syzkaller syzkaller login: [ 13.187263][ T25] kauditd_printk_skb: 63 callbacks suppressed [ 13.187270][ T25] audit: type=1400 audit(1686736856.787:76): avc: denied { transition } for pid=2918 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.191106][ T25] audit: type=1400 audit(1686736856.787:77): avc: denied { noatsecure } for pid=2918 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.195224][ T25] audit: type=1400 audit(1686736856.787:78): avc: denied { write } for pid=2918 comm="sh" path="pipe:[15396]" dev="pipefs" ino=15396 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 13.198252][ T25] audit: type=1400 audit(1686736856.787:79): avc: denied { rlimitinh } for pid=2918 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.200749][ T25] audit: type=1400 audit(1686736856.787:80): avc: denied { siginh } for pid=2918 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.203' (ECDSA) to the list of known hosts. 2023/06/14 10:01:03 fuzzer started 2023/06/14 10:01:03 dialing manager at 10.128.0.163:30015 [ 20.163181][ T25] audit: type=1400 audit(1686736863.757:81): avc: denied { mounton } for pid=3039 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.164031][ T3039] cgroup: Unknown subsys name 'net' [ 20.185885][ T25] audit: type=1400 audit(1686736863.757:82): avc: denied { mount } for pid=3039 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.213217][ T25] audit: type=1400 audit(1686736863.797:83): avc: denied { unmount } for pid=3039 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.386397][ T3039] cgroup: Unknown subsys name 'rlimit' 2023/06/14 10:01:04 syscalls: 2854 2023/06/14 10:01:04 code coverage: enabled 2023/06/14 10:01:04 comparison tracing: enabled 2023/06/14 10:01:04 extra coverage: enabled 2023/06/14 10:01:04 delay kcov mmap: enabled 2023/06/14 10:01:04 setuid sandbox: enabled 2023/06/14 10:01:04 namespace sandbox: enabled 2023/06/14 10:01:04 Android sandbox: enabled 2023/06/14 10:01:04 fault injection: enabled 2023/06/14 10:01:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/06/14 10:01:04 net packet injection: enabled 2023/06/14 10:01:04 net device setup: enabled 2023/06/14 10:01:04 concurrency sanitizer: enabled 2023/06/14 10:01:04 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/06/14 10:01:04 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/06/14 10:01:04 USB emulation: /dev/raw-gadget does not exist 2023/06/14 10:01:04 hci packet injection: /dev/vhci does not exist 2023/06/14 10:01:04 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2023/06/14 10:01:04 802.15.4 emulation: enabled [ 20.485910][ T25] audit: type=1400 audit(1686736864.087:84): avc: denied { mounton } for pid=3039 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.510841][ T25] audit: type=1400 audit(1686736864.117:85): avc: denied { mount } for pid=3039 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2023/06/14 10:01:04 suppressing KCSAN reports in functions: 'ext4_mb_regular_allocator' '__xa_clear_mark' 'ext4_fill_raw_inode' 2023/06/14 10:01:04 fetching corpus: 0, signal 0/2000 (executing program) [ 20.534538][ T25] audit: type=1400 audit(1686736864.117:86): avc: denied { create } for pid=3039 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.555035][ T25] audit: type=1400 audit(1686736864.117:87): avc: denied { write } for pid=3039 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2023/06/14 10:01:04 fetching corpus: 50, signal 24833/27527 (executing program) [ 20.575502][ T25] audit: type=1400 audit(1686736864.117:88): avc: denied { read } for pid=3039 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.595811][ T25] audit: type=1400 audit(1686736864.147:89): avc: denied { read } for pid=2727 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/06/14 10:01:04 fetching corpus: 100, signal 32810/36190 (executing program) 2023/06/14 10:01:04 fetching corpus: 150, signal 38302/42205 (executing program) 2023/06/14 10:01:04 fetching corpus: 198, signal 42643/46903 (executing program) 2023/06/14 10:01:04 fetching corpus: 248, signal 47553/51896 (executing program) 2023/06/14 10:01:04 fetching corpus: 298, signal 52240/56405 (executing program) 2023/06/14 10:01:04 fetching corpus: 348, signal 56195/60090 (executing program) 2023/06/14 10:01:04 fetching corpus: 398, signal 58720/62482 (executing program) 2023/06/14 10:01:04 fetching corpus: 448, signal 60903/64505 (executing program) 2023/06/14 10:01:04 fetching corpus: 498, signal 63388/66599 (executing program) 2023/06/14 10:01:05 fetching corpus: 548, signal 67957/70017 (executing program) 2023/06/14 10:01:05 fetching corpus: 597, signal 70688/71987 (executing program) 2023/06/14 10:01:05 fetching corpus: 602, signal 70882/72226 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/72366 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/72470 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/72580 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/72681 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/72784 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/72870 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/72973 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/73091 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/73177 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/73290 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/73382 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/73491 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/73583 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/73672 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/73769 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/73838 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/73942 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/74045 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/74153 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/74256 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/74367 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/74454 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/74548 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/74579 (executing program) 2023/06/14 10:01:05 fetching corpus: 603, signal 70925/74579 (executing program) 2023/06/14 10:01:06 starting 6 fuzzer processes 10:01:06 executing program 0: r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xc8, 0x0, 0xc000000) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, 0x0, 0x0) 10:01:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x401070c9, 0x0) 10:01:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x80, &(0x7f00000002c0)="1a00000002000000", 0x8) [ 23.129628][ T3034] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=3034 'syz-fuzzer' 10:01:06 executing program 2: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 10:01:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0x3a}]}, 0x3c}}, 0x0) 10:01:06 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0xffffffffffffffff, 0x4) [ 23.178962][ T25] audit: type=1400 audit(1686736866.777:90): avc: denied { execmem } for pid=3046 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.573291][ T3054] chnl_net:caif_netlink_parms(): no params data found [ 23.653125][ T3065] chnl_net:caif_netlink_parms(): no params data found [ 23.714301][ T3054] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.721380][ T3054] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.728637][ T3054] bridge_slave_0: entered allmulticast mode [ 23.734821][ T3054] bridge_slave_0: entered promiscuous mode [ 23.743029][ T3054] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.750083][ T3054] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.757334][ T3054] bridge_slave_1: entered allmulticast mode [ 23.763516][ T3054] bridge_slave_1: entered promiscuous mode [ 23.823045][ T3065] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.830154][ T3065] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.837452][ T3065] bridge_slave_0: entered allmulticast mode [ 23.843743][ T3065] bridge_slave_0: entered promiscuous mode [ 23.851502][ T3061] chnl_net:caif_netlink_parms(): no params data