet: Insufficient options for proto=fd 14:59:14 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='nfs4\x00', 0x0, &(0x7f0000000240)='noacl') 14:59:14 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'user_u'}, 0x22}, {@context={'context', 0x22, 'system_u'}}], 0x2}}) 14:59:14 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='nfs4\x00', 0x0, &(0x7f0000000240)='noacl') [ 56.333573][ T2602] 9pnet: Insufficient options for proto=fd [ 56.354440][ T2606] device geneve2 entered promiscuous mode [ 56.375008][ T2611] 9pnet: Insufficient options for proto=fd [ 56.416244][ T2606] syz-executor.0 (2606) used greatest stack depth: 11384 bytes left 14:59:14 executing program 3: r0 = eventfd2(0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$eventfd(r0, &(0x7f0000000080)=0x9e41, 0x8) read$eventfd(r0, &(0x7f0000000040), 0x8) 14:59:14 executing program 4: r0 = socket(0x11, 0xa, 0x0) write$bt_hci(r0, 0x0, 0x0) 14:59:14 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'user_u'}, 0x22}, {@context={'context', 0x22, 'system_u'}}], 0x2}}) 14:59:14 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='nfs4\x00', 0x0, &(0x7f0000000240)='noacl') 14:59:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001280)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}, @IFLA_GENEVE_UDP_CSUM={0x5, 0x8, 0x5}, @IFLA_GENEVE_PORT={0x6, 0x5, 0x4e21}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x5c}}, 0x0) 14:59:14 executing program 1: r0 = eventfd2(0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$eventfd(r0, &(0x7f0000000080)=0x9e41, 0x8) read$eventfd(r0, &(0x7f0000000040), 0x8) 14:59:14 executing program 4: r0 = socket(0x11, 0xa, 0x0) write$bt_hci(r0, 0x0, 0x0) 14:59:14 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='nfs4\x00', 0x0, &(0x7f0000000240)='noacl') 14:59:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="89000000120081ae08060c0f006b3f007f03e3f70000000000e2ffca1b1f0000000000000072f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec0012290001400a080800bdad446b9bbc7a46e3988285dcdf12f213d3f868fece14955fed0009d78f0a947ec3b49e33538afa8af92347510f0b74a20ff27fff", 0x89}], 0x1}, 0x0) 14:59:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) sendmmsg(r0, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004e80)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 14:59:14 executing program 4: r0 = socket(0x11, 0xa, 0x0) write$bt_hci(r0, 0x0, 0x0) [ 57.136578][ T2619] 9pnet: Insufficient options for proto=fd [ 57.144236][ T2623] device geneve2 entered promiscuous mode 14:59:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="89000000120081ae08060c0f006b3f007f03e3f70000000000e2ffca1b1f0000000000000072f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec0012290001400a080800bdad446b9bbc7a46e3988285dcdf12f213d3f868fece14955fed0009d78f0a947ec3b49e33538afa8af92347510f0b74a20ff27fff", 0x89}], 0x1}, 0x0) [ 57.190006][ T2636] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 57.227208][ T2623] syz-executor.0 (2623) used greatest stack depth: 11248 bytes left 14:59:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="89000000120081ae08060c0f006b3f007f03e3f70000000000e2ffca1b1f0000000000000072f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec0012290001400a080800bdad446b9bbc7a46e3988285dcdf12f213d3f868fece14955fed0009d78f0a947ec3b49e33538afa8af92347510f0b74a20ff27fff", 0x89}], 0x1}, 0x0) 14:59:15 executing program 4: r0 = socket(0x11, 0xa, 0x0) write$bt_hci(r0, 0x0, 0x0) 14:59:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) sendmmsg(r0, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004e80)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 14:59:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001280)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}, @IFLA_GENEVE_UDP_CSUM={0x5, 0x8, 0x5}, @IFLA_GENEVE_PORT={0x6, 0x5, 0x4e21}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x5c}}, 0x0) 14:59:15 executing program 3: mkdir(&(0x7f0000003a80)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='tracefs\x00', 0x0, &(0x7f0000000100)='gid=2\x00nore') 14:59:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) sendmmsg(r0, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004e80)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 14:59:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x1c804, 0x0) lchown(&(0x7f00000001c0)='./file0/../file0\x00', 0xee00, 0xee00) chown(&(0x7f0000003140)='./file0/../file0\x00', 0xffffffffffffffff, 0xee00) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 14:59:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="89000000120081ae08060c0f006b3f007f03e3f70000000000e2ffca1b1f0000000000000072f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec0012290001400a080800bdad446b9bbc7a46e3988285dcdf12f213d3f868fece14955fed0009d78f0a947ec3b49e33538afa8af92347510f0b74a20ff27fff", 0x89}], 0x1}, 0x0) 14:59:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xe, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x4f}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:59:15 executing program 3: mkdir(&(0x7f0000003a80)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='tracefs\x00', 0x0, &(0x7f0000000100)='gid=2\x00nore') [ 57.986505][ T2649] device geneve2 entered promiscuous mode 14:59:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xe, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x4f}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:59:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) sendmmsg(r0, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004e80)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 14:59:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x1c804, 0x0) lchown(&(0x7f00000001c0)='./file0/../file0\x00', 0xee00, 0xee00) chown(&(0x7f0000003140)='./file0/../file0\x00', 0xffffffffffffffff, 0xee00) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 14:59:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x1c804, 0x0) lchown(&(0x7f00000001c0)='./file0/../file0\x00', 0xee00, 0xee00) chown(&(0x7f0000003140)='./file0/../file0\x00', 0xffffffffffffffff, 0xee00) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 14:59:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x1c804, 0x0) lchown(&(0x7f00000001c0)='./file0/../file0\x00', 0xee00, 0xee00) chown(&(0x7f0000003140)='./file0/../file0\x00', 0xffffffffffffffff, 0xee00) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 14:59:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001280)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}, @IFLA_GENEVE_UDP_CSUM={0x5, 0x8, 0x5}, @IFLA_GENEVE_PORT={0x6, 0x5, 0x4e21}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x5c}}, 0x0) 14:59:15 executing program 3: mkdir(&(0x7f0000003a80)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='tracefs\x00', 0x0, &(0x7f0000000100)='gid=2\x00nore') 14:59:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xe, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x4f}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:59:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x1c804, 0x0) lchown(&(0x7f00000001c0)='./file0/../file0\x00', 0xee00, 0xee00) chown(&(0x7f0000003140)='./file0/../file0\x00', 0xffffffffffffffff, 0xee00) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 14:59:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x1c804, 0x0) lchown(&(0x7f00000001c0)='./file0/../file0\x00', 0xee00, 0xee00) chown(&(0x7f0000003140)='./file0/../file0\x00', 0xffffffffffffffff, 0xee00) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 14:59:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xe, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x4f}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:59:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x1c804, 0x0) lchown(&(0x7f00000001c0)='./file0/../file0\x00', 0xee00, 0xee00) chown(&(0x7f0000003140)='./file0/../file0\x00', 0xffffffffffffffff, 0xee00) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 14:59:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x1c804, 0x0) lchown(&(0x7f00000001c0)='./file0/../file0\x00', 0xee00, 0xee00) chown(&(0x7f0000003140)='./file0/../file0\x00', 0xffffffffffffffff, 0xee00) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 14:59:15 executing program 3: mkdir(&(0x7f0000003a80)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='tracefs\x00', 0x0, &(0x7f0000000100)='gid=2\x00nore') 14:59:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x1c804, 0x0) lchown(&(0x7f00000001c0)='./file0/../file0\x00', 0xee00, 0xee00) chown(&(0x7f0000003140)='./file0/../file0\x00', 0xffffffffffffffff, 0xee00) umount2(&(0x7f0000000040)='./file0\x00', 0x0) [ 58.122548][ T2676] device geneve2 entered promiscuous mode 14:59:15 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1}, 0xc) listen(r0, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 14:59:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x44, 0x0, 0xa, 0x801, 0x0, 0x0, {0x5}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x2}]}]}], {0x14}}, 0xac}}, 0x20000004) 14:59:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@private2, 0x0, 0x2b}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) sendmmsg$inet6(r0, &(0x7f00000035c0)=[{{&(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 14:59:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x5, 0x4, 0x4c8, 0x2f8, 0x1e8, 0x0, 0x3e0, 0x3e0, 0x2f8, 0x4, 0x0, {[{{@uncond, 0xc0, 0x1e8}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}, {{@arp={@broadcast, @dev, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_hsr\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @multicast2, @loopback}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x518) 14:59:16 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1}, 0xc) listen(r0, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 14:59:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x1c804, 0x0) lchown(&(0x7f00000001c0)='./file0/../file0\x00', 0xee00, 0xee00) chown(&(0x7f0000003140)='./file0/../file0\x00', 0xffffffffffffffff, 0xee00) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 14:59:16 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x28, 0x0, 0x0) 14:59:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x44, 0x0, 0xa, 0x801, 0x0, 0x0, {0x5}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x2}]}]}], {0x14}}, 0xac}}, 0x20000004) 14:59:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@private2, 0x0, 0x2b}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) sendmmsg$inet6(r0, &(0x7f00000035c0)=[{{&(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 14:59:16 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1}, 0xc) listen(r0, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 14:59:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x5, 0x4, 0x4c8, 0x2f8, 0x1e8, 0x0, 0x3e0, 0x3e0, 0x2f8, 0x4, 0x0, {[{{@uncond, 0xc0, 0x1e8}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}, {{@arp={@broadcast, @dev, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_hsr\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @multicast2, @loopback}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x518) [ 58.234899][ T2697] x_tables: unsorted underflow at hook 2 14:59:16 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000000)=ANY=[@ANYBLOB="0380"], 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x172, 0x172, 0xd, [@fwd, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @datasec={0x0, 0x6, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}], 'b'}, @struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @typedef, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x199}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 14:59:16 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x28, 0x0, 0x0) 14:59:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x44, 0x0, 0xa, 0x801, 0x0, 0x0, {0x5}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x2}]}]}], {0x14}}, 0xac}}, 0x20000004) 14:59:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@private2, 0x0, 0x2b}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) sendmmsg$inet6(r0, &(0x7f00000035c0)=[{{&(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 14:59:16 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1}, 0xc) listen(r0, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 14:59:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x5, 0x4, 0x4c8, 0x2f8, 0x1e8, 0x0, 0x3e0, 0x3e0, 0x2f8, 0x4, 0x0, {[{{@uncond, 0xc0, 0x1e8}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}, {{@arp={@broadcast, @dev, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_hsr\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @multicast2, @loopback}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x518) 14:59:16 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000000)=ANY=[@ANYBLOB="0380"], 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x172, 0x172, 0xd, [@fwd, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @datasec={0x0, 0x6, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}], 'b'}, @struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @typedef, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x199}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 14:59:16 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x28, 0x0, 0x0) [ 58.305219][ T2711] x_tables: unsorted underflow at hook 2 14:59:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x44, 0x0, 0xa, 0x801, 0x0, 0x0, {0x5}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x2}]}]}], {0x14}}, 0xac}}, 0x20000004) 14:59:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x84}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="d8", 0x1}], 0x1) 14:59:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@private2, 0x0, 0x2b}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) sendmmsg$inet6(r0, &(0x7f00000035c0)=[{{&(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 14:59:16 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x28, 0x0, 0x0) 14:59:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = dup3(r2, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 14:59:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x84}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="d8", 0x1}], 0x1) 14:59:16 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000000)=ANY=[@ANYBLOB="0380"], 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x172, 0x172, 0xd, [@fwd, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @datasec={0x0, 0x6, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}], 'b'}, @struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @typedef, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x199}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 14:59:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x5, 0x4, 0x4c8, 0x2f8, 0x1e8, 0x0, 0x3e0, 0x3e0, 0x2f8, 0x4, 0x0, {[{{@uncond, 0xc0, 0x1e8}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}, {{@arp={@broadcast, @dev, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_hsr\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @multicast2, @loopback}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x518) [ 58.374574][ T2729] x_tables: unsorted underflow at hook 2 14:59:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x84}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="d8", 0x1}], 0x1) 14:59:16 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000011700)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f00000000c0)={[{@cruft}]}) [ 58.430880][ T24] kauditd_printk_skb: 20 callbacks suppressed [ 58.430939][ T24] audit: type=1400 audit(1639753156.220:170): avc: denied { mounton } for pid=2740 comm="syz-executor.2" path="/root/syzkaller-testdir026529153/syzkaller.SLCg6q/66/file0" dev="sda1" ino=1183 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 [ 58.448392][ T2744] x_tables: unsorted underflow at hook 2 14:59:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x84}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="d8", 0x1}], 0x1) 14:59:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x84}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="d8", 0x1}], 0x1) 14:59:16 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000000)=ANY=[@ANYBLOB="0380"], 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x172, 0x172, 0xd, [@fwd, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @datasec={0x0, 0x6, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}], 'b'}, @struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @typedef, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x199}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 14:59:16 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000011700)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f00000000c0)={[{@cruft}]}) 14:59:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x84}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="d8", 0x1}], 0x1) 14:59:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x1) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x80000001) epoll_pwait(r1, &(0x7f0000002180)=[{}], 0x1, 0x200, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002100)) [ 58.485053][ T2751] loop3: detected capacity change from 0 to 240 [ 58.547032][ T24] audit: type=1400 audit(1639753156.290:171): avc: denied { mount } for pid=2750 comm="syz-executor.3" name="/" dev="loop3" ino=1920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 58.569840][ T24] audit: type=1400 audit(1639753156.310:172): avc: denied { unmount } for pid=1845 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 58.576620][ T2763] loop3: detected capacity change from 0 to 240 14:59:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = dup3(r2, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 14:59:17 executing program 5: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d3000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$rxrpc(0x21, 0x2, 0xa) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x10}}, 0x0) io_uring_enter(r0, 0x688c, 0x0, 0x0, 0x0, 0x0) 14:59:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x84}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="d8", 0x1}], 0x1) 14:59:17 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$unix(0x1, 0x5, 0x0) shutdown(r0, 0x2000000) 14:59:17 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000011700)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f00000000c0)={[{@cruft}]}) 14:59:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x1) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x80000001) epoll_pwait(r1, &(0x7f0000002180)=[{}], 0x1, 0x200, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002100)) 14:59:17 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$unix(0x1, 0x5, 0x0) shutdown(r0, 0x2000000) 14:59:17 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000011700)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f00000000c0)={[{@cruft}]}) 14:59:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x1) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x80000001) epoll_pwait(r1, &(0x7f0000002180)=[{}], 0x1, 0x200, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002100)) 14:59:17 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$unix(0x1, 0x5, 0x0) shutdown(r0, 0x2000000) 14:59:17 executing program 5: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d3000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$rxrpc(0x21, 0x2, 0xa) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x10}}, 0x0) io_uring_enter(r0, 0x688c, 0x0, 0x0, 0x0, 0x0) [ 59.284572][ T2777] loop3: detected capacity change from 0 to 240 [ 59.290884][ T24] audit: type=1400 audit(1639753157.070:173): avc: denied { write } for pid=2768 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 14:59:17 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$unix(0x1, 0x5, 0x0) shutdown(r0, 0x2000000) [ 59.378639][ T2789] loop3: detected capacity change from 0 to 240 14:59:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = dup3(r2, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 14:59:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x1) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x80000001) epoll_pwait(r1, &(0x7f0000002180)=[{}], 0x1, 0x200, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002100)) 14:59:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x1) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x80000001) epoll_pwait(r1, &(0x7f0000002180)=[{}], 0x1, 0x200, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002100)) 14:59:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000001c0)=0x101, 0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0xffffffff, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) 14:59:17 executing program 5: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d3000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$rxrpc(0x21, 0x2, 0xa) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x10}}, 0x0) io_uring_enter(r0, 0x688c, 0x0, 0x0, 0x0, 0x0) 14:59:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x1) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x80000001) epoll_pwait(r1, &(0x7f0000002180)=[{}], 0x1, 0x200, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002100)) 14:59:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000001c0)=0x101, 0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0xffffffff, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) 14:59:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000001c0)=0x101, 0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0xffffffff, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) [ 60.126006][ T24] audit: type=1400 audit(1639753157.910:174): avc: denied { setopt } for pid=2799 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 14:59:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000001c0)=0x101, 0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0xffffffff, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) 14:59:18 executing program 5: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d3000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$rxrpc(0x21, 0x2, 0xa) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x10}}, 0x0) io_uring_enter(r0, 0x688c, 0x0, 0x0, 0x0, 0x0) 14:59:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r1, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b40)={0x400, 0x2f, 0x0, 0x400300, 0x0, "", [@typed={0x4}, @generic="52c075572676d17123129583dfbd0188db9894564b1bebc519f4b8910f2e4cb6ecd7dde3533a5811548fd0b4b2f50781366a158f1e", @typed={0xc, 0x0, 0x0, 0x0, @u64}, @nested={0x131, 0x0, 0x0, 0x1, [@typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="82cb443343bebbec435e0393f09c9f619eb5f651bea66b03abb47f", @typed={0x4}, @typed={0x4}, @generic="952982b8a2b0fe91a07d858eb88225a83ddcbd64f544a223059dbc6fd0921ee4c547750daf03ea3c03", @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="a804333aed4d7717b9b684587b9450f4cad49cae921331fbaf8872931b777aff2afcbda6b1f7e02f77c23b352fe42cea5b8d98dddf1bf95f21568fa97c6212f133cccc8a55e4db8cbdc25c65ad412cebf55929ffa9c02de27c41a8caefcfde7e569b5f82aac0d0d30361beb67f29ac5a0bb867c547e1865fe7e8e1f7c3fdf902cccf41bbe4b25b143c246f7705328d379a00f4dd3eff1415f704a6be52f7faeff489e7aeb9e7bb48ce76dd2d47e216631ede100265c56445f1c37e80ee817b2535ca5f1c93"]}, @nested={0x271, 0x0, 0x0, 0x1, [@generic="63921650286d79a89ff8fe8c874a492e8f4d6731bb1ac25c026b07ba49ff74ec14c805e361021d5a8c167eb51de1a540fb75c980048d713a84689a50e69a723b18da7d3fdd9a943a7ecd903b33274a593a22c587b7d0a4472086846729414df337f309ea83a0729ebd4a55e8ddaf5f9e62a6a362b3264db4d768ccd794953ab83f107f7c3a35b3a981ba68b7e993a63d086ca828c9672967ed8c8006f065c65a3bab8947de348fbd", @generic="bffa66829d0a5828ee4dda73f5d96823fda90bd9e66834d9c04e5e951432589b65b597e43bafd72910f5e73270878fa2f3f2ca4538c1ced45e76bf3c7fcc2829b8f28bf55a8a17ba278f19fec237d19a9a9e365c1caf1ef46af679b01025476a606735bc7dcc7628992fe56e0184378c54d8a2350f478305f940ea667948da48eb0d84575141a398ba9656099f90f72b0dd3b4ce43b212b69e076aac55132adecb369f1ed6ab06889ac5ef887f1037fbf492e18ebecb98365a28a670c29cd460ff", @generic="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"]}]}, 0x400}], 0x1}, 0x0) 14:59:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r1, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b40)={0x400, 0x2f, 0x0, 0x400300, 0x0, "", [@typed={0x4}, @generic="52c075572676d17123129583dfbd0188db9894564b1bebc519f4b8910f2e4cb6ecd7dde3533a5811548fd0b4b2f50781366a158f1e", @typed={0xc, 0x0, 0x0, 0x0, @u64}, @nested={0x131, 0x0, 0x0, 0x1, [@typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="82cb443343bebbec435e0393f09c9f619eb5f651bea66b03abb47f", @typed={0x4}, @typed={0x4}, @generic="952982b8a2b0fe91a07d858eb88225a83ddcbd64f544a223059dbc6fd0921ee4c547750daf03ea3c03", @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="a804333aed4d7717b9b684587b9450f4cad49cae921331fbaf8872931b777aff2afcbda6b1f7e02f77c23b352fe42cea5b8d98dddf1bf95f21568fa97c6212f133cccc8a55e4db8cbdc25c65ad412cebf55929ffa9c02de27c41a8caefcfde7e569b5f82aac0d0d30361beb67f29ac5a0bb867c547e1865fe7e8e1f7c3fdf902cccf41bbe4b25b143c246f7705328d379a00f4dd3eff1415f704a6be52f7faeff489e7aeb9e7bb48ce76dd2d47e216631ede100265c56445f1c37e80ee817b2535ca5f1c93"]}, @nested={0x271, 0x0, 0x0, 0x1, [@generic="63921650286d79a89ff8fe8c874a492e8f4d6731bb1ac25c026b07ba49ff74ec14c805e361021d5a8c167eb51de1a540fb75c980048d713a84689a50e69a723b18da7d3fdd9a943a7ecd903b33274a593a22c587b7d0a4472086846729414df337f309ea83a0729ebd4a55e8ddaf5f9e62a6a362b3264db4d768ccd794953ab83f107f7c3a35b3a981ba68b7e993a63d086ca828c9672967ed8c8006f065c65a3bab8947de348fbd", @generic="bffa66829d0a5828ee4dda73f5d96823fda90bd9e66834d9c04e5e951432589b65b597e43bafd72910f5e73270878fa2f3f2ca4538c1ced45e76bf3c7fcc2829b8f28bf55a8a17ba278f19fec237d19a9a9e365c1caf1ef46af679b01025476a606735bc7dcc7628992fe56e0184378c54d8a2350f478305f940ea667948da48eb0d84575141a398ba9656099f90f72b0dd3b4ce43b212b69e076aac55132adecb369f1ed6ab06889ac5ef887f1037fbf492e18ebecb98365a28a670c29cd460ff", @generic="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"]}]}, 0x400}], 0x1}, 0x0) [ 60.224219][ T24] audit: type=1400 audit(1639753158.010:175): avc: denied { setopt } for pid=2817 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 14:59:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = dup3(r2, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}}) 14:59:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x1) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x80000001) epoll_pwait(r1, &(0x7f0000002180)=[{}], 0x1, 0x200, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002100)) 14:59:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x1) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x80000001) epoll_pwait(r1, &(0x7f0000002180)=[{}], 0x1, 0x200, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002100)) 14:59:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x1) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x80000001) epoll_pwait(r1, &(0x7f0000002180)=[{}], 0x1, 0x200, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002100)) 14:59:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r1, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b40)={0x400, 0x2f, 0x0, 0x400300, 0x0, "", [@typed={0x4}, @generic="52c075572676d17123129583dfbd0188db9894564b1bebc519f4b8910f2e4cb6ecd7dde3533a5811548fd0b4b2f50781366a158f1e", @typed={0xc, 0x0, 0x0, 0x0, @u64}, @nested={0x131, 0x0, 0x0, 0x1, [@typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="82cb443343bebbec435e0393f09c9f619eb5f651bea66b03abb47f", @typed={0x4}, @typed={0x4}, @generic="952982b8a2b0fe91a07d858eb88225a83ddcbd64f544a223059dbc6fd0921ee4c547750daf03ea3c03", @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="a804333aed4d7717b9b684587b9450f4cad49cae921331fbaf8872931b777aff2afcbda6b1f7e02f77c23b352fe42cea5b8d98dddf1bf95f21568fa97c6212f133cccc8a55e4db8cbdc25c65ad412cebf55929ffa9c02de27c41a8caefcfde7e569b5f82aac0d0d30361beb67f29ac5a0bb867c547e1865fe7e8e1f7c3fdf902cccf41bbe4b25b143c246f7705328d379a00f4dd3eff1415f704a6be52f7faeff489e7aeb9e7bb48ce76dd2d47e216631ede100265c56445f1c37e80ee817b2535ca5f1c93"]}, @nested={0x271, 0x0, 0x0, 0x1, [@generic="63921650286d79a89ff8fe8c874a492e8f4d6731bb1ac25c026b07ba49ff74ec14c805e361021d5a8c167eb51de1a540fb75c980048d713a84689a50e69a723b18da7d3fdd9a943a7ecd903b33274a593a22c587b7d0a4472086846729414df337f309ea83a0729ebd4a55e8ddaf5f9e62a6a362b3264db4d768ccd794953ab83f107f7c3a35b3a981ba68b7e993a63d086ca828c9672967ed8c8006f065c65a3bab8947de348fbd", @generic="bffa66829d0a5828ee4dda73f5d96823fda90bd9e66834d9c04e5e951432589b65b597e43bafd72910f5e73270878fa2f3f2ca4538c1ced45e76bf3c7fcc2829b8f28bf55a8a17ba278f19fec237d19a9a9e365c1caf1ef46af679b01025476a606735bc7dcc7628992fe56e0184378c54d8a2350f478305f940ea667948da48eb0d84575141a398ba9656099f90f72b0dd3b4ce43b212b69e076aac55132adecb369f1ed6ab06889ac5ef887f1037fbf492e18ebecb98365a28a670c29cd460ff", @generic="1d4c2056ee0f77bdf397ae021f6c0ef08fddeb794d7373ed9218f29d19fe2d799de32b7578cd70b456ac7b77a14196e06af5edffc99290dc5e8243e88f6c4fd43a6bc4f2b400b7eb926d158de0cf0c1ca4da3e905fddabc9987e083c733d37367ae99d0da22730bd700f8c52e2d4ad88cd7cbc8625f6b000948dfa1be689c88904d7fccc5989abcb882561813dd7bebe140ee424e4bcb99cb764e8d02b3a1bbcead43243352caba4e6bad47f1810f21af668d14ca1f31bccc0e8cd825da0ae25bbb02a29422d10d6556f8dc1070a906616cf19f2543274983c8f3c501384c798247c2e5e0b59b6ab5763000be52e999c06ca1c6d0d95e577f77cf20f0c54ef122a64375e"]}]}, 0x400}], 0x1}, 0x0) 14:59:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x421) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) 14:59:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x421) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) 14:59:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r1, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b40)={0x400, 0x2f, 0x0, 0x400300, 0x0, "", [@typed={0x4}, @generic="52c075572676d17123129583dfbd0188db9894564b1bebc519f4b8910f2e4cb6ecd7dde3533a5811548fd0b4b2f50781366a158f1e", @typed={0xc, 0x0, 0x0, 0x0, @u64}, @nested={0x131, 0x0, 0x0, 0x1, [@typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="82cb443343bebbec435e0393f09c9f619eb5f651bea66b03abb47f", @typed={0x4}, @typed={0x4}, @generic="952982b8a2b0fe91a07d858eb88225a83ddcbd64f544a223059dbc6fd0921ee4c547750daf03ea3c03", @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="a804333aed4d7717b9b684587b9450f4cad49cae921331fbaf8872931b777aff2afcbda6b1f7e02f77c23b352fe42cea5b8d98dddf1bf95f21568fa97c6212f133cccc8a55e4db8cbdc25c65ad412cebf55929ffa9c02de27c41a8caefcfde7e569b5f82aac0d0d30361beb67f29ac5a0bb867c547e1865fe7e8e1f7c3fdf902cccf41bbe4b25b143c246f7705328d379a00f4dd3eff1415f704a6be52f7faeff489e7aeb9e7bb48ce76dd2d47e216631ede100265c56445f1c37e80ee817b2535ca5f1c93"]}, @nested={0x271, 0x0, 0x0, 0x1, [@generic="63921650286d79a89ff8fe8c874a492e8f4d6731bb1ac25c026b07ba49ff74ec14c805e361021d5a8c167eb51de1a540fb75c980048d713a84689a50e69a723b18da7d3fdd9a943a7ecd903b33274a593a22c587b7d0a4472086846729414df337f309ea83a0729ebd4a55e8ddaf5f9e62a6a362b3264db4d768ccd794953ab83f107f7c3a35b3a981ba68b7e993a63d086ca828c9672967ed8c8006f065c65a3bab8947de348fbd", @generic="bffa66829d0a5828ee4dda73f5d96823fda90bd9e66834d9c04e5e951432589b65b597e43bafd72910f5e73270878fa2f3f2ca4538c1ced45e76bf3c7fcc2829b8f28bf55a8a17ba278f19fec237d19a9a9e365c1caf1ef46af679b01025476a606735bc7dcc7628992fe56e0184378c54d8a2350f478305f940ea667948da48eb0d84575141a398ba9656099f90f72b0dd3b4ce43b212b69e076aac55132adecb369f1ed6ab06889ac5ef887f1037fbf492e18ebecb98365a28a670c29cd460ff", @generic="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"]}]}, 0x400}], 0x1}, 0x0) 14:59:18 executing program 3: openat2(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x3c041, 0x0, 0x21}, 0x18) 14:59:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x421) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) 14:59:18 executing program 3: openat2(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x3c041, 0x0, 0x21}, 0x18) 14:59:18 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x421) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) 14:59:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) 14:59:19 executing program 4: setresuid(0xee01, 0xee01, 0xffffffffffffffff) getgroups(0x2, &(0x7f0000000000)=[0xee00, 0xffffffffffffffff]) setresgid(0x0, 0x0, r0) 14:59:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x1) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x80000001) epoll_pwait(r1, &(0x7f0000002180)=[{}], 0x1, 0x200, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002100)) 14:59:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0x0, 0x0) 14:59:19 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@private, 0x0, 0x0, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 14:59:19 executing program 3: openat2(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x3c041, 0x0, 0x21}, 0x18) 14:59:19 executing program 3: openat2(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x3c041, 0x0, 0x21}, 0x18) 14:59:19 executing program 4: setresuid(0xee01, 0xee01, 0xffffffffffffffff) getgroups(0x2, &(0x7f0000000000)=[0xee00, 0xffffffffffffffff]) setresgid(0x0, 0x0, r0) 14:59:19 executing program 4: setresuid(0xee01, 0xee01, 0xffffffffffffffff) getgroups(0x2, &(0x7f0000000000)=[0xee00, 0xffffffffffffffff]) setresgid(0x0, 0x0, r0) [ 61.843559][ T2864] loop5: detected capacity change from 0 to 264192 14:59:19 executing program 4: setresuid(0xee01, 0xee01, 0xffffffffffffffff) getgroups(0x2, &(0x7f0000000000)=[0xee00, 0xffffffffffffffff]) setresgid(0x0, 0x0, r0) [ 61.895968][ T24] audit: type=1400 audit(1639753159.680:176): avc: denied { connect } for pid=2866 comm="syz-executor.2" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 61.916836][ T24] audit: type=1400 audit(1639753159.680:177): avc: denied { write } for pid=2866 comm="syz-executor.2" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 14:59:19 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x520, 0x1c0, 0x290, 0xd0, 0x290, 0x520, 0x520, 0x520, 0x520, 0x520, 0x6, 0x0, {[{{@ipv6={@mcast2, @mcast1, [], [], 'virt_wifi0\x00', 'wg0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, [], [], 'batadv0\x00', 'syzkaller0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@local}}}, {{@ipv6={@private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'ipvlan1\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @empty}, [], [], 'bond0\x00', 'veth1_macvtap\x00'}, 0x0, 0x120, 0x168, 0x0, {}, [@common=@ah={{0x30}}, @common=@hbh={{0x48}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private2, @ipv6=@empty}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, [], [], 'macvtap0\x00', 'ip6gre0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@frag={{0x30}}]}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x650) 14:59:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0x0, 0x0) 14:59:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) 14:59:19 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000380)='tmpfs\x00', 0x0, 0x0) symlink(0x0, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, &(0x7f0000000180)={0x0, 0x0, 0x100000}, 0x20) 14:59:19 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x810) 14:59:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0x0, 0x0) 14:59:19 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@private, 0x0, 0x0, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 14:59:19 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x520, 0x1c0, 0x290, 0xd0, 0x290, 0x520, 0x520, 0x520, 0x520, 0x520, 0x6, 0x0, {[{{@ipv6={@mcast2, @mcast1, [], [], 'virt_wifi0\x00', 'wg0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, [], [], 'batadv0\x00', 'syzkaller0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@local}}}, {{@ipv6={@private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'ipvlan1\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @empty}, [], [], 'bond0\x00', 'veth1_macvtap\x00'}, 0x0, 0x120, 0x168, 0x0, {}, [@common=@ah={{0x30}}, @common=@hbh={{0x48}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private2, @ipv6=@empty}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, [], [], 'macvtap0\x00', 'ip6gre0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@frag={{0x30}}]}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x650) 14:59:19 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x520, 0x1c0, 0x290, 0xd0, 0x290, 0x520, 0x520, 0x520, 0x520, 0x520, 0x6, 0x0, {[{{@ipv6={@mcast2, @mcast1, [], [], 'virt_wifi0\x00', 'wg0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, [], [], 'batadv0\x00', 'syzkaller0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@local}}}, {{@ipv6={@private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'ipvlan1\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @empty}, [], [], 'bond0\x00', 'veth1_macvtap\x00'}, 0x0, 0x120, 0x168, 0x0, {}, [@common=@ah={{0x30}}, @common=@hbh={{0x48}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private2, @ipv6=@empty}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, [], [], 'macvtap0\x00', 'ip6gre0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@frag={{0x30}}]}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x650) [ 62.146597][ T24] audit: type=1400 audit(1639753159.930:178): avc: denied { mount } for pid=2883 comm="syz-executor.4" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 14:59:20 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000380)='tmpfs\x00', 0x0, 0x0) symlink(0x0, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, &(0x7f0000000180)={0x0, 0x0, 0x100000}, 0x20) 14:59:20 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5f0, 0x520, 0x1c0, 0x290, 0xd0, 0x290, 0x520, 0x520, 0x520, 0x520, 0x520, 0x6, 0x0, {[{{@ipv6={@mcast2, @mcast1, [], [], 'virt_wifi0\x00', 'wg0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, [], [], 'batadv0\x00', 'syzkaller0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv4=@local}}}, {{@ipv6={@private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'ipvlan1\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @empty}, [], [], 'bond0\x00', 'veth1_macvtap\x00'}, 0x0, 0x120, 0x168, 0x0, {}, [@common=@ah={{0x30}}, @common=@hbh={{0x48}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private2, @ipv6=@empty}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, [], [], 'macvtap0\x00', 'ip6gre0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@frag={{0x30}}]}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x650) 14:59:20 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000380)='tmpfs\x00', 0x0, 0x0) symlink(0x0, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, &(0x7f0000000180)={0x0, 0x0, 0x100000}, 0x20) 14:59:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x810) [ 62.211779][ T24] audit: type=1400 audit(1639753160.000:179): avc: denied { unmount } for pid=1839 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 14:59:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0x0, 0x0) [ 62.256485][ T2895] loop5: detected capacity change from 0 to 264192 14:59:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) 14:59:20 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000380)='tmpfs\x00', 0x0, 0x0) symlink(0x0, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, &(0x7f0000000180)={0x0, 0x0, 0x100000}, 0x20) 14:59:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x810) 14:59:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) 14:59:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) 14:59:20 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@private, 0x0, 0x0, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 14:59:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x810) [ 62.597353][ T2915] loop3: detected capacity change from 0 to 264192 [ 62.642541][ T2916] loop0: detected capacity change from 0 to 264192 14:59:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) [ 62.831585][ T2923] loop5: detected capacity change from 0 to 264192 14:59:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) [ 62.973727][ T2926] loop4: detected capacity change from 0 to 264192 14:59:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) 14:59:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) 14:59:21 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@private, 0x0, 0x0, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 63.197132][ T2928] loop1: detected capacity change from 0 to 264192 [ 63.364970][ T2932] loop0: detected capacity change from 0 to 264192 [ 63.391429][ T2934] loop3: detected capacity change from 0 to 264192 14:59:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) 14:59:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) [ 63.809792][ T2936] loop5: detected capacity change from 0 to 264192 14:59:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) [ 64.029516][ T2938] loop4: detected capacity change from 0 to 264192 14:59:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) [ 64.110940][ T2940] loop1: detected capacity change from 0 to 264192 14:59:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) 14:59:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) utimensat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) [ 64.502506][ T2943] loop3: detected capacity change from 0 to 264192 [ 64.522777][ T2945] loop0: detected capacity change from 0 to 264192 14:59:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) utimensat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) 14:59:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) 14:59:22 executing program 5: r0 = memfd_create(&(0x7f0000000240)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x03\xff\x00\x00\x8at\xa24>X@\rq@\xf2\xe9\xc6\xb6y\x0e\x90[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv\x8e\xd6\xb4\x81\x94\xac\x0eO\x82\xb8\xe5_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f,A,\x89\xb8\xf4\rt\xc1\xc6\xca\x00\xf7RQ\xe3\xfa\xa6Z\xa2;\x840t\xc4\xd7\xd8M\x0f\xf2r\xfe\x83\xc5\xee3\xdeoK3\xa5u\xfc\xd9\xcb\xad$\x80\x9aa\x01j\"RP\a\xb0\xf7f\xff\xf6\x19\xa0\x01;\x87\x8d\xae\xc9\xd1\x1e\x18E\x85b\xc3\xc9y\xac};\xcc\x85\xde\xafA\x0ff\x86\xe3\xf5\x12S!