found [ 23.861736][ T3064] chnl_net:caif_netlink_parms(): no params data found [ 23.874701][ T3054] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.884782][ T3054] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.897811][ T3065] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.904843][ T3065] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.912120][ T3065] bridge_slave_1: entered allmulticast mode [ 23.918690][ T3065] bridge_slave_1: entered promiscuous mode [ 23.952835][ T3067] chnl_net:caif_netlink_parms(): no params data found [ 23.967359][ T3054] team0: Port device team_slave_0 added [ 23.980232][ T3065] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.992296][ T3065] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.007601][ T3054] team0: Port device team_slave_1 added [ 24.014885][ T3070] chnl_net:caif_netlink_parms(): no params data found [ 24.040626][ T3061] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.047761][ T3061] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.054904][ T3061] bridge_slave_0: entered allmulticast mode [ 24.061891][ T3061] bridge_slave_0: entered promiscuous mode [ 24.088454][ T3065] team0: Port device team_slave_0 added [ 24.094217][ T3061] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.101253][ T3061] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.108429][ T3061] bridge_slave_1: entered allmulticast mode [ 24.114702][ T3061] bridge_slave_1: entered promiscuous mode [ 24.123410][ T3054] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.130378][ T3054] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.156413][ T3054] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.169400][ T3064] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.176486][ T3064] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.183561][ T3064] bridge_slave_0: entered allmulticast mode [ 24.190098][ T3064] bridge_slave_0: entered promiscuous mode [ 24.196956][ T3065] team0: Port device team_slave_1 added [ 24.214125][ T3054] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.221086][ T3054] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.247038][ T3054] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.263825][ T3064] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.270954][ T3064] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.278207][ T3064] bridge_slave_1: entered allmulticast mode [ 24.284442][ T3064] bridge_slave_1: entered promiscuous mode [ 24.302011][ T3061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.321225][ T3065] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.328221][ T3065] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.354178][ T3065] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.370776][ T3061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.379985][ T3067] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.387074][ T3067] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.394162][ T3067] bridge_slave_0: entered allmulticast mode [ 24.400458][ T3067] bridge_slave_0: entered promiscuous mode [ 24.411627][ T3064] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.421150][ T3065] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.428187][ T3065] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.454119][ T3065] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.481503][ T3067] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.488648][ T3067] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.495879][ T3067] bridge_slave_1: entered allmulticast mode [ 24.502257][ T3067] bridge_slave_1: entered promiscuous mode [ 24.513246][ T3064] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.536470][ T3061] team0: Port device team_slave_0 added [ 24.551710][ T3067] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.565430][ T3064] team0: Port device team_slave_0 added [ 24.572629][ T3054] hsr_slave_0: entered promiscuous mode [ 24.578710][ T3054] hsr_slave_1: entered promiscuous mode [ 24.584575][ T3070] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.591689][ T3070] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.599035][ T3070] bridge_slave_0: entered allmulticast mode [ 24.605387][ T3070] bridge_slave_0: entered promiscuous mode [ 24.612308][ T3061] team0: Port device team_slave_1 added [ 24.622754][ T3067] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.632452][ T3064] team0: Port device team_slave_1 added [ 24.638515][ T3070] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.645580][ T3070] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.652691][ T3070] bridge_slave_1: entered allmulticast mode [ 24.659313][ T3070] bridge_slave_1: entered promiscuous mode [ 24.700282][ T3065] hsr_slave_0: entered promiscuous mode [ 24.706265][ T3065] hsr_slave_1: entered promiscuous mode [ 24.712053][ T3065] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 24.719645][ T3065] Cannot create hsr debugfs directory [ 24.729907][ T3064] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.736891][ T3064] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.762953][ T3064] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.777999][ T3061] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.784933][ T3061] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.810906][ T3061] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.821804][ T3061] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.828771][ T3061] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.854652][ T3061] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.865900][ T3067] team0: Port device team_slave_0 added [ 24.875534][ T3064] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.882484][ T3064] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.908426][ T3064] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.920030][ T3070] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.933363][ T3067] team0: Port device team_slave_1 added [ 24.945953][ T3070] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.978976][ T3070] team0: Port device team_slave_0 added [ 24.999025][ T3070] team0: Port device team_slave_1 added [ 25.011903][ T3067] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.018878][ T3067] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.044761][ T3067] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.057370][ T3064] hsr_slave_0: entered promiscuous mode [ 25.063299][ T3064] hsr_slave_1: entered promiscuous mode [ 25.069213][ T3064] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.076772][ T3064] Cannot create hsr debugfs directory [ 25.098598][ T3067] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.105566][ T3067] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.131448][ T3067] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.143629][ T3061] hsr_slave_0: entered promiscuous mode [ 25.149631][ T3061] hsr_slave_1: entered promiscuous mode [ 25.155517][ T3061] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.163050][ T3061] Cannot create hsr debugfs directory [ 25.171590][ T3070] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.178633][ T3070] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.204592][ T3070] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.226291][ T3070] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.233256][ T3070] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.259144][ T3070] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.304578][ T3067] hsr_slave_0: entered promiscuous mode [ 25.310592][ T3067] hsr_slave_1: entered promiscuous mode [ 25.316611][ T3067] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.324139][ T3067] Cannot create hsr debugfs directory [ 25.337223][ T3054] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 25.345952][ T3054] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 25.354385][ T3054] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 25.362844][ T3054] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 25.374147][ T3070] hsr_slave_0: entered promiscuous mode [ 25.380246][ T3070] hsr_slave_1: entered promiscuous mode [ 25.386078][ T3070] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.393605][ T3070] Cannot create hsr debugfs directory [ 25.434073][ T3065] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 25.456493][ T3065] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 25.483182][ T3065] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 25.495402][ T3064] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 25.506455][ T3064] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 25.514851][ T3065] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 25.546145][ T3064] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 25.558511][ T3061] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 25.570245][ T3061] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 25.579367][ T3061] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 25.587475][ T3064] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 25.605098][ T3061] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 25.617458][ T3054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.643443][ T3067] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 25.651774][ T3067] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 25.660140][ T3067] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 25.672408][ T3067] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 25.681140][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.688977][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.699428][ T3054] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.721709][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.730327][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.738687][ T3156] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.745782][ T3156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.757103][ T3070] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 25.765570][ T3070] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 25.773620][ T3070] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 25.782228][ T3070] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 25.790362][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.798183][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.806816][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.814999][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.822185][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.829759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 25.845500][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 25.854237][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 25.862545][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 25.871756][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 25.889459][ T3054] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 25.899904][ T3054] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 25.910643][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 25.910653][ T25] audit: type=1400 audit(1686736869.507:99): avc: denied { remove_name } for pid=2727 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.939083][ T25] audit: type=1400 audit(1686736869.507:100): avc: denied { rename } for pid=2727 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 25.961801][ T25] audit: type=1400 audit(1686736869.507:101): avc: denied { create } for pid=2727 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 25.973968][ T3061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.008756][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 26.017219][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 26.025743][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.034148][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.042896][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.051081][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.059295][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 26.071606][ T3065] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.089653][ T3064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.101939][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.109908][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.118322][ T3061] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.132422][ T3067] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.142565][ T3064] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.155298][ T3065] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.174656][ T3067] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.182634][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.190397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.198225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.205983][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.213411][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.222090][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.230298][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.237326][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.245076][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.252748][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.260500][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.268980][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.277465][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.284556][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.293432][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.301306][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.309711][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.318073][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.325102][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.333597][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.341351][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.349880][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.358151][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.365230][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.380588][ T3070] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.390627][ T3054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.400973][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.409211][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 26.417721][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 26.426627][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 26.434888][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 26.443400][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 26.450891][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 26.458433][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.466811][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.475057][ T3162] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.482079][ T3162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.489658][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.498243][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.506551][ T3162] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.513624][ T3162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.529376][ T3070] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.545575][ T3061] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 26.555978][ T3061] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 26.568636][ T3065] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 26.579047][ T3065] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 26.590612][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 26.599382][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.607347][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 26.615725][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 26.624174][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.632935][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.641271][ T3162] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.648309][ T3162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.656291][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.664727][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.673288][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 