\xb5\xee\x89\xb5[Z j\xcc\xef\xe4\xbe@\x8d\xb3.\xa4\xc3\x1b\xbf\xe5\xc8\xa4\xd5\x8c\xb2\x1ew&)\xc3\x89\x04q\x1ag\xb9\x8d\xd2]\xa5\x12\xa3\xb7 [\xe9k0\xc9\xad\x17\x18\xa4\xf5\x94u\xbbiQ\xe19\xa9x\xcd(NX\rK\xec\xa4l\x05\x9c#c\x15\xcc\xf1\n', 0x4) fcntl$setstatus(r0, 0x4, 0x42c00) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) [ 64.739614][ T2951] loop4: detected capacity change from 0 to 264192 14:59:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) utimensat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) 14:59:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000004f80)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {}, [{0x2, 0x2}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x8, r3}], {0x10, 0x6}, {0x20, 0x6}}, 0x3c, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x307e00}], 0x1, 0x1400, 0x0, 0x3) 14:59:22 executing program 5: r0 = memfd_create(&(0x7f0000000240)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x03\xff\x00\x00\x8at\xa24>X@\rq@\xf2\xe9\xc6\xb6y\x0e\x90[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv\x8e\xd6\xb4\x81\x94\xac\x0eO\x82\xb8\xe5_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f,A,\x89\xb8\xf4\rt\xc1\xc6\xca\x00\xf7RQ\xe3\xfa\xa6Z\xa2;\x840t\xc4\xd7\xd8M\x0f\xf2r\xfe\x83\xc5\xee3\xdeoK3\xa5u\xfc\xd9\xcb\xad$\x80\x9aa\x01j\"RP\a\xb0\xf7f\xff\xf6\x19\xa0\x01;\x87\x8d\xae\xc9\xd1\x1e\x18E\x85b\xc3\xc9y\xac};\xcc\x85\xde\xafA\x0ff\x86\xe3\xf5\x12S!\xb5\xee\x89\xb5[Z j\xcc\xef\xe4\xbe@\x8d\xb3.\xa4\xc3\x1b\xbf\xe5\xc8\xa4\xd5\x8c\xb2\x1ew&)\xc3\x89\x04q\x1ag\xb9\x8d\xd2]\xa5\x12\xa3\xb7 [\xe9k0\xc9\xad\x17\x18\xa4\xf5\x94u\xbbiQ\xe19\xa9x\xcd(NX\rK\xec\xa4l\x05\x9c#c\x15\xcc\xf1\n', 0x4) fcntl$setstatus(r0, 0x4, 0x42c00) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 14:59:22 executing program 5: r0 = memfd_create(&(0x7f0000000240)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x03\xff\x00\x00\x8at\xa24>X@\rq@\xf2\xe9\xc6\xb6y\x0e\x90[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv\x8e\xd6\xb4\x81\x94\xac\x0eO\x82\xb8\xe5_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f,A,\x89\xb8\xf4\rt\xc1\xc6\xca\x00\xf7RQ\xe3\xfa\xa6Z\xa2;\x840t\xc4\xd7\xd8M\x0f\xf2r\xfe\x83\xc5\xee3\xdeoK3\xa5u\xfc\xd9\xcb\xad$\x80\x9aa\x01j\"RP\a\xb0\xf7f\xff\xf6\x19\xa0\x01;\x87\x8d\xae\xc9\xd1\x1e\x18E\x85b\xc3\xc9y\xac};\xcc\x85\xde\xafA\x0ff\x86\xe3\xf5\x12S!\xb5\xee\x89\xb5[Z j\xcc\xef\xe4\xbe@\x8d\xb3.\xa4\xc3\x1b\xbf\xe5\xc8\xa4\xd5\x8c\xb2\x1ew&)\xc3\x89\x04q\x1ag\xb9\x8d\xd2]\xa5\x12\xa3\xb7 [\xe9k0\xc9\xad\x17\x18\xa4\xf5\x94u\xbbiQ\xe19\xa9x\xcd(NX\rK\xec\xa4l\x05\x9c#c\x15\xcc\xf1\n', 0x4) fcntl$setstatus(r0, 0x4, 0x42c00) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 14:59:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) utimensat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) 14:59:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000200)={0x20}, 0x10) write(r0, &(0x7f00000000c0)="240000001e00ff0214fffffffffffff80700000016000000000000000300090016000000", 0x24) 14:59:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x10}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x32}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 14:59:22 executing program 5: r0 = memfd_create(&(0x7f0000000240)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x03\xff\x00\x00\x8at\xa24>X@\rq@\xf2\xe9\xc6\xb6y\x0e\x90[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv\x8e\xd6\xb4\x81\x94\xac\x0eO\x82\xb8\xe5_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f,A,\x89\xb8\xf4\rt\xc1\xc6\xca\x00\xf7RQ\xe3\xfa\xa6Z\xa2;\x840t\xc4\xd7\xd8M\x0f\xf2r\xfe\x83\xc5\xee3\xdeoK3\xa5u\xfc\xd9\xcb\xad$\x80\x9aa\x01j\"RP\a\xb0\xf7f\xff\xf6\x19\xa0\x01;\x87\x8d\xae\xc9\xd1\x1e\x18E\x85b\xc3\xc9y\xac};\xcc\x85\xde\xafA\x0ff\x86\xe3\xf5\x12S!\xb5\xee\x89\xb5[Z j\xcc\xef\xe4\xbe@\x8d\xb3.\xa4\xc3\x1b\xbf\xe5\xc8\xa4\xd5\x8c\xb2\x1ew&)\xc3\x89\x04q\x1ag\xb9\x8d\xd2]\xa5\x12\xa3\xb7 [\xe9k0\xc9\xad\x17\x18\xa4\xf5\x94u\xbbiQ\xe19\xa9x\xcd(NX\rK\xec\xa4l\x05\x9c#c\x15\xcc\xf1\n', 0x4) fcntl$setstatus(r0, 0x4, 0x42c00) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 14:59:22 executing program 3: r0 = fork() prlimit64(r0, 0x0, &(0x7f0000000000)={0x0, 0x9}, 0x0) 14:59:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x10}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x32}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 14:59:22 executing program 5: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7}, 0xfffffeb7) 14:59:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@mpls_delroute={0xa0, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_NEWDST={0x84, 0x5}]}, 0xa0}}, 0x0) [ 65.145106][ T2969] loop1: detected capacity change from 0 to 264192 [ 65.149387][ T2970] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 14:59:23 executing program 5: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7}, 0xfffffeb7) 14:59:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000200)={0x20}, 0x10) write(r0, &(0x7f00000000c0)="240000001e00ff0214fffffffffffff80700000016000000000000000300090016000000", 0x24) 14:59:23 executing program 3: r0 = fork() prlimit64(r0, 0x0, &(0x7f0000000000)={0x0, 0x9}, 0x0) 14:59:23 executing program 5: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7}, 0xfffffeb7) 14:59:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x10}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x32}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 14:59:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@mpls_delroute={0xa0, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_NEWDST={0x84, 0x5}]}, 0xa0}}, 0x0) 14:59:23 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) ftruncate(r0, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0x0, 0x3, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000180), 0x4) 14:59:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@mpls_delroute={0xa0, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_NEWDST={0x84, 0x5}]}, 0xa0}}, 0x0) 14:59:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000200)={0x20}, 0x10) write(r0, &(0x7f00000000c0)="240000001e00ff0214fffffffffffff80700000016000000000000000300090016000000", 0x24) 14:59:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x10}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x32}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 14:59:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@mpls_delroute={0xa0, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_NEWDST={0x84, 0x5}]}, 0xa0}}, 0x0) 14:59:23 executing program 5: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7}, 0xfffffeb7) 14:59:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x7}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}, @IFLA_IFNAME={0x14, 0x3, 'macvlan0\x00'}]}, 0x58}}, 0x0) [ 65.395937][ T2990] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 14:59:23 executing program 3: r0 = fork() prlimit64(r0, 0x0, &(0x7f0000000000)={0x0, 0x9}, 0x0) 14:59:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x34, 0x2, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_ZONE={0x6}, @CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @empty}}}]}]}, 0x34}}, 0x0) 14:59:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x34, 0x2, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_ZONE={0x6}, @CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @empty}}}]}]}, 0x34}}, 0x0) 14:59:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') lseek(r0, 0x47, 0x0) [ 65.465484][ T3002] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 65.473722][ T3002] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:23 executing program 3: r0 = fork() prlimit64(r0, 0x0, &(0x7f0000000000)={0x0, 0x9}, 0x0) [ 65.518829][ T24] audit: type=1400 audit(1639753163.300:180): avc: denied { module_request } for pid=3000 comm="syz-executor.1" kmod="net-pf-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 65.527931][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 65.557343][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 65.574810][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 65.599661][ T3010] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 14:59:23 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) ftruncate(r0, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0x0, 0x3, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000180), 0x4) 14:59:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x34, 0x2, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_ZONE={0x6}, @CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @empty}}}]}]}, 0x34}}, 0x0) 14:59:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') lseek(r0, 0x47, 0x0) 14:59:23 executing program 3: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:59:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000200)={0x20}, 0x10) write(r0, &(0x7f00000000c0)="240000001e00ff0214fffffffffffff80700000016000000000000000300090016000000", 0x24) 14:59:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x7}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}, @IFLA_IFNAME={0x14, 0x3, 'macvlan0\x00'}]}, 0x58}}, 0x0) 14:59:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x7}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}, @IFLA_IFNAME={0x14, 0x3, 'macvlan0\x00'}]}, 0x58}}, 0x0) 14:59:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') lseek(r0, 0x47, 0x0) 14:59:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') lseek(r0, 0x47, 0x0) [ 65.633711][ T3002] syz-executor.1 (3002) used greatest stack depth: 11216 bytes left [ 65.667650][ T3033] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 14:59:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x34, 0x2, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_ZONE={0x6}, @CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @empty}}}]}]}, 0x34}}, 0x0) 14:59:23 executing program 3: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:59:23 executing program 3: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 65.685761][ T3037] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 65.694015][ T3037] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 65.743845][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 65.766297][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 65.774129][ T3037] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:59:23 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) ftruncate(r0, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0x0, 0x3, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000180), 0x4) 14:59:23 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:59:23 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) ftruncate(r0, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0x0, 0x3, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000180), 0x4) 14:59:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MCAST_TO_UCAST={0x5}]}}}]}, 0x44}}, 0x0) 14:59:23 executing program 3: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:59:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x7}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}, @IFLA_IFNAME={0x14, 0x3, 'macvlan0\x00'}]}, 0x58}}, 0x0) 14:59:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000000c0)={'broute\x00', 0x0, 0x0, 0x30, [], 0x0, 0x0, 0x0}, &(0x7f0000000140)=0xa8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x7}, 0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x6, 0x0}, 0x4e24, 0x0, 'lblc\x00', 0x10, 0x6, 0x4a}, 0x2c) 14:59:23 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:59:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'vlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_ADDRESS={0xa}]}, 0x2c}}, 0x0) [ 65.849330][ T24] audit: type=1400 audit(1639753163.640:181): avc: denied { ioctl } for pid=3051 comm="syz-executor.0" path="socket:[20782]" dev="sockfs" ino=20782 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 65.876558][ T3060] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 65.884798][ T3060] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 14:59:23 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:59:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000000c0)={'broute\x00', 0x0, 0x0, 0x30, [], 0x0, 0x0, 0x0}, &(0x7f0000000140)=0xa8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x7}, 0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x6, 0x0}, 0x4e24, 0x0, 'lblc\x00', 0x10, 0x6, 0x4a}, 0x2c) 14:59:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000000c0)={'broute\x00', 0x0, 0x0, 0x30, [], 0x0, 0x0, 0x0}, &(0x7f0000000140)=0xa8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x7}, 0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x6, 0x0}, 0x4e24, 0x0, 'lblc\x00', 0x10, 0x6, 0x4a}, 0x2c) [ 65.903745][ T24] audit: type=1400 audit(1639753163.690:182): avc: denied { ioctl } for pid=3063 comm="syz-executor.2" path="socket:[19968]" dev="sockfs" ino=19968 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 65.913324][ T3060] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 65.974483][ T3060] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 65.983654][ T3060] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.010317][ T3064] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 66.018498][ T3064] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 66.039647][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 66.052319][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.060186][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:59:23 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) ftruncate(r0, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0x0, 0x3, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000180), 0x4) 14:59:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000000c0)={'broute\x00', 0x0, 0x0, 0x30, [], 0x0, 0x0, 0x0}, &(0x7f0000000140)=0xa8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x7}, 0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x6, 0x0}, 0x4e24, 0x0, 'lblc\x00', 0x10, 0x6, 0x4a}, 0x2c) 14:59:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000000c0)={'broute\x00', 0x0, 0x0, 0x30, [], 0x0, 0x0, 0x0}, &(0x7f0000000140)=0xa8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x7}, 0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x6, 0x0}, 0x4e24, 0x0, 'lblc\x00', 0x10, 0x6, 0x4a}, 0x2c) 14:59:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MCAST_TO_UCAST={0x5}]}}}]}, 0x44}}, 0x0) 14:59:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'vlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_ADDRESS={0xa}]}, 0x2c}}, 0x0) 14:59:23 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) ftruncate(r0, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0x0, 0x3, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000180), 0x4) 14:59:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000000c0)={'broute\x00', 0x0, 0x0, 0x30, [], 0x0, 0x0, 0x0}, &(0x7f0000000140)=0xa8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x7}, 0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x6, 0x0}, 0x4e24, 0x0, 'lblc\x00', 0x10, 0x6, 0x4a}, 0x2c) 14:59:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MCAST_TO_UCAST={0x5}]}}}]}, 0x44}}, 0x0) 14:59:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000000c0)={'broute\x00', 0x0, 0x0, 0x30, [], 0x0, 0x0, 0x0}, &(0x7f0000000140)=0xa8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x7}, 0x4) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x6, 0x0}, 0x4e24, 0x0, 'lblc\x00', 0x10, 0x6, 0x4a}, 0x2c) 14:59:23 executing program 3: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x22) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000880)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', &(0x7f0000000940)='./file0/file0\x00', 0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0xb0, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0xc, 0x16}, {0x8}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@delqdisc={0x24, 0x25, 0x20, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xd, 0xe}, {0x8, 0x4}, {0xc, 0x6}}}, 0x24}}, 0x20000040) r5 = memfd_create(&(0x7f0000000180)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x4c, 0x0, 0x290, 0x73, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @local, [], [], 'wg2\x00', 'macvlan1\x00', {}, {}, 0x73}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x3}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'team0\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@icmp6={{0x28}, {0x0, "e1f6"}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f0000000340)="9a624a7d6d719fad1edd786c", 0xc}, {&(0x7f0000000380)="18541375d9f2ae05008ff6acd2ef1fa090ff13120c8d312e5acbcbdbe8e90c5b5ade1119597e113b09f568905d4ef91d6857c26ebc7651c70e16a6e0897562b1b8f5d57ef7c769428d1f6c8809ce52bcd42c0ec65412", 0x56}], 0x2, 0x9) preadv2(r5, &(0x7f0000000100)=[{&(0x7f0000000080)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) [ 66.131256][ T3084] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 66.139461][ T3084] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 66.168706][ T3084] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:59:23 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6174e8ffffffffffffff00000000040000000000000000000000000000000005"], 0x78) 14:59:24 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6174e8ffffffffffffff00000000040000000000000000000000000000000005"], 0x78) [ 66.181013][ T3084] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.195834][ T3084] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.238319][ T3090] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 66.246587][ T3090] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 66.256286][ T3106] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 [ 66.281790][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 66.291798][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.299923][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:59:24 executing program 3: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x22) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000880)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', &(0x7f0000000940)='./file0/file0\x00', 0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0xb0, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0xc, 0x16}, {0x8}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@delqdisc={0x24, 0x25, 0x20, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xd, 0xe}, {0x8, 0x4}, {0xc, 0x6}}}, 0x24}}, 0x20000040) r5 = memfd_create(&(0x7f0000000180)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x4c, 0x0, 0x290, 0x73, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @local, [], [], 'wg2\x00', 'macvlan1\x00', {}, {}, 0x73}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x3}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'team0\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@icmp6={{0x28}, {0x0, "e1f6"}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f0000000340)="9a624a7d6d719fad1edd786c", 0xc}, {&(0x7f0000000380)="18541375d9f2ae05008ff6acd2ef1fa090ff13120c8d312e5acbcbdbe8e90c5b5ade1119597e113b09f568905d4ef91d6857c26ebc7651c70e16a6e0897562b1b8f5d57ef7c769428d1f6c8809ce52bcd42c0ec65412", 0x56}], 0x2, 0x9) preadv2(r5, &(0x7f0000000100)=[{&(0x7f0000000080)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) 14:59:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) ftruncate(r0, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0x0, 0x3, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000180), 0x4) 14:59:24 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6174e8ffffffffffffff00000000040000000000000000000000000000000005"], 0x78) 14:59:24 executing program 1: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x22) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000880)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', &(0x7f0000000940)='./file0/file0\x00', 0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0xb0, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0xc, 0x16}, {0x8}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@delqdisc={0x24, 0x25, 0x20, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xd, 0xe}, {0x8, 0x4}, {0xc, 0x6}}}, 0x24}}, 0x20000040) r5 = memfd_create(&(0x7f0000000180)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x4c, 0x0, 0x290, 0x73, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @local, [], [], 'wg2\x00', 'macvlan1\x00', {}, {}, 0x73}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x3}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'team0\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@icmp6={{0x28}, {0x0, "e1f6"}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f0000000340)="9a624a7d6d719fad1edd786c", 0xc}, {&(0x7f0000000380)="18541375d9f2ae05008ff6acd2ef1fa090ff13120c8d312e5acbcbdbe8e90c5b5ade1119597e113b09f568905d4ef91d6857c26ebc7651c70e16a6e0897562b1b8f5d57ef7c769428d1f6c8809ce52bcd42c0ec65412", 0x56}], 0x2, 0x9) preadv2(r5, &(0x7f0000000100)=[{&(0x7f0000000080)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) 14:59:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'vlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_ADDRESS={0xa}]}, 0x2c}}, 0x0) 14:59:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MCAST_TO_UCAST={0x5}]}}}]}, 0x44}}, 0x0) [ 66.339169][ T3097] syz-executor.3 (3097) used greatest stack depth: 10328 bytes left 14:59:24 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6174e8ffffffffffffff00000000040000000000000000000000000000000005"], 0x78) 14:59:24 executing program 5: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x22) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000880)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', &(0x7f0000000940)='./file0/file0\x00', 0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0xb0, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0xc, 0x16}, {0x8}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@delqdisc={0x24, 0x25, 0x20, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xd, 0xe}, {0x8, 0x4}, {0xc, 0x6}}}, 0x24}}, 0x20000040) r5 = memfd_create(&(0x7f0000000180)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x4c, 0x0, 0x290, 0x73, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @local, [], [], 'wg2\x00', 'macvlan1\x00', {}, {}, 0x73}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x3}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'team0\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@icmp6={{0x28}, {0x0, "e1f6"}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f0000000340)="9a624a7d6d719fad1edd786c", 0xc}, {&(0x7f0000000380)="18541375d9f2ae05008ff6acd2ef1fa090ff13120c8d312e5acbcbdbe8e90c5b5ade1119597e113b09f568905d4ef91d6857c26ebc7651c70e16a6e0897562b1b8f5d57ef7c769428d1f6c8809ce52bcd42c0ec65412", 0x56}], 0x2, 0x9) preadv2(r5, &(0x7f0000000100)=[{&(0x7f0000000080)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) [ 66.387549][ T3113] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 66.404605][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 66.417198][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.426868][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:59:24 executing program 1: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x22) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000880)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', &(0x7f0000000940)='./file0/file0\x00', 0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0xb0, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0xc, 0x16}, {0x8}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@delqdisc={0x24, 0x25, 0x20, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xd, 0xe}, {0x8, 0x4}, {0xc, 0x6}}}, 0x24}}, 0x20000040) r5 = memfd_create(&(0x7f0000000180)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x4c, 0x0, 0x290, 0x73, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @local, [], [], 'wg2\x00', 'macvlan1\x00', {}, {}, 0x73}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x3}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'team0\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@icmp6={{0x28}, {0x0, "e1f6"}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f0000000340)="9a624a7d6d719fad1edd786c", 0xc}, {&(0x7f0000000380)="18541375d9f2ae05008ff6acd2ef1fa090ff13120c8d312e5acbcbdbe8e90c5b5ade1119597e113b09f568905d4ef91d6857c26ebc7651c70e16a6e0897562b1b8f5d57ef7c769428d1f6c8809ce52bcd42c0ec65412", 0x56}], 0x2, 0x9) preadv2(r5, &(0x7f0000000100)=[{&(0x7f0000000080)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) 14:59:24 executing program 3: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x22) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000880)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', &(0x7f0000000940)='./file0/file0\x00', 0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0xb0, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0xc, 0x16}, {0x8}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@delqdisc={0x24, 0x25, 0x20, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xd, 0xe}, {0x8, 0x4}, {0xc, 0x6}}}, 0x24}}, 0x20000040) r5 = memfd_create(&(0x7f0000000180)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x4c, 0x0, 0x290, 0x73, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @local, [], [], 'wg2\x00', 'macvlan1\x00', {}, {}, 0x73}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x3}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'team0\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@icmp6={{0x28}, {0x0, "e1f6"}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f0000000340)="9a624a7d6d719fad1edd786c", 0xc}, {&(0x7f0000000380)="18541375d9f2ae05008ff6acd2ef1fa090ff13120c8d312e5acbcbdbe8e90c5b5ade1119597e113b09f568905d4ef91d6857c26ebc7651c70e16a6e0897562b1b8f5d57ef7c769428d1f6c8809ce52bcd42c0ec65412", 0x56}], 0x2, 0x9) preadv2(r5, &(0x7f0000000100)=[{&(0x7f0000000080)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) 14:59:24 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x80000001}) 14:59:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'vlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_ADDRESS={0xa}]}, 0x2c}}, 0x0) 14:59:24 executing program 5: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x22) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000880)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', &(0x7f0000000940)='./file0/file0\x00', 0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0xb0, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0xc, 0x16}, {0x8}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@delqdisc={0x24, 0x25, 0x20, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xd, 0xe}, {0x8, 0x4}, {0xc, 0x6}}}, 0x24}}, 0x20000040) r5 = memfd_create(&(0x7f0000000180)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x4c, 0x0, 0x290, 0x73, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @local, [], [], 'wg2\x00', 'macvlan1\x00', {}, {}, 0x73}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x3}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'team0\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@icmp6={{0x28}, {0x0, "e1f6"}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f0000000340)="9a624a7d6d719fad1edd786c", 0xc}, {&(0x7f0000000380)="18541375d9f2ae05008ff6acd2ef1fa090ff13120c8d312e5acbcbdbe8e90c5b5ade1119597e113b09f568905d4ef91d6857c26ebc7651c70e16a6e0897562b1b8f5d57ef7c769428d1f6c8809ce52bcd42c0ec65412", 0x56}], 0x2, 0x9) preadv2(r5, &(0x7f0000000100)=[{&(0x7f0000000080)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) [ 66.438753][ T3124] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 [ 66.446806][ T3127] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 [ 66.471345][ T3123] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 14:59:24 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x80000001}) 14:59:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000080208700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0xe501, 0x3, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x230, 0x230, 0x210, 0x230, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'veth1_macvtap\x00', 'veth1_to_team\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48}}, @common=@unspec=@time={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x6}]}, 0x78) fallocate(r3, 0x3, 0x0, 0x1000f4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) ioctl$TIOCSIG(r1, 0x40045436, 0x40) 14:59:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1a, 0x4, &(0x7f00000003c0)=@framed={{}, [@jmp]}, &(0x7f00000000c0)='GPL\x00', 0x7, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) [ 66.531717][ T3134] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 [ 66.532510][ T3135] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 [ 66.561097][ T3137] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 [ 66.576225][ T3141] xt_limit: Overflow, try lower: 0/0 14:59:24 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x80000001}) 14:59:24 executing program 3: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x22) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000880)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', &(0x7f0000000940)='./file0/file0\x00', 0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0xb0, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0xc, 0x16}, {0x8}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@delqdisc={0x24, 0x25, 0x20, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xd, 0xe}, {0x8, 0x4}, {0xc, 0x6}}}, 0x24}}, 0x20000040) r5 = memfd_create(&(0x7f0000000180)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x4c, 0x0, 0x290, 0x73, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @local, [], [], 'wg2\x00', 'macvlan1\x00', {}, {}, 0x73}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x3}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'team0\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@icmp6={{0x28}, {0x0, "e1f6"}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f0000000340)="9a624a7d6d719fad1edd786c", 0xc}, {&(0x7f0000000380)="18541375d9f2ae05008ff6acd2ef1fa090ff13120c8d312e5acbcbdbe8e90c5b5ade1119597e113b09f568905d4ef91d6857c26ebc7651c70e16a6e0897562b1b8f5d57ef7c769428d1f6c8809ce52bcd42c0ec65412", 0x56}], 0x2, 0x9) preadv2(r5, &(0x7f0000000100)=[{&(0x7f0000000080)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) 14:59:24 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x80000001}) 14:59:24 executing program 1: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x22) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000880)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', &(0x7f0000000940)='./file0/file0\x00', 0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0xb0, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0xc, 0x16}, {0x8}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@delqdisc={0x24, 0x25, 0x20, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xd, 0xe}, {0x8, 0x4}, {0xc, 0x6}}}, 0x24}}, 0x20000040) r5 = memfd_create(&(0x7f0000000180)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x4c, 0x0, 0x290, 0x73, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @local, [], [], 'wg2\x00', 'macvlan1\x00', {}, {}, 0x73}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x3}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'team0\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@icmp6={{0x28}, {0x0, "e1f6"}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f0000000340)="9a624a7d6d719fad1edd786c", 0xc}, {&(0x7f0000000380)="18541375d9f2ae05008ff6acd2ef1fa090ff13120c8d312e5acbcbdbe8e90c5b5ade1119597e113b09f568905d4ef91d6857c26ebc7651c70e16a6e0897562b1b8f5d57ef7c769428d1f6c8809ce52bcd42c0ec65412", 0x56}], 0x2, 0x9) preadv2(r5, &(0x7f0000000100)=[{&(0x7f0000000080)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) 14:59:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000080208700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0xe501, 0x3, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x230, 0x230, 0x210, 0x230, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'veth1_macvtap\x00', 'veth1_to_team\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48}}, @common=@unspec=@time={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x6}]}, 0x78) fallocate(r3, 0x3, 0x0, 0x1000f4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) ioctl$TIOCSIG(r1, 0x40045436, 0x40) 14:59:24 executing program 5: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x22) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000880)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', &(0x7f0000000940)='./file0/file0\x00', 0xffffffffffffffff) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0xb0, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0xc, 0x16}, {0x8}, {0x1b}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@delqdisc={0x24, 0x25, 0x20, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xd, 0xe}, {0x8, 0x4}, {0xc, 0x6}}}, 0x24}}, 0x20000040) r5 = memfd_create(&(0x7f0000000180)=' \x00\x8a\xa9\x16\rO\xdd\xdfk(F\x99\xdfU\xb0`Y6\\\\\t+\xab\xe2\xad=3nA\xebX\xe0}Z\xdf[h\x7f\x19\xa9\x03\a[\\\x9f\bV\xca^\"\xd5\xe1\xd7\x14\x92\xf9\xee\x10\xe0~\xaa\xa2\x87!\x03W\x9b\xe6\aQ\xe4@\xf3\x01n\xef\x1c\xc6\x89\x98D\xad\xc3(\xf6\xff\xb0\xfc\xc0dU\x06\xca@\xbdZ\x16\xec\xb5\x00i\x0f\x99Wp\x96\xf8\x1f\x05U\x9a~a\xa3d>\xc8\x16\xa5lS\x9c\xc6\xc6\x8f\xc8', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x4c, 0x0, 0x290, 0x73, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @local, [], [], 'wg2\x00', 'macvlan1\x00', {}, {}, 0x73}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x3}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vxcan1\x00', 'team0\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@icmp6={{0x28}, {0x0, "e1f6"}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) vmsplice(r6, &(0x7f0000000400)=[{&(0x7f0000000340)="9a624a7d6d719fad1edd786c", 0xc}, {&(0x7f0000000380)="18541375d9f2ae05008ff6acd2ef1fa090ff13120c8d312e5acbcbdbe8e90c5b5ade1119597e113b09f568905d4ef91d6857c26ebc7651c70e16a6e0897562b1b8f5d57ef7c769428d1f6c8809ce52bcd42c0ec65412", 0x56}], 0x2, 0x9) preadv2(r5, &(0x7f0000000100)=[{&(0x7f0000000080)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x8) [ 66.587162][ T24] audit: type=1400 audit(1639753164.370:183): avc: denied { prog_load } for pid=3143 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 14:59:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x69, 0x10, 0x4e}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 14:59:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1a, 0x4, &(0x7f00000003c0)=@framed={{}, [@jmp]}, &(0x7f00000000c0)='GPL\x00', 0x7, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 14:59:24 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x3}, 0x1c) 14:59:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f0000000140)=""/4096, 0x3e, 0x1000, 0x1}, 0x20) 14:59:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000080208700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0xe501, 0x3, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x230, 0x230, 0x210, 0x230, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'veth1_macvtap\x00', 'veth1_to_team\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48}}, @common=@unspec=@time={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x6}]}, 0x78) fallocate(r3, 0x3, 0x0, 0x1000f4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) ioctl$TIOCSIG(r1, 0x40045436, 0x40) 14:59:24 executing program 5: r0 = socket$unix(0x1, 0x800000000005, 0x0) shutdown(r0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1}, 0xc) [ 66.648593][ T3148] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 [ 66.661931][ T3153] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 [ 66.663142][ T3152] xt_limit: Overflow, try lower: 0/0 [ 66.675639][ T3154] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 14:59:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x69, 0x10, 0x4e}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 14:59:24 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x3}, 0x1c) 14:59:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1a, 0x4, &(0x7f00000003c0)=@framed={{}, [@jmp]}, &(0x7f00000000c0)='GPL\x00', 0x7, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 14:59:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000790000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7, 0x0) 14:59:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x69, 0x10, 0x4e}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 14:59:24 executing program 5: r0 = socket$unix(0x1, 0x800000000005, 0x0) shutdown(r0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1}, 0xc) 14:59:24 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x3}, 0x1c) 14:59:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1a, 0x4, &(0x7f00000003c0)=@framed={{}, [@jmp]}, &(0x7f00000000c0)='GPL\x00', 0x7, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 14:59:24 executing program 5: r0 = socket$unix(0x1, 0x800000000005, 0x0) shutdown(r0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1}, 0xc) 14:59:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x69, 0x10, 0x4e}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 66.769538][ T3173] xt_limit: Overflow, try lower: 0/0 [ 66.783994][ T24] audit: type=1400 audit(1639753164.570:184): avc: denied { prog_run } for pid=3174 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 14:59:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000080208700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0xe501, 0x3, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x230, 0x230, 0x210, 0x230, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'veth1_macvtap\x00', 'veth1_to_team\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@limit={{0x48}}, @common=@unspec=@time={{0x38}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x308) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x6}]}, 0x78) fallocate(r3, 0x3, 0x0, 0x1000f4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r2) ioctl$TIOCSIG(r1, 0x40045436, 0x40) 14:59:24 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x3}, 0x1c) 14:59:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000140)=0x100000001, 0x847) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x400000000000006f, 0x28001) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000000)={0x0, 0x1, [{}]}) 14:59:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000790000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7, 0x0) 14:59:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000140)=0x100000001, 0x847) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x400000000000006f, 0x28001) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000000)={0x0, 0x1, [{}]}) 14:59:24 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000790000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7, 0x0) 14:59:24 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000790000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7, 0x0) 14:59:24 executing program 5: r0 = socket$unix(0x1, 0x800000000005, 0x0) shutdown(r0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1}, 