26.681957][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.689738][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.697309][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 26.705897][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 26.714448][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 26.722801][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 26.731244][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 26.739764][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 26.748318][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.757070][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.765740][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.773896][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.782147][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.790687][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.802214][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 26.809929][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 26.818046][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 26.825667][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.834070][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.842511][ T3162] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.849538][ T3162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.857311][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 26.865951][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 26.883864][ T3070] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 26.894234][ T3070] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 26.917559][ T3067] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 26.928183][ T3067] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 26.946899][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.955551][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.963802][ T3153] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.970911][ T3153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.978545][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.987093][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.995383][ T3153] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.002409][ T3153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.010120][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 27.018762][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 27.027472][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 27.035858][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 27.044347][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 27.052731][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 27.061116][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.069452][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.077711][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.085975][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.094025][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.102700][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.111291][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 27.119835][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 27.128318][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 27.136766][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 27.145136][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.153387][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.161850][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.170065][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.178263][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 27.187133][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 27.195464][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 27.203990][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 27.212394][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 27.220773][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.229139][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.237295][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.245482][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.255348][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.263393][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 27.271872][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 27.280383][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 27.288606][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 27.296450][ T3153] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 27.304825][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 27.320267][ T3061] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.333430][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 27.341233][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 27.360970][ T3065] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.387698][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 27.395136][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 27.407811][ T3070] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.432605][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 27.440358][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 27.448139][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.457144][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.467792][ T3054] veth0_vlan: entered promiscuous mode [ 27.475925][ T3054] veth1_vlan: entered promiscuous mode [ 27.486122][ T3067] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.497397][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.509529][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.523970][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 27.532856][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 27.540304][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 27.547875][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.556446][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.566649][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.574182][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.581989][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 27.595469][ T3064] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.614614][ T3054] veth0_macvtap: entered promiscuous mode [ 27.627370][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 27.639427][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 27.647129][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.656027][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.664589][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.673155][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.683508][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 27.691839][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.700471][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.710281][ T3054] veth1_macvtap: entered promiscuous mode [ 27.723501][ T3061] veth0_vlan: entered promiscuous mode [ 27.735892][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.748159][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.763626][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.776542][ T3054] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.787726][ T3061] veth1_vlan: entered promiscuous mode [ 27.794208][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.802652][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.811614][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 27.820457][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.829154][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.841396][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.850115][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.860379][ T3054] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.874296][ T3070] veth0_vlan: entered promiscuous mode [ 27.888564][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.897452][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.906508][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.914590][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.928790][ T3070] veth1_vlan: entered promiscuous mode [ 