0xc) [ 66.876571][ T24] audit: type=1400 audit(1639753164.660:185): avc: denied { write } for pid=3196 comm="syz-executor.2" name="001" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 14:59:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000140)=0x100000001, 0x847) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x400000000000006f, 0x28001) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000000)={0x0, 0x1, [{}]}) 14:59:24 executing program 5: syz_emit_ethernet(0x84, &(0x7f0000000680)=ANY=[@ANYBLOB="ffffffffffffbbbbbbbbbbbb8100000086dd60d60600004a2f00fc0000000000003216b5240000000000fe8000000000000000000000000000aa242065580000000000000000080000000008000086dd152a"], 0x0) 14:59:24 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000790000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7, 0x0) 14:59:24 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000790000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7, 0x0) 14:59:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000790000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7, 0x0) [ 66.968647][ T3194] xt_limit: Overflow, try lower: 0/0 14:59:24 executing program 5: syz_emit_ethernet(0x84, &(0x7f0000000680)=ANY=[@ANYBLOB="ffffffffffffbbbbbbbbbbbb8100000086dd60d60600004a2f00fc0000000000003216b5240000000000fe8000000000000000000000000000aa242065580000000000000000080000000008000086dd152a"], 0x0) 14:59:24 executing program 2: set_mempolicy(0x3, &(0x7f0000000140)=0x100000001, 0x847) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x400000000000006f, 0x28001) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000000)={0x0, 0x1, [{}]}) 14:59:24 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000790000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7, 0x0) 14:59:24 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000790000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7, 0x0) 14:59:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000ad0000008000"}) r1 = syz_open_pts(r0, 0x101001) ioctl$TIOCCONS(r1, 0x541d) dup3(r1, r0, 0x0) 14:59:24 executing program 5: syz_emit_ethernet(0x84, &(0x7f0000000680)=ANY=[@ANYBLOB="ffffffffffffbbbbbbbbbbbb8100000086dd60d60600004a2f00fc0000000000003216b5240000000000fe8000000000000000000000000000aa242065580000000000000000080000000008000086dd152a"], 0x0) 14:59:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000ad0000008000"}) r1 = syz_open_pts(r0, 0x101001) ioctl$TIOCCONS(r1, 0x541d) dup3(r1, r0, 0x0) 14:59:24 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x5, 0x3, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "0000ffee00006e00"}}, 0x48}}, 0x0) recvmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003680)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x40000002, 0x0) 14:59:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x4d}, {0x15, 0x0, 0x0, 0x3}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 14:59:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{}, {0x7c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 14:59:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000790000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7, 0x0) 14:59:24 executing program 5: syz_emit_ethernet(0x84, &(0x7f0000000680)=ANY=[@ANYBLOB="ffffffffffffbbbbbbbbbbbb8100000086dd60d60600004a2f00fc0000000000003216b5240000000000fe8000000000000000000000000000aa242065580000000000000000080000000008000086dd152a"], 0x0) 14:59:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x4d}, {0x15, 0x0, 0x0, 0x3}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 67.100905][ T24] audit: type=1400 audit(1639753164.890:186): avc: denied { connect } for pid=3236 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 67.120881][ T24] audit: type=1400 audit(1639753164.890:187): avc: denied { write } for pid=3236 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 14:59:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000ad0000008000"}) r1 = syz_open_pts(r0, 0x101001) ioctl$TIOCCONS(r1, 0x541d) dup3(r1, r0, 0x0) 14:59:24 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x5, 0x3, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "0000ffee00006e00"}}, 0x48}}, 0x0) recvmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003680)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x40000002, 0x0) 14:59:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{}, {0x7c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 14:59:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="89000000120081ae08060c0f006b8000000000200000000000e2ffca1b1f0000800000000072f750375ed08a56331dbf64700169381ad6e747033a0093b836dc6cc01e32efaec8c7a6ec00120c00010005080800bdad446b9bbc7a46e3988285dcdf12f213d3f82a9815b0955fed0009d78f0a947ee2b49e33538afa8af92347510f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 14:59:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000ad0000008000"}) r1 = syz_open_pts(r0, 0x101001) ioctl$TIOCCONS(r1, 0x541d) dup3(r1, r0, 0x0) 14:59:24 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') [ 67.140709][ T24] audit: type=1400 audit(1639753164.910:188): avc: denied { read } for pid=3236 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 14:59:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x5, 0x3, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "0000ffee00006e00"}}, 0x48}}, 0x0) recvmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003680)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x40000002, 0x0) 14:59:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{}, {0x7c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 14:59:25 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000002740)={0x0, 0x24, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'veth0_vlan\x00', @ifru_flags}) 14:59:25 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') 14:59:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="89000000120081ae08060c0f006b8000000000200000000000e2ffca1b1f0000800000000072f750375ed08a56331dbf64700169381ad6e747033a0093b836dc6cc01e32efaec8c7a6ec00120c00010005080800bdad446b9bbc7a46e3988285dcdf12f213d3f82a9815b0955fed0009d78f0a947ee2b49e33538afa8af92347510f0b56a20ff27fff", 0x89}], 0x1}, 0x0) [ 67.225937][ T24] audit: type=1400 audit(1639753165.010:189): avc: denied { read write } for pid=3256 comm="syz-executor.1" dev="sockfs" ino=20248 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 14:59:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x4d}, {0x15, 0x0, 0x0, 0x3}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 14:59:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{}, {0x7c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 14:59:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x5, 0x3, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "0000ffee00006e00"}}, 0x48}}, 0x0) recvmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003680)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x40000002, 0x0) 14:59:25 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') 14:59:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x4d}, {0x15, 0x0, 0x0, 0x3}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 14:59:25 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') 14:59:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_getaddr={0x40, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x4, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, @IFA_ADDRESS={0x14, 0x1, @remote}]}, 0x40}}, 0x0) 14:59:25 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') 14:59:25 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') 14:59:25 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000002740)={0x0, 0x24, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'veth0_vlan\x00', @ifru_flags}) 14:59:25 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, 0x0, &(0x7f0000000080)) 14:59:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="89000000120081ae08060c0f006b8000000000200000000000e2ffca1b1f0000800000000072f750375ed08a56331dbf64700169381ad6e747033a0093b836dc6cc01e32efaec8c7a6ec00120c00010005080800bdad446b9bbc7a46e3988285dcdf12f213d3f82a9815b0955fed0009d78f0a947ee2b49e33538afa8af92347510f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 14:59:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_getaddr={0x40, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x4, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, @IFA_ADDRESS={0x14, 0x1, @remote}]}, 0x40}}, 0x0) 14:59:25 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') close_range(r0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') 14:59:25 executing program 1: shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) 14:59:25 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, 0x0, &(0x7f0000000080)) 14:59:25 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) fsync(r0) 14:59:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_getaddr={0x40, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x4, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, @IFA_ADDRESS={0x14, 0x1, @remote}]}, 0x40}}, 0x0) 14:59:25 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000002740)={0x0, 0x24, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'veth0_vlan\x00', @ifru_flags}) 14:59:25 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x719, 0x0, 0x0, {0x29}}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240), r1) 14:59:25 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, 0x0, &(0x7f0000000080)) 14:59:25 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) fsync(r0) 14:59:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="89000000120081ae08060c0f006b8000000000200000000000e2ffca1b1f0000800000000072f750375ed08a56331dbf64700169381ad6e747033a0093b836dc6cc01e32efaec8c7a6ec00120c00010005080800bdad446b9bbc7a46e3988285dcdf12f213d3f82a9815b0955fed0009d78f0a947ee2b49e33538afa8af92347510f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 14:59:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_getaddr={0x40, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x4, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, @IFA_ADDRESS={0x14, 0x1, @remote}]}, 0x40}}, 0x0) 14:59:25 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000002740)={0x0, 0x24, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'veth0_vlan\x00', @ifru_flags}) 14:59:25 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, 0x0, &(0x7f0000000080)) 14:59:25 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x719, 0x0, 0x0, {0x29}}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240), r1) 14:59:25 executing program 0: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000300)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x7, 0x3, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 14:59:25 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) fsync(r0) 14:59:25 executing program 5: unshare(0x20040400) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) 14:59:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x4, 0x0, 0x0, 0x0, 0x79, 0x10, 0x98}, [@ldst={0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x148b1800}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 14:59:25 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x719, 0x0, 0x0, {0x29}}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240), r1) 14:59:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x7c, 0x0, 0x0) 14:59:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x4, 0x0, 0x0, 0x0, 0x79, 0x10, 0x98}, [@ldst={0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x148b1800}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 14:59:25 executing program 0: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000300)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x7, 0x3, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 14:59:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x4, 0x0, 0x0, 0x0, 0x79, 0x10, 0x98}, [@ldst={0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x148b1800}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 14:59:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x7c, 0x0, 0x0) 14:59:25 executing program 5: unshare(0x20040400) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) 14:59:25 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) fsync(r0) 14:59:25 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x719, 0x0, 0x0, {0x29}}, 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240), r1) 14:59:25 executing program 0: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000300)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x7, 0x3, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 14:59:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x88) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x8, 0x0, &(0x7f0000000000)) 14:59:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x7c, 0x0, 0x0) 14:59:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x4, 0x0, 0x0, 0x0, 0x79, 0x10, 0x98}, [@ldst={0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x148b1800}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 14:59:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010100000000000000000100000020000180060001000a000000140004"], 0x34}}, 0x0) 14:59:25 executing program 5: unshare(0x20040400) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) 14:59:25 executing program 5: unshare(0x20040400) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) 14:59:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x88) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x8, 0x0, &(0x7f0000000000)) 14:59:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x7c, 0x0, 0x0) 14:59:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 14:59:25 executing program 0: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000300)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x7, 0x3, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x30, 0x5}, 0x0) 14:59:25 executing program 1: futex(&(0x7f0000000080)=0x2, 0x5, 0x0, 0x0, &(0x7f0000000000), 0x9ffffffc) 14:59:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d80)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x8, 0x9, 0x0, 0x8, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) gettid() ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f00000000c0)='syzkaller\x00', 0x2, 0xad, &(0x7f00000002c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0x4040050, 0xffffffffffffffff, 0xd1454000) 14:59:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x88) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x8, 0x0, &(0x7f0000000000)) 14:59:25 executing program 5: r0 = creat(0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000100)={@multicast1, @local, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x38020}, 0xc, &(0x7f0000000440)={0x0, 0x44}, 0x1, 0x0, 0x0, 0x4000005}, 0x8001) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000240)=""/95, 0x5f}, {&(0x7f0000000480)=""/69, 0x45}, {&(0x7f0000000080)=""/55, 0x37}, {&(0x7f00000006c0)=""/131, 0x83}], 0x4, 0x7, 0x842) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x4000) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(0x0, 0x800) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) fsetxattr$system_posix_acl(r1, &(0x7f0000000180)='system.posix_acl_default\x00', 0x0, 0x3c, 0x2) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0), 0x200c010, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[], [{@dont_appraise}, {@appraise_type}, {@smackfshat={'smackfshat', 0x3d, '9p\x00'}}]}}) 14:59:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 14:59:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x88) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x8, 0x0, &(0x7f0000000000)) [ 67.858946][ T3371] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program [ 67.895884][ C0] sd 0:0:1:0: tag#5976 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 14:59:25 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0xa, 0x3, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x52, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x94, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x4e00}]}, @IFLA_AF_SPEC={0x6c, 0x1a, 0x0, 0x1, [@AF_INET6={0x54, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_TOKEN={0xffffffffffffff92, 0x7, @private1}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_BRIDGE={0x4}, @AF_INET6={0xc}, @AF_MPLS={0x4}]}]}, 0x94}}, 0x0) 14:59:25 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x2}, {}, 0x8, 0x0, 0x1, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@private=0xa010102, 0x0, 0x0, 0x1, 0x4, 0xffffffff, 0xfffffffd}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x1f4) 14:59:25 executing program 1: futex(&(0x7f0000000080)=0x2, 0x5, 0x0, 0x0, &(0x7f0000000000), 0x9ffffffc) 14:59:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x18, 0x309, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xb}}, 0x1c}}, 0x0) [ 67.905829][ C0] sd 0:0:1:0: tag#5976 CDB: opcode=0xe5 (vendor) [ 67.912417][ C0] sd 0:0:1:0: tag#5976 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 67.921470][ C0] sd 0:0:1:0: tag#5976 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 67.933818][ C0] sd 0:0:1:0: tag#5976 CDB[20]: ba 14:59:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 14:59:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x18, 0x309, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xb}}, 0x1c}}, 0x0) 14:59:25 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0xa, 0x3, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x52, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x94, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x4e00}]}, @IFLA_AF_SPEC={0x6c, 0x1a, 0x0, 0x1, [@AF_INET6={0x54, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_TOKEN={0xffffffffffffff92, 0x7, @private1}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_BRIDGE={0x4}, @AF_INET6={0xc}, @AF_MPLS={0x4}]}]}, 0x94}}, 0x0) [ 67.982828][ T3387] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.997044][ T3390] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program 14:59:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d80)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x8, 0x9, 0x0, 0x8, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) gettid() ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f00000000c0)='syzkaller\x00', 0x2, 0xad, &(0x7f00000002c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0x4040050, 0xffffffffffffffff, 0xd1454000) 14:59:25 executing program 1: futex(&(0x7f0000000080)=0x2, 0x5, 0x0, 0x0, &(0x7f0000000000), 0x9ffffffc) 14:59:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 14:59:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x18, 0x309, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xb}}, 0x1c}}, 0x0) 14:59:25 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0xa, 0x3, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x52, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x94, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x4e00}]}, @IFLA_AF_SPEC={0x6c, 0x1a, 0x0, 0x1, [@AF_INET6={0x54, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_TOKEN={0xffffffffffffff92, 0x7, @private1}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_BRIDGE={0x4}, @AF_INET6={0xc}, @AF_MPLS={0x4}]}]}, 0x94}}, 0x0) [ 68.032094][ T3397] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.064031][ T3405] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program 14:59:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x18, 0x309, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xb}}, 0x1c}}, 0x0) [ 68.082970][ T3407] bridge0: port 1(bridge_slave_0) entered disabled state 14:59:26 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000002d80)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 14:59:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d80)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x8, 0x9, 0x0, 0x8, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) gettid() ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f00000000c0)='syzkaller\x00', 0x2, 0xad, &(0x7f00000002c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0x4040050, 0xffffffffffffffff, 0xd1454000) 14:59:26 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0xa, 