27.935404][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.942927][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.950802][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 27.959526][ T3054] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.968322][ T3054] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.977079][ T3054] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.985788][ T3054] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.998296][ T3067] veth0_vlan: entered promiscuous mode [ 28.006608][ T3065] veth0_vlan: entered promiscuous mode [ 28.017057][ T3065] veth1_vlan: entered promiscuous mode [ 28.025387][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 28.033361][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.041794][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.050535][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.058802][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.067195][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 28.081172][ T3067] veth1_vlan: entered promiscuous mode [ 28.093584][ T3070] veth0_macvtap: entered promiscuous mode [ 28.105685][ T3064] veth0_vlan: entered promiscuous mode [ 28.113387][ T3064] veth1_vlan: entered promiscuous mode [ 28.120031][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.127770][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.135619][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 28.143482][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.151248][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.159038][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 28.167166][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.175312][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.183734][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 28.191776][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.200209][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.208748][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.217211][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.225788][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.233329][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.241018][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 28.251956][ T3070] veth1_macvtap: entered promiscuous mode [ 28.259314][ T3061] veth0_macvtap: entered promiscuous mode [ 28.266571][ T3061] veth1_macvtap: entered promiscuous mode [ 28.274998][ T25] audit: type=1400 audit(1686736871.867:102): avc: denied { mounton } for pid=3054 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=452 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 28.284749][ T3067] veth0_macvtap: entered promiscuous mode [ 28.309802][ T3070] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 28.320338][ T3070] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 28.331435][ T3070] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 28.343492][ T3061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 28.353975][ T3061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 28.363833][ T3061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 28.374307][ T3061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 28.385432][ T3061] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 28.393181][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 28.402049][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 28.410274][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.418808][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 28.427020][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.434722][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.444070][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.452425][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.461221][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.469669][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.478233][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.486800][ T3180] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 28.496492][ T3067] veth1_macvtap: entered promiscuous mode [ 28.506110][ T3070] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 28.516589][ T3070] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 28.518757][ T25] audit: type=1400 audit(1686736872.107:103): avc: denied { read write } for pid=3054 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 28.527941][ T3070] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 28.550689][ T25] audit: type=1400 audit(1686736872.107:104): avc: denied { open } for pid=3054 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 28.550713][ T25] audit: type=1400 audit(1686736872.107:105): avc: denied { ioctl } for pid=3054 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 28.571194][ T25] audit: type=1400 audit(1686736872.167:106): avc: denied { create } for pid=3235 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 28.589656][ T3064] veth0_macvtap: entered promiscuous mode [ 28.607720][ T25] audit: type=1400 audit(1686736872.167:107): avc: denied { setopt } for pid=3235 comm="syz-executor.0" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 28.632829][ T3064] veth1_macvtap: entered promiscuous mode [ 28.661290][ T3061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 28.671777][ T3061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 28.681711][ T3061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 28.692130][ T3061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 28.703250][ T3061] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 28.715241][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.723259][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.731929][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.740616][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.749362][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.758325][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.766435][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.775030][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.786669][ T3070] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.795409][ T3070] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.804080][ T3070] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.812994][ T3070] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.828989][ T3067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 28.839493][ T3067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 28.849372][ T3067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 28.859885][ T3067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 28.869731][ T3067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 28.880152][ T3067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 28.891302][ T3067] batman_adv: batadv0: Interface activated: batadv_slave_0 10:01:12 executing program 0: r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xc8, 0x0, 0xc000000) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, 0x0, 0x0) [ 28.900515][ T3065] veth0_macvtap: entered promiscuous mode [ 28.909623][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 28.917833][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.926939][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.935747][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.944205][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.958956][ T3061] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.967736][ T3061] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.976410][ T3061] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.985234][ T3061] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.996952][ T3067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.007506][ T3067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.017419][ T3067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.028344][ T3067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.038228][ T3067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.048693][ T3067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.059642][ T3067] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.067305][ T3064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 29.077721][ T3064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.087637][ T3064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 29.098047][ T3064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.107858][ T3064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 29.118374][ T3064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.128336][ T3064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 29.138744][ T3064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.149690][ T3064] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.158482][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 29.166663][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.176116][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.184673][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.193323][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.210445][ T3065] veth1_macvtap: entered promiscuous mode [ 29.219647][ T3067] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.228463][ T3067] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.233794][ T25] audit: type=1400 audit(1686736872.827:108): avc: denied { create } for pid=3242 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 10:01:12 executing program 0: r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xc8, 0x0, 0xc000000) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, 0x0, 0x0) [ 29.237162][ T3067] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.237190][ T3067] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.241506][ T3064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.285175][ T3064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.295023][ T3064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.305439][ T3064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.315259][ T3064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.325755][ T3064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.335581][ T3064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.346339][ T3064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:01:13 executing program 0: r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xc8, 0x0, 0xc000000) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, 0x0, 0x0) [ 29.357831][ T3064] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.380293][ T3040] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.396003][ T3040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:01:13 executing program 2: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) [ 29.405875][ T3064] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.414737][ T3064] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.423464][ T3064] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.432358][ T3064] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.449409][ T3065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 10:01:13 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x80, &(0x7f00000002c0)="1a00000002000000", 0x8) 10:01:13 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x80, &(0x7f00000002c0)="1a00000002000000", 0x8) [ 29.460131][ T3065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.470011][ T3065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 29.480443][ T3065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.490255][ T3065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 29.501073][ T3065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:01:13 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x80, &(0x7f00000002c0)="1a00000002000000", 0x8) [ 29.510900][ T3065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 29.521343][ T3065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.531177][ T3065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 29.541620][ T3065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.553374][ T3065] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.571903][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.581635][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.595971][ T3065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.606436][ T3065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.616267][ T3065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.626710][ T3065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.636531][ T3065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.647115][ T3065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.657456][ T3065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.668015][ T3065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.677816][ T3065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.688248][ T3065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.700251][ T3065] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.710774][ T3150] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.719494][ T3150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:01:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x401070c9, 0x0) 10:01:13 executing program 2: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 10:01:13 executing program 0: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 10:01:13 executing program 1: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) [ 29.756557][ T3065] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.765347][ T3065] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.774095][ T3065] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.782890][ T3065] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 10:01:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0x3a}]}, 0x3c}}, 0x0) 10:01:13 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0xffffffffffffffff, 0x4) 10:01:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x401070c9, 0x0) 10:01:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x401070c9, 0x0) 10:01:13 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0xffffffffffffffff, 0x4) 10:01:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0x3a}]}, 0x3c}}, 0x0) 10:01:13 executing program 5: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 10:01:13 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0xffffffffffffffff, 0x4) 10:01:13 executing program 2: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 10:01:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0x3a}]}, 0x3c}}, 0x0) 10:01:13 executing program 4: r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xc8, 0x0, 0xc000000) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, 0x0, 0x0) 10:01:13 executing program 1: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 10:01:13 executing program 0: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) [ 29.916396][ T3284] syz-executor.3 (3284) used greatest stack depth: 11552 bytes left 10:01:13 executing program 4: r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xc8, 0x0, 0xc000000) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, 0x0, 0x0) 10:01:13 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0xfd36793c) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000deff000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000400)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x12) 10:01:13 executing program 4: r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xc8, 0x0, 0xc000000) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, 0x0, 0x0) 10:01:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)={0x80, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @broadcast}}}]}]}, 0x80}}, 0x0) 10:01:13 executing program 5: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 10:01:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)={0x80, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @broadcast}}}]}]}, 0x80}}, 0x0) 10:01:13 executing program 0: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) [ 30.054263][ T3321] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 30.067966][ T3321] syz-executor.4 (3321) used greatest stack depth: 11448 bytes left 10:01:13 executing program 1: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 10:01:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)={0x80, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @broadcast}}}]}]}, 0x80}}, 0x0) 10:01:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000000a0000000900010073797a310000000048000000030a010100000000000000000a000000080007006e61020014000480080002409000000008000140000000000900010073797a3100000000090003"], 0x90}}, 0x0) [ 30.096255][ T3327] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 10:01:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)={0x80, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @broadcast}}}]}]}, 0x80}}, 0x0) 10:01:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000000a0000000900010073797a310000000048000000030a010100000000000000000a000000080007006e61020014000480080002409000000008000140000000000900010073797a3100000000090003"], 0x90}}, 0x0) 10:01:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000000a0000000900010073797a310000000048000000030a010100000000000000000a000000080007006e61020014000480080002409000000008000140000000000900010073797a3100000000090003"], 0x90}}, 0x0) [ 30.153881][ T3332] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 30.190210][ T3339] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 10:01:14 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0xfd36793c) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000deff000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000400)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x12) 10:01:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000000a0000000900010073797a310000000048000000030a010100000000000000000a000000080007006e61020014000480080002409000000008000140000000000900010073797a3100000000090003"], 0x90}}, 0x0) 10:01:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000000a0000000900010073797a310000000048000000030a010100000000000000000a000000080007006e61020014000480080002409000000008000140000000000900010073797a3100000000090003"], 0x90}}, 0x0) 10:01:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@jmp, @call={0x85, 0x0, 0x0, 0xa4}]}, &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x9f, &(0x7f0000000100)=""/159, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:01:14 executing program 5: r0 = eventfd(0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000280)=0x0) io_pgetevents(r3, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 10:01:14 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@jmp, @call={0x85, 0x0, 0x0, 0xa4}]}, &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x9f, &(0x7f0000000100)=""/159, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:01:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@jmp, @call={0x85, 0x0, 0x0, 0xa4}]}, &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x9f, &(0x7f0000000100)=""/159, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:01:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000000a0000000900010073797a310000000048000000030a010100000000000000000a000000080007006e61020014000480080002409000000008000140000000000900010073797a3100000000090003"], 0x90}}, 0x0) 10:01:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000000a0000000900010073797a310000000048000000030a010100000000000000000a000000080007006e61020014000480080002409000000008000140000000000900010073797a3100000000090003"], 0x90}}, 0x0) 10:01:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@jmp, @call={0x85, 0x0, 0x0, 0xa4}]}, &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x9f, &(0x7f0000000100)=""/159, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:01:14 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0xfd36793c) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000deff000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000400)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x12) 10:01:23 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0xfd36793c) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000deff000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000400)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x12) 10:01:23 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0xfd36793c) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000deff000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000400)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x12) 10:01:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x7f77, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) 10:01:23 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:23 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:23 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0xfd36793c) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000deff000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000400)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x12) 10:01:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x7f77, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) [ 40.113407][ T25] kauditd_printk_skb: 12 callbacks suppressed [ 40.113419][ T25] audit: type=1400 audit(1686736883.707:121): avc: denied { create } for pid=3377 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 10:01:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x7f77, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) 10:01:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x7f77, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) 10:01:23 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x7f77, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) [ 40.173686][ T25] audit: type=1400 audit(1686736883.747:122): avc: denied { write } for pid=3377 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.194477][ T25] audit: type=1400 audit(1686736883.747:123): avc: denied { read } for pid=3377 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 10:01:23 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:38 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0xfd36793c) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000deff000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000400)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x12) 10:01:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x7f77, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) 10:01:38 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:38 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:38 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0xfd36793c) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000deff000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000400)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x12) 10:01:38 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0xfd36793c) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000deff000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000400)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x12) 10:01:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x7f77, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) 10:01:38 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:38 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:38 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r1) ioctl$KDMKTONE(r0, 0x8905, 0x200000000000000) 10:01:38 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:38 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:59 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r1) ioctl$KDMKTONE(r0, 0x8905, 0x200000000000000) 10:01:59 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:59 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000640)="04", 0x1, 0x4044000, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f0000000a00)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x7fffef0e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="73954cbf619276ede4f171abccefd227e7a60156098a0f3670c11d061677cdc5ed56ebcfccac661826724ace09101e64a73b2b62ad3b0a3e1437198944224a10a5580a1135c45ef9073dc9541514875ca9b185bd82e2f582d7d346f64d18b2f0b9941b3f23aac484939b437586e8312c50ce585d7829a8458e475e9ea9f092880fef1735f7c619ea653de76f95373c2a82b969bcbaa093999cde8bfa5e61798cc3f15f09b42bf8e1984279a20bd321f660894a150bcc8b88f3d620fbc17b43170941b316