0x3, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x52, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x94, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x4e00}]}, @IFLA_AF_SPEC={0x6c, 0x1a, 0x0, 0x1, [@AF_INET6={0x54, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_TOKEN={0xffffffffffffff92, 0x7, @private1}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_BRIDGE={0x4}, @AF_INET6={0xc}, @AF_MPLS={0x4}]}]}, 0x94}}, 0x0) 14:59:26 executing program 1: futex(&(0x7f0000000080)=0x2, 0x5, 0x0, 0x0, &(0x7f0000000000), 0x9ffffffc) 14:59:26 executing program 0: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x60, &(0x7f0000000000)={0x0, 'sit0\x00'}, 0x18) 14:59:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d80)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x8, 0x9, 0x0, 0x8, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) gettid() ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f00000000c0)='syzkaller\x00', 0x2, 0xad, &(0x7f00000002c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0x4040050, 0xffffffffffffffff, 0xd1454000) 14:59:26 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) timerfd_create(0x9, 0x0) 14:59:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d80)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x8, 0x9, 0x0, 0x8, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) gettid() ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f00000000c0)='syzkaller\x00', 0x2, 0xad, &(0x7f00000002c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0x4040050, 0xffffffffffffffff, 0xd1454000) 14:59:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), r1) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, r2, 0x1, 0x0, 0x0, {0x23}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x20}}, 0x0) 14:59:26 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) timerfd_create(0x9, 0x0) [ 68.262385][ T3413] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program [ 68.288017][ T3422] loop5: detected capacity change from 0 to 16 [ 68.303544][ T3419] bridge0: port 1(bridge_slave_0) entered disabled state 14:59:26 executing program 3: clock_nanosleep(0xfffffdfc, 0x0, &(0x7f0000000040), 0x0) 14:59:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), r1) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, r2, 0x1, 0x0, 0x0, {0x23}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x20}}, 0x0) 14:59:26 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000002d80)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 14:59:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d80)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x8, 0x9, 0x0, 0x8, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) gettid() ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f00000000c0)='syzkaller\x00', 0x2, 0xad, &(0x7f00000002c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0x4040050, 0xffffffffffffffff, 0xd1454000) 14:59:26 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) timerfd_create(0x9, 0x0) 14:59:26 executing program 3: clock_nanosleep(0xfffffdfc, 0x0, &(0x7f0000000040), 0x0) 14:59:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), r1) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, r2, 0x1, 0x0, 0x0, {0x23}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x20}}, 0x0) 14:59:26 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) timerfd_create(0x9, 0x0) 14:59:26 executing program 3: clock_nanosleep(0xfffffdfc, 0x0, &(0x7f0000000040), 0x0) 14:59:26 executing program 2: r0 = socket(0x2b, 0x1, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x6, 0x21, 0x0, 0x10) 14:59:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), r1) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, r2, 0x1, 0x0, 0x0, {0x23}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x20}}, 0x0) 14:59:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d80)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x8, 0x9, 0x0, 0x8, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) gettid() ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f00000000c0)='syzkaller\x00', 0x2, 0xad, &(0x7f00000002c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0x4040050, 0xffffffffffffffff, 0xd1454000) 14:59:26 executing program 3: clock_nanosleep(0xfffffdfc, 0x0, &(0x7f0000000040), 0x0) 14:59:26 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000002d80)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 14:59:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)="89000000120081ae08060c0f006b3f087f03e3f70000000000e2ffca1b1f0000000000000072f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00010001080800bdad446b9bbc7a46e3988285dcdf12f21308f868fece14955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) [ 68.421066][ T3446] loop5: detected capacity change from 0 to 16 14:59:26 executing program 3: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x40000006}) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:59:26 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) clock_adjtime(0x0, &(0x7f0000000040)={0xd54}) 14:59:26 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) clock_adjtime(0x0, &(0x7f0000000040)={0xd54}) [ 68.507449][ T3462] loop5: detected capacity change from 0 to 16 [ 68.529429][ T2093] ================================================================== [ 68.537616][ T2093] BUG: KCSAN: data-race in shmem_mknod / vfs_getattr_nosec [ 68.544818][ T2093] [ 68.547135][ T2093] write to 0xffff888102ebb728 of 8 bytes by task 1892 on cpu 1: [ 68.554754][ T2093] shmem_mknod+0xdc/0x170 [ 68.559086][ T2093] shmem_create+0x2f/0x40 [ 68.563412][ T2093] path_openat+0xd2c/0x1eb0 [ 68.567910][ T2093] do_filp_open+0x105/0x220 [ 68.572412][ T2093] do_sys_openat2+0xb5/0x2b0 [ 68.577124][ T2093] __x64_sys_openat+0xef/0x110 [ 68.581891][ T2093] do_syscall_64+0x44/0xd0 [ 68.586307][ T2093] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.592203][ T2093] [ 68.594514][ T2093] read to 0xffff888102ebb728 of 8 bytes by task 2093 on cpu 0: [ 68.602908][ T2093] vfs_getattr_nosec+0x242/0x2f0 [ 68.607835][ T2093] vfs_statx+0x138/0x2a0 [ 68.612061][ T2093] __se_sys_newfstatat+0x63/0x260 [ 68.617079][ T2093] __x64_sys_newfstatat+0x51/0x60 [ 68.622096][ T2093] do_syscall_64+0x44/0xd0 [ 68.626497][ T2093] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 68.632374][ T2093] [ 68.634682][ T2093] value changed: 0x0000000000001608 -> 0x000000000000161c [ 68.641764][ T2093] [ 68.644067][ T2093] Reported by Kernel Concurrency Sanitizer on: 14:59:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)="89000000120081ae08060c0f006b3f087f03e3f70000000000e2ffca1b1f0000000000000072f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00010001080800bdad446b9bbc7a46e3988285dcdf12f21308f868fece14955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 14:59:26 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) clock_adjtime(0x0, &(0x7f0000000040)={0xd54}) 14:59:26 executing program 3: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x40000006}) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:59:26 executing program 2: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x40000006}) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0) [ 68.650197][ T2093] CPU: 0 PID: 2093 Comm: udevd Not tainted 5.16.0-rc5-syzkaller #0 [ 68.658415][ T2093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.668451][ T2093] ================================================================== 14:59:26 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, 0x0) 14:59:26 executing program 3: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x40000006}) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:59:26 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) clock_adjtime(0x0, &(0x7f0000000040)={0xd54}) 14:59:26 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000002d80)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 14:59:26 executing program 3: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x40000006}) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:59:26 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, 0x0) 14:59:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)="89000000120081ae08060c0f006b3f087f03e3f70000000000e2ffca1b1f0000000000000072f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00010001080800bdad446b9bbc7a46e3988285dcdf12f21308f868fece14955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 14:59:26 executing program 2: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x40000006}) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:59:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x7fff0004}]}) membarrier(0x1, 0x0) 14:59:26 executing program 2: r0 = epoll_create1(0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x40000006}) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0) 14:59:26 executing program 3: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x40, &(0x7f0000000080)=""/64}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x3, 0x0}) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000e80)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x6c00, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1de, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, 0x0, &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0x0, 0x1, [{0x5, 0x20, 0x806, 'macsec0\x00', 'veth0_to_bond\x00', 'caif0\x00', 'macvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0xd6, 0x14e, [], [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}, @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffd}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xffff, 0x6, 0x8, 0x0, 0x0, "bb54dd5519cfa5c102fb59909966d746309c6084499c22f2d218cc17ec3d73ea8dc3e71bf403747ccbc6fbf21b65031c8e6ee7f05b94360a4e480b5e77f4706b"}}}}]}]}, 0x256) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)) r3 = syz_io_uring_setup(0x184, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x15f}, &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x5, 0x0, 0xffffffffffffffff, 0x0, r6}, 0x70ae) io_uring_enter(r3, 0x45f5, 0x0, 0x0, 0x0, 0x4) 14:59:26 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, 0x0) 14:59:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x7fff0004}]}) membarrier(0x1, 0x0) 14:59:26 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x10004, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/184, 0x18) 14:59:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x7fff0004}]}) membarrier(0x1, 0x0) [ 68.825715][ C1] sd 0:0:1:0: tag#5977 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 68.835594][ C1] sd 0:0:1:0: tag#5977 CDB: opcode=0xe5 (vendor) [ 68.841991][ C1] sd 0:0:1:0: tag#5977 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 68.851029][ C1] sd 0:0:1:0: tag#5977 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 68.860107][ C1] sd 0:0:1:0: tag#5977 CDB[20]: ba 14:59:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x7fff0004}]}) membarrier(0x1, 0x0) 14:59:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)="89000000120081ae08060c0f006b3f087f03e3f70000000000e2ffca1b1f0000000000000072f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00010001080800bdad446b9bbc7a46e3988285dcdf12f21308f868fece14955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 14:59:26 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, 0x0) 14:59:26 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x10004, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/184, 0x18) 14:59:26 executing program 5: r0 = syz_io_uring_setup(0x4bef, &(0x7f0000000080), &(0x7f0000ff5000/0x8000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000001c0)=[0xffffffffffffffff], 0xfe) [ 68.906128][ T3508] loop5: detected capacity change from 0 to 16 14:59:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 14:59:26 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) socket(0xa, 0x3, 0x6) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$int_in(r1, 0x5452, &(0x7f0000000700)=0x10001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendto$packet(r0, &(0x7f0000000400)="c9", 0x1, 0x0, &(0x7f0000000440)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) 14:59:27 executing program 5: r0 = syz_io_uring_setup(0x4bef, &(0x7f0000000080), &(0x7f0000ff5000/0x8000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000001c0)=[0xffffffffffffffff], 0xfe) 14:59:27 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x10004, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/184, 0x18) 14:59:27 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) socket(0xa, 0x3, 0x6) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$int_in(r1, 0x5452, &(0x7f0000000700)=0x10001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendto$packet(r0, &(0x7f0000000400)="c9", 0x1, 0x0, &(0x7f0000000440)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) 14:59:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 14:59:27 executing program 3: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x40, &(0x7f0000000080)=""/64}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x3, 0x0}) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000e80)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x6c00, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1de, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, 0x0, &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0x0, 0x1, [{0x5, 0x20, 0x806, 'macsec0\x00', 'veth0_to_bond\x00', 'caif0\x00', 'macvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0xd6, 0x14e, [], [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}, @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffd}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xffff, 0x6, 0x8, 0x0, 0x0, "bb54dd5519cfa5c102fb59909966d746309c6084499c22f2d218cc17ec3d73ea8dc3e71bf403747ccbc6fbf21b65031c8e6ee7f05b94360a4e480b5e77f4706b"}}}}]}]}, 0x256) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)) r3 = syz_io_uring_setup(0x184, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x15f}, &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x5, 0x0, 0xffffffffffffffff, 0x0, r6}, 0x70ae) io_uring_enter(r3, 0x45f5, 0x0, 0x0, 0x0, 0x4) 14:59:27 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x42}) 14:59:27 executing program 5: r0 = syz_io_uring_setup(0x4bef, &(0x7f0000000080), &(0x7f0000ff5000/0x8000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000001c0)=[0xffffffffffffffff], 0xfe) 14:59:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 14:59:27 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x10004, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/184, 0x18) [ 69.298863][ T3532] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 69.320293][ C1] sd 0:0:1:0: tag#5979 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 69.330161][ C1] sd 0:0:1:0: tag#5979 CDB: opcode=0xe5 (vendor) [ 69.336492][ C1] sd 0:0:1:0: tag#5979 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 14:59:27 executing program 5: r0 = syz_io_uring_setup(0x4bef, &(0x7f0000000080), &(0x7f0000ff5000/0x8000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000001c0)=[0xffffffffffffffff], 0xfe) 14:59:27 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) socket(0xa, 0x3, 0x6) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$int_in(r1, 0x5452, &(0x7f0000000700)=0x10001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendto$packet(r0, &(0x7f0000000400)="c9", 0x1, 0x0, &(0x7f0000000440)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) 14:59:27 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) socket(0xa, 0x3, 0x6) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$int_in(r1, 0x5452, &(0x7f0000000700)=0x10001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendto$packet(r0, &(0x7f0000000400)="c9", 0x1, 0x0, &(0x7f0000000440)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) [ 69.345549][ C1] sd 0:0:1:0: tag#5979 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 69.354603][ C1] sd 0:0:1:0: tag#5979 CDB[20]: ba 14:59:27 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x42}) 14:59:27 executing program 2: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x40, &(0x7f0000000080)=""/64}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x3, 0x0}) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000e80)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x6c00, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1de, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, 0x0, &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0x0, 0x1, [{0x5, 0x20, 0x806, 'macsec0\x00', 'veth0_to_bond\x00', 'caif0\x00', 'macvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0xd6, 0x14e, [], [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}, @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffd}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xffff, 0x6, 0x8, 0x0, 0x0, "bb54dd5519cfa5c102fb59909966d746309c6084499c22f2d218cc17ec3d73ea8dc3e71bf403747ccbc6fbf21b65031c8e6ee7f05b94360a4e480b5e77f4706b"}}}}]}]}, 0x256) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)) r3 = syz_io_uring_setup(0x184, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x15f}, &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x5, 0x0, 0xffffffffffffffff, 0x0, r6}, 0x70ae) io_uring_enter(r3, 0x45f5, 0x0, 0x0, 0x0, 0x4) 14:59:27 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$usbfs(r0, &(0x7f0000000340)=""/102400, 0x19000) 14:59:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) [ 69.443497][ T3550] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 69.470182][ C0] sd 0:0:1:0: tag#5981 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 69.480039][ C0] sd 0:0:1:0: tag#5981 CDB: opcode=0xe5 (vendor) [ 69.486366][ C0] sd 0:0:1:0: tag#5981 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 69.495425][ C0] sd 0:0:1:0: tag#5981 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 69.504474][ C0] sd 0:0:1:0: tag#5981 CDB[20]: ba 14:59:27 executing program 3: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x40, &(0x7f0000000080)=""/64}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x3, 0x0}) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000e80)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x6c00, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1de, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, 0x0, &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0x0, 0x1, [{0x5, 0x20, 0x806, 'macsec0\x00', 'veth0_to_bond\x00', 'caif0\x00', 'macvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0xd6, 0x14e, [], [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}, @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffd}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xffff, 0x6, 0x8, 0x0, 0x0, "bb54dd5519cfa5c102fb59909966d746309c6084499c22f2d218cc17ec3d73ea8dc3e71bf403747ccbc6fbf21b65031c8e6ee7f05b94360a4e480b5e77f4706b"}}}}]}]}, 0x256) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)) r3 = syz_io_uring_setup(0x184, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x15f}, &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x5, 0x0, 0xffffffffffffffff, 0x0, r6}, 0x70ae) io_uring_enter(r3, 0x45f5, 0x0, 0x0, 0x0, 0x4) 14:59:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000001c0)=@ipv6_newaddrlabel={0x38, 0x48, 0x523, 0x0, 0x0, {}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x38}}, 0x0) 14:59:27 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x42}) 14:59:27 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$usbfs(r0, &(0x7f0000000340)=""/102400, 0x19000) 14:59:27 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8a202, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) mount$9p_fd(0x0, &(0x7f00000000c0)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 14:59:27 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$usbfs(r0, &(0x7f0000000340)=""/102400, 0x19000) 14:59:27 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$usbfs(r0, &(0x7f0000000340)=""/102400, 0x19000) [ 69.571377][ C0] sd 0:0:1:0: tag#5982 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 69.581235][ C0] sd 0:0:1:0: tag#5982 CDB: opcode=0xe5 (vendor) [ 69.587677][ C0] sd 0:0:1:0: tag#5982 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 69.596741][ C0] sd 0:0:1:0: tag#5982 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 69.605789][ C0] sd 0:0:1:0: tag#5982 CDB[20]: ba 14:59:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000001c0)=@ipv6_newaddrlabel={0x38, 0x48, 0x523, 0x0, 0x0, {}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x38}}, 0x0) 14:59:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000001c0)=@ipv6_newaddrlabel={0x38, 0x48, 0x523, 0x0, 0x0, {}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x38}}, 0x0) [ 69.616973][ T3566] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO 14:59:27 executing program 2: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x40, &(0x7f0000000080)=""/64}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x3, 0x0}) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000e80)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x6c00, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1de, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, 0x0, &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0x0, 0x1, [{0x5, 0x20, 0x806, 'macsec0\x00', 'veth0_to_bond\x00', 'caif0\x00', 'macvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0xd6, 0x14e, [], [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}, @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffd}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xffff, 0x6, 0x8, 0x0, 0x0, "bb54dd5519cfa5c102fb59909966d746309c6084499c22f2d218cc17ec3d73ea8dc3e71bf403747ccbc6fbf21b65031c8e6ee7f05b94360a4e480b5e77f4706b"}}}}]}]}, 0x256) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)) r3 = syz_io_uring_setup(0x184, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x15f}, &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x5, 0x0, 0xffffffffffffffff, 0x0, r6}, 0x70ae) io_uring_enter(r3, 0x45f5, 0x0, 0x0, 0x0, 0x4) 14:59:27 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x42}) 14:59:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x7ff00, 0x0, 0x0, '\x00', [{0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xbc7effff}, {0xffffffff, 0x0, 0x7a5, 0x0, 0xfffffffffffffffd}]}) r1 = epoll_create1(0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) epoll_create1(0x80000) close(r2) 14:59:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000001c0)=@ipv6_newaddrlabel={0x38, 0x48, 0x523, 0x0, 0x0, {}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x38}}, 0x0) 14:59:27 executing program 3: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x40, &(0x7f0000000080)=""/64}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x3, 0x0}) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000e80)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x6c00, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1de, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, 0x0, &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0x0, 0x1, [{0x5, 0x20, 0x806, 'macsec0\x00', 'veth0_to_bond\x00', 'caif0\x00', 'macvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0xd6, 0x14e, [], [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}, @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffd}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xffff, 0x6, 0x8, 0x0, 0x0, "bb54dd5519cfa5c102fb59909966d746309c6084499c22f2d218cc17ec3d73ea8dc3e71bf403747ccbc6fbf21b65031c8e6ee7f05b94360a4e480b5e77f4706b"}}}}]}]}, 0x256) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)) r3 = syz_io_uring_setup(0x184, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x15f}, &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x5, 0x0, 0xffffffffffffffff, 0x0, r6}, 0x70ae) io_uring_enter(r3, 0x45f5, 0x0, 0x0, 0x0, 0x4) 14:59:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x3, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x6c}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:59:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x3, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x6c}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 69.743441][ C0] sd 0:0:1:0: tag#5984 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 69.744294][ T3587] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 69.753649][ C0] sd 0:0:1:0: tag#5984 CDB: opcode=0xe5 (vendor) [ 69.753667][ C0] sd 0:0:1:0: tag#5984 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 69.778550][ C0] sd 0:0:1:0: tag#5984 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 69.787612][ C0] sd 0:0:1:0: tag#5984 CDB[20]: ba [ 69.804826][ C0] sd 0:0:1:0: tag#5986 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 69.814675][ C0] sd 0:0:1:0: tag#5986 CDB: opcode=0xe5 (vendor) [ 69.821549][ C0] sd 0:0:1:0: tag#5986 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 69.830600][ C0] sd 0:0:1:0: tag#5986 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 69.839668][ C0] sd 0:0:1:0: tag#5986 CDB[20]: ba 14:59:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x7ff00, 0x0, 0x0, '\x00', [{0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xbc7effff}, {0xffffffff, 0x0, 0x7a5, 0x0, 0xfffffffffffffffd}]}) r1 = epoll_create1(0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) epoll_create1(0x80000) close(r2) 14:59:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x7ff00, 0x0, 0x0, '\x00', [{0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xbc7effff}, {0xffffffff, 0x0, 0x7a5, 0x0, 0xfffffffffffffffd}]}) r1 = epoll_create1(0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) epoll_create1(0x80000) close(r2) 14:59:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x3, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x6c}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:59:28 executing program 2: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x40, &(0x7f0000000080)=""/64}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x3, 0x0}) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000e80)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) io_uring_enter(0xffffffffffffffff, 0x2ff, 0x6c00, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x1de, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, 0x0, &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0x0, 0x1, [{0x5, 0x20, 0x806, 'macsec0\x00', 'veth0_to_bond\x00', 'caif0\x00', 'macvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0xd6, 0x14e, [], [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}, @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffd}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xffff, 0x6, 0x8, 0x0, 0x0, "bb54dd5519cfa5c102fb59909966d746309c6084499c22f2d218cc17ec3d73ea8dc3e71bf403747ccbc6fbf21b65031c8e6ee7f05b94360a4e480b5e77f4706b"}}}}]}]}, 0x256) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000600)) r3 = syz_io_uring_setup(0x184, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x15f}, &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @private}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x5, 0x0, 0xffffffffffffffff, 0x0, r6}, 0x70ae) io_uring_enter(r3, 0x45f5, 0x0, 0x0, 0x0, 0x4) 14:59:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 14:59:28 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8a202, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) mount$9p_fd(0x0, &(0x7f00000000c0)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 14:59:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 14:59:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x3, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x6c}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 70.461864][ C0] sd 0:0:1:0: tag#5987 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 70.471753][ C0] sd 0:0:1:0: tag#5987 CDB: opcode=0xe5 (vendor) [ 70.471775][ C0] sd 0:0:1:0: tag#5987 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 14:59:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 14:59:28 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, 0x0, &(0x7f0000000040)) 14:59:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x7ff00, 0x0, 0x0, '\x00', [{0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xbc7effff}, {0xffffffff, 0x0, 0x7a5, 0x0, 0xfffffffffffffffd}]}) r1 = epoll_create1(0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) epoll_create1(0x80000) close(r2) [ 70.471794][ C0] sd 0:0:1:0: tag#5987 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 70.471829][ C0] sd 0:0:1:0: tag#5987 CDB[20]: ba 14:59:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x7ff00, 0x0, 0x0, '\x00', [{0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xbc7effff}, {0xffffffff, 0x0, 0x7a5, 0x0, 0xfffffffffffffffd}]}) r1 = epoll_create1(0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) epoll_create1(0x80000) close(r2) 14:59:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) [ 70.562847][ T24] kauditd_printk_skb: 38 callbacks suppressed [ 70.562862][ T24] audit: type=1400 audit(1639753168.348:228): avc: denied { create } for pid=3618 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 14:59:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x7ff00, 0x0, 0x0, '\x00', [{0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xbc7effff}, {0xffffffff, 0x0, 0x7a5, 0x0, 0xfffffffffffffffd}]}) r1 = epoll_create1(0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) epoll_create1(0x80000) close(r2) 14:59:28 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, 0x0, &(0x7f0000000040)) [ 70.600139][ T24] audit: type=1400 audit(1639753168.378:229): avc: denied { getopt } for pid=3618 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 14:59:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="38000000000000002900000004"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0x7ffff000}], 0x1, &(0x7f0000001280), 0x0, 0x488}, 0x7805) 14:59:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)={0x54, r1, 0x1, 0x0, 0x0, {0x8}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 14:59:29 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8a202, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) mount$9p_fd(0x0, &(0x7f00000000c0)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 14:59:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x7ff00, 0x0, 0x0, '\x00', [{0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xbc7effff}, {0xffffffff, 0x0, 0x7a5, 0x0, 0xfffffffffffffffd}]}) r1 = epoll_create1(0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) epoll_create1(0x80000) close(r2) 14:59:29 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, 0x0, &(0x7f0000000040)) 14:59:29 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0x5, 0x8) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) clone3(&(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:59:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)={0x54, r1, 0x1, 0x0, 0x0, {0x8}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 14:59:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="38000000000000002900000004"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0x7ffff000}], 0x1, &(0x7f0000001280), 0x0, 0x488}, 0x7805) 14:59:29 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, 0x0, &(0x7f0000000040)) 14:59:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)={0x54, r1, 0x1, 0x0, 0x0, {0x8}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 14:59:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="38000000000000002900000004"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0x7ffff000}], 0x1, &(0x7f0000001280), 0x0, 0x488}, 0x7805) 14:59:29 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0x5, 0x8) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) clone3(&(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:59:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="38000000000000002900000004"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0x7ffff000}], 0x1, &(0x7f0000001280), 0x0, 0x488}, 0x7805) 14:59:29 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x5, 0x8) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) clone3(&(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:59:30 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8a202, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) mount$9p_fd(0x0, &(0x7f00000000c0)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 14:59:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)={0x54, r1, 0x1, 0x0, 0x0, {0x8}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc}}]}, 0x54}}, 0x0) 14:59:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="38000000000000002900000004"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0x7ffff000}], 0x1, &(0x7f0000001280), 0x0, 0x488}, 0x7805) 14:59:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="38000000000000002900000004"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0x7ffff000}], 0x1, &(0x7f0000001280), 0x0, 0x488}, 0x7805) 14:59:30 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0x5, 0x8) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) clone3(&(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:59:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x5, 0x8) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) clone3(&(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:59:30 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f00000001c0)) 14:59:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="38000000000000002900000004"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0x7ffff000}], 0x1, &(0x7f0000001280), 0x0, 0x488}, 0x7805) 14:59:30 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0x5, 0x8) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) clone3(&(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:59:30 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x5, 0x8) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) clone3(&(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:59:30 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f00000001c0)) 14:59:30 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f00000001c0)) 14:59:30 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f00000001c0)) 14:59:30 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/videobuf_core', 0x82200, 0x7b2a3269877e000) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x4}, 0x8) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x7, 0x1, 0x3, 0x400, 0xfffffffc}, 0xc) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000000c0)=0x3f, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000540)={0x8, 0x0, 0x0, 0x1, 0x8001}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000200)={{0xa, 0x4e23, 0x4, @ipv4={'\x00', '\xff\xff', @empty}, 0x200000}, {0xa, 0x4e20, 0x0, @local}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x5c) 14:59:30 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f00000001c0)) 14:59:30 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x81, 0x0, 0x0, 0x0, 0x0, "1697d6ab71cc0aae776c1b8593b37def7a1357"}) 14:59:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x18, r1, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 14:59:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x3) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x13, 0x0, 0x0, 0x0, 0x0, "a5dc70c9620ea800"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x4000011, 0x0, 0x0, 0x0, 0x0, "a5fc4bd7cf1e606023eb000000000400"}) 14:59:31 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f00000001c0)) 14:59:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x18, r1, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 14:59:31 executing program 0: sync() r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14}, 0x14}}, 0x0) 14:59:31 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f00000001c0)) 14:59:31 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/videobuf_core', 0x82200, 0x7b2a3269877e000) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x4}, 0x8) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x7, 0x1, 0x3, 0x400, 0xfffffffc}, 0xc) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000000c0)=0x3f, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000540)={0x8, 0x0, 0x0, 0x1, 0x8001}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000200)={{0xa, 0x4e23, 0x4, @ipv4={'\x00', '\xff\xff', @empty}, 0x200000}, {0xa, 0x4e20, 0x0, @local}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x5c) 14:59:31 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/videobuf_core', 0x82200, 0x7b2a3269877e000) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x4}, 0x8) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x7, 0x1, 0x3, 0x400, 0xfffffffc}, 0xc) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000000c0)=0x3f, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000540)={0x8, 0x0, 0x0, 0x1, 0x8001}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000200)={{0xa, 0x4e23, 0x4, @ipv4={'\x00', '\xff\xff', @empty}, 0x200000}, {0xa, 0x4e20, 0x0, @local}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x5c) 14:59:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x3) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x13, 0x0, 0x0, 0x0, 0x0, "a5dc70c9620ea800"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x4000011, 0x0, 0x0, 0x0, 0x0, "a5fc4bd7cf1e606023eb000000000400"}) 14:59:31 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/videobuf_core', 0x82200, 0x7b2a3269877e000) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x4}, 0x8) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x7, 0x1, 0x3, 0x400, 0xfffffffc}, 0xc) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000000c0)=0x3f, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000540)={0x8, 0x0, 0x0, 0x1, 0x8001}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000200)={{0xa, 0x4e23, 0x4, @ipv4={'\x00', '\xff\xff', @empty}, 0x200000}, {0xa, 0x4e20, 0x0, @local}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x5c) 14:59:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x18, r1, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 14:59:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x3) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x13, 0x0, 0x0, 0x0, 0x0, "a5dc70c9620ea800"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x4000011, 0x0, 0x0, 0x0, 0x0, "a5fc4bd7cf1e606023eb000000000400"}) 14:59:31 executing program 0: sync() r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14}, 0x14}}, 0x0) 14:59:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x3) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x13, 0x0, 0x0, 0x0, 0x0, "a5dc70c9620ea800"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x4000011, 0x0, 0x0, 0x0, 0x0, "a5fc4bd7cf1e606023eb000000000400"}) 14:59:31 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/videobuf_core', 0x82200, 0x7b2a3269877e000) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x4}, 0x8) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x7, 0x1, 0x3, 0x400, 0xfffffffc}, 0xc) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000000c0)=0x3f, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000540)={0x8, 0x0, 0x0, 0x1, 0x8001}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000200)={{0xa, 0x4e23, 0x4, @ipv4={'\x00', '\xff\xff', @empty}, 0x200000}, {0xa, 0x4e20, 0x0, @local}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x5c) 14:59:31 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/videobuf_core', 0x82200, 0x7b2a3269877e000) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x4}, 0x8) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x7, 0x1, 0x3, 0x400, 0xfffffffc}, 0xc) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000000c0)=0x3f, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000540)={0x8, 0x0, 0x0, 0x1, 0x8001}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000200)={{0xa, 0x4e23, 0x4, @ipv4={'\x00', '\xff\xff', @empty}, 0x200000}, {0xa, 0x4e20, 0x0, @local}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x5c) 14:59:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x18, r1, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 14:59:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x3) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x13, 0x0, 0x0, 0x0, 0x0, "a5dc70c9620ea800"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x4000011, 0x0, 0x0, 0x0, 0x0, "a5fc4bd7cf1e606023eb000000000400"}) 14:59:31 executing program 0: sync() r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14}, 0x14}}, 0x0) 14:59:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x3) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x13, 0x0, 0x0, 0x0, 0x0, "a5dc70c9620ea800"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x4000011, 0x0, 0x0, 0x0, 0x0, "a5fc4bd7cf1e606023eb000000000400"}) 14:59:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f00000004c0), 0x200000077, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000140)=0x7ff) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:59:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 14:59:31 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/videobuf_core', 0x82200, 0x7b2a3269877e000) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x4}, 0x8) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) socket$inet6(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x7, 0x1, 0x3, 0x400, 0xfffffffc}, 0xc) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000000c0)=0x3f, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000540)={0x8, 0x0, 0x0, 0x1, 0x8001}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000200)={{0xa, 0x4e23, 0x4, @ipv4={'\x00', '\xff\xff', @empty}, 0x200000}, {0xa, 0x4e20, 0x0, @local}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x5c) 14:59:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x3) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x13, 0x0, 0x0, 0x0, 0x0, "a5dc70c9620ea800"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x4000011, 0x0, 0x0, 0x0, 0x0, "a5fc4bd7cf1e606023eb000000000400"}) 14:59:31 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f0000002280)={0x0, 0x0, 0x0}, 0x20044884) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000000140)='c', 0xffffff1f}], 0x1}, 0x0) 14:59:31 executing program 0: sync() r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14}, 0x14}}, 0x0) 14:59:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000380)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in=@dev, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 14:59:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 14:59:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f00000004c0), 0x200000077, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000140)=0x7ff) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 73.399882][ T24] audit: type=1400 audit(1639753171.188:230): avc: denied { create } for pid=3743 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 73.404039][ T3745] device bond1 entered promiscuous mode [ 73.425629][ T3745] 8021q: adding VLAN 0 to HW filter on device bond1 14:59:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000380)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in=@dev, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 14:59:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x80000000004) write(r0, &(0x7f000058bfe4)="29000000140003b7ff000000040860eb0100100006a40e07fff00fd57f25ffffff0100002a00f3ff09", 0x29) [ 73.477834][ T24] audit: type=1400 audit(1639753171.208:231): avc: denied { write } for pid=3743 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 73.497447][ T24] audit: type=1400 audit(1639753171.238:232): avc: denied { write } for pid=3752 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 14:59:31 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_TEE, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000400)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3f79, 0x0, 0x0, 0x0, 0x0) 14:59:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x80000000004) write(r0, &(0x7f000058bfe4)="29000000140003b7ff000000040860eb0100100006a40e07fff00fd57f25ffffff0100002a00f3ff09", 0x29) 14:59:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000380)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in=@dev, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) [ 73.517826][ T24] audit: type=1400 audit(1639753171.238:233): avc: denied { nlmsg_write } for pid=3752 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 73.530930][ T3756] device bond2 entered promiscuous mode 14:59:31 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f0000002280)={0x0, 0x0, 0x0}, 0x20044884) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000000140)='c', 0xffffff1f}], 0x1}, 0x0) 14:59:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f00000004c0), 0x200000077, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000140)=0x7ff) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:59:31 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_TEE, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000400)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3f79, 0x0, 0x0, 0x0, 0x0) 14:59:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000380)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in=@dev, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) [ 73.573735][ T3756] 8021q: adding VLAN 0 to HW filter on device bond2 14:59:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f00000004c0), 0x200000077, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000140)=0x7ff) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:59:31 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$PIO_UNIMAP(r0, 0x4b46, &(0x7f00000001c0)={0x0, 0x0}) 14:59:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x80000000004) write(r0, &(0x7f000058bfe4)="29000000140003b7ff000000040860eb0100100006a40e07fff00fd57f25ffffff0100002a00f3ff09", 0x29) 14:59:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 14:59:31 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_TEE, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000400)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3f79, 0x0, 0x0, 0x0, 0x0) 14:59:31 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f0000002280)={0x0, 0x0, 0x0}, 0x20044884) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000000140)='c', 0xffffff1f}], 0x1}, 0x0) 14:59:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newtaction={0x60, 0x30, 0x1, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc}, {0x30, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x7, {0x4}}, {0xc}}}]}]}, 0x60}}, 0x0) 14:59:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x80000000004) write(r0, &(0x7f000058bfe4)="29000000140003b7ff000000040860eb0100100006a40e07fff00fd57f25ffffff0100002a00f3ff09", 0x29) 14:59:31 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_TEE, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000400)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3f79, 0x0, 0x0, 0x0, 0x0) 14:59:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newtaction={0x60, 0x30, 0x1, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc}, {0x30, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x7, {0x4}}, {0xc}}}]}]}, 0x60}}, 0x0) 14:59:31 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$PIO_UNIMAP(r0, 0x4b46, &(0x7f00000001c0)={0x0, 0x0}) 14:59:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$PIO_UNIMAP(r0, 0x4b46, &(0x7f00000001c0)={0x0, 0x0}) [ 73.685255][ T3786] __nla_validate_parse: 31 callbacks suppressed [ 73.685270][ T3786] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 73.700836][ T3786] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 73.710064][ T3786] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 14:59:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newtaction={0x60, 0x30, 0x1, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc}, {0x30, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x7, {0x4}}, {0xc}}}]}]}, 0x60}}, 0x0) 14:59:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_PRIORITY={0x6, 0x4}]}}}]}, 0x44}}, 0x0) 14:59:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_PRIORITY={0x6, 0x4}]}}}]}, 0x44}}, 0x0) [ 73.764160][ T3793] device bond3 entered promiscuous mode [ 73.772919][ T3793] 8021q: adding VLAN 0 to HW filter on device bond3 [ 73.781283][ T3797] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 14:59:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 14:59:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_PRIORITY={0x6, 0x4}]}}}]}, 0x44}}, 0x0) 14:59:31 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f0000002280)={0x0, 0x0, 0x0}, 0x20044884) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000000140)='c', 0xffffff1f}], 0x1}, 0x0) 14:59:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newtaction={0x60, 0x30, 0x1, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc}, {0x30, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x7, {0x4}}, {0xc}}}]}]}, 0x60}}, 0x0) [ 73.781303][ T3797] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 73.781316][ T3797] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 73.799396][ T3805] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 73.814688][ T3808] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 14:59:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_PRIORITY={0x6, 0x4}]}}}]}, 0x44}}, 0x0) 14:59:31 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$PIO_UNIMAP(r0, 0x4b46, &(0x7f00000001c0)={0x0, 0x0}) [ 73.820548][ T3806] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 73.820565][ T3806] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 73.820576][ T3806] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 73.845065][ T3810] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 73.871144][ T3813] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 14:59:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$PIO_UNIMAP(r0, 0x4b46, &(0x7f00000001c0)={0x0, 0x0}) 14:59:31 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$PIO_UNIMAP(r0, 0x4b46, &(0x7f00000001c0)={0x0, 0x0}) [ 73.917350][ T3818] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 14:59:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000004c0)=@newqdisc={0xb0, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x80, 0x2, {{}, [@TCA_NETEM_SLOT={0x2c, 0xc, {0x100000001, 0x7, 0x200, 0xfffffffd, 0x4, 0x5}}, @TCA_NETEM_RATE64={0xc, 0x8, 0x4605d11d6ad932f5}, @TCA_NETEM_SLOT={0x2c, 0xc, {0xfbff, 0x2700000000000000, 0x0, 0x3042, 0x6, 0x10001}}]}}}]}, 0xb0}}, 0x0) 14:59:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x1fffd}, 0x1c) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xb) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x8, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) socket(0x10, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x8001, 0xa000) ioctl(r1, 0x0, &(0x7f0000000280)="6a2c10d32137bfde867e0c45b3c9db7a02ad65d7d100d792f1639ecae8a34fdf78e6019768df72cf481737ea7a36493afc1e52603bec121dd813951f6a053e8c71969fb9e2fff96e8254b97641d1a4bc09213bbf7a28a9cca1f3802dfdf1b74c59a61b7be9075ca14e7f816252ef736e87b641c657596c2ef4bea72d86d8a68f810d0f3b9436b301787381185f03e44e295be610255efee540e5cafd10d444dd098a8e1191c45b382f31872691dcdb12f9920d42164d4098379ed0f566b1024bad06e3a07854d2f3c72cea87931479f53efa") bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x7f00}, 0x1c) 14:59:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$PIO_UNIMAP(r0, 0x4b46, &(0x7f00000001c0)={0x0, 0x0}) [ 73.952776][ T3816] device bond4 entered promiscuous mode [ 73.958618][ T3816] 8021q: adding VLAN 0 to HW filter on device bond4 14:59:31 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000004e001f000307f4f9002304000a03f55f08000100020100020800038005000000", 0x24) 14:59:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000004c0)=@newqdisc={0xb0, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x80, 0x2, {{}, [@TCA_NETEM_SLOT={0x2c, 0xc, {0x100000001, 0x7, 0x200, 0xfffffffd, 0x4, 0x5}}, @TCA_NETEM_RATE64={0xc, 0x8, 0x4605d11d6ad932f5}, @TCA_NETEM_SLOT={0x2c, 0xc, {0xfbff, 0x2700000000000000, 0x0, 0x3042, 0x6, 0x10001}}]}}}]}, 0xb0}}, 0x0) 14:59:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x1d, 0x0, 0x1}, {0x20}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:59:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x10b000, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) dup3(r1, r0, 0x0) [ 74.005816][ T24] audit: type=1400 audit(1639753171.788:234): avc: denied { name_bind } for pid=3830 comm="syz-executor.2" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 74.027506][ T24] audit: type=1400 audit(1639753171.788:235): avc: denied { read } for pid=3830 comm="syz-executor.2" name="usbmon9" dev="devtmpfs" ino=144 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 14:59:31 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000004e001f000307f4f9002304000a03f55f08000100020100020800038005000000", 0x24) 14:59:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x1d, 0x0, 0x1}, {0x20}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:59:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000004c0)=@newqdisc={0xb0, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x80, 0x2, {{}, [@TCA_NETEM_SLOT={0x2c, 0xc, {0x100000001, 0x7, 0x200, 0xfffffffd, 0x4, 0x5}}, @TCA_NETEM_RATE64={0xc, 0x8, 0x4605d11d6ad932f5}, @TCA_NETEM_SLOT={0x2c, 0xc, {0xfbff, 0x2700000000000000, 0x0, 0x3042, 0x6, 0x10001}}]}}}]}, 0xb0}}, 0x0) 14:59:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x1fffd}, 0x1c) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xb) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x8, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) socket(0x10, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x8001, 0xa000) ioctl(r1, 0x0, &(0x7f0000000280)="6a2c10d32137bfde867e0c45b3c9db7a02ad65d7d100d792f1639ecae8a34fdf78e6019768df72cf481737ea7a36493afc1e52603bec121dd813951f6a053e8c71969fb9e2fff96e8254b97641d1a4bc09213bbf7a28a9cca1f3802dfdf1b74c59a61b7be9075ca14e7f816252ef736e87b641c657596c2ef4bea72d86d8a68f810d0f3b9436b301787381185f03e44e295be610255efee540e5cafd10d444dd098a8e1191c45b382f31872691dcdb12f9920d42164d4098379ed0f566b1024bad06e3a07854d2f3c72cea87931479f53efa") bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x7f00}, 0x1c) [ 74.027531][ T24] audit: type=1400 audit(1639753171.788:236): avc: denied { open } for pid=3830 comm="syz-executor.2" path="/dev/usbmon9" dev="devtmpfs" ino=144 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 74.027552][ T24] audit: type=1400 audit(1639753171.788:237): avc: denied { ioctl } for pid=3830 comm="syz-executor.2" path="/dev/usbmon9" dev="devtmpfs" ino=144 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 74.092157][ T3841] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 14:59:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x1fffd}, 0x1c) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xb) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x8, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) socket(0x10, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x8001, 0xa000) ioctl(r1, 0x0, &(0x7f0000000280)="6a2c10d32137bfde867e0c45b3c9db7a02ad65d7d100d792f1639ecae8a34fdf78e6019768df72cf481737ea7a36493afc1e52603bec121dd813951f6a053e8c71969fb9e2fff96e8254b97641d1a4bc09213bbf7a28a9cca1f3802dfdf1b74c59a61b7be9075ca14e7f816252ef736e87b641c657596c2ef4bea72d86d8a68f810d0f3b9436b301787381185f03e44e295be610255efee540e5cafd10d444dd098a8e1191c45b382f31872691dcdb12f9920d42164d4098379ed0f566b1024bad06e3a07854d2f3c72cea87931479f53efa") bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x7f00}, 0x1c) 14:59:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x1d, 0x0, 0x1}, {0x20}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:59:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000004c0)=@newqdisc={0xb0, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x80, 0x2, {{}, [@TCA_NETEM_SLOT={0x2c, 0xc, {0x100000001, 0x7, 0x200, 0xfffffffd, 0x4, 0x5}}, @TCA_NETEM_RATE64={0xc, 0x8, 0x4605d11d6ad932f5}, @TCA_NETEM_SLOT={0x2c, 0xc, {0xfbff, 0x2700000000000000, 0x0, 0x3042, 0x6, 0x10001}}]}}}]}, 0xb0}}, 0x0) 14:59:32 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000004e001f000307f4f9002304000a03f55f08000100020100020800038005000000", 0x24) 14:59:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x1fffd}, 0x1c) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xb) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x8, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) socket(0x10, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x8001, 0xa000) ioctl(r1, 0x0, &(0x7f0000000280)="6a2c10d32137bfde867e0c45b3c9db7a02ad65d7d100d792f1639ecae8a34fdf78e6019768df72cf481737ea7a36493afc1e52603bec121dd813951f6a053e8c71969fb9e2fff96e8254b97641d1a4bc09213bbf7a28a9cca1f3802dfdf1b74c59a61b7be9075ca14e7f816252ef736e87b641c657596c2ef4bea72d86d8a68f810d0f3b9436b301787381185f03e44e295be610255efee540e5cafd10d444dd098a8e1191c45b382f31872691dcdb12f9920d42164d4098379ed0f566b1024bad06e3a07854d2f3c72cea87931479f53efa") bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x7f00}, 0x1c) 14:59:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x80}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000000080), 0x8) [ 74.138827][ T3849] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 14:59:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x1d, 0x0, 0x1}, {0x20}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:59:32 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x10, 0x2, [@TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x80000001}]}}]}, 0x40}}, 0x0) 14:59:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x80}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000000080), 0x8) 14:59:32 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000004e001f000307f4f9002304000a03f55f08000100020100020800038005000000", 0x24) [ 74.246640][ T3856] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 14:59:32 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f663020206af540314000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 14:59:32 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x10, 0x2, [@TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x80000001}]}}]}, 0x40}}, 0x0) [ 74.319878][ T3870] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 74.343859][ T3874] loop1: detected capacity change from 0 to 1 14:59:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x1fffd}, 0x1c) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xb) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x8, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) socket(0x10, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x8001, 0xa000) ioctl(r1, 0x0, &(0x7f0000000280)="6a2c10d32137bfde867e0c45b3c9db7a02ad65d7d100d792f1639ecae8a34fdf78e6019768df72cf481737ea7a36493afc1e52603bec121dd813951f6a053e8c71969fb9e2fff96e8254b97641d1a4bc09213bbf7a28a9cca1f3802dfdf1b74c59a61b7be9075ca14e7f816252ef736e87b641c657596c2ef4bea72d86d8a68f810d0f3b9436b301787381185f03e44e295be610255efee540e5cafd10d444dd098a8e1191c45b382f31872691dcdb12f9920d42164d4098379ed0f566b1024bad06e3a07854d2f3c72cea87931479f53efa") bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x7f00}, 0x1c) 14:59:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x80}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000000080), 0x8) 14:59:32 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x10, 0x2, [@TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x80000001}]}}]}, 0x40}}, 0x0) 14:59:32 executing program 5: r0 = socket(0x1d, 0x2, 0x6) setsockopt$CAN_RAW_FILTER(r0, 0x6a, 0x4, 0x0, 0x4) 14:59:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x1fffd}, 0x1c) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xb) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x8, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) socket(0x10, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x8001, 0xa000) ioctl(r1, 0x0, &(0x7f0000000280)="6a2c10d32137bfde867e0c45b3c9db7a02ad65d7d100d792f1639ecae8a34fdf78e6019768df72cf481737ea7a36493afc1e52603bec121dd813951f6a053e8c71969fb9e2fff96e8254b97641d1a4bc09213bbf7a28a9cca1f3802dfdf1b74c59a61b7be9075ca14e7f816252ef736e87b641c657596c2ef4bea72d86d8a68f810d0f3b9436b301787381185f03e44e295be610255efee540e5cafd10d444dd098a8e1191c45b382f31872691dcdb12f9920d42164d4098379ed0f566b1024bad06e3a07854d2f3c72cea87931479f53efa") bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x7f00}, 0x1c) [ 74.407601][ T3874] loop1: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 74.407967][ T3874] loop1: p1 start 335762607 is beyond EOD, truncated [ 74.502136][ T3874] loop1: p2 size 2 extends beyond EOD, truncated 14:59:32 executing program 5: r0 = socket(0x1d, 0x2, 0x6) setsockopt$CAN_RAW_FILTER(r0, 0x6a, 0x4, 0x0, 0x4) 14:59:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x80}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000000080), 0x8) 14:59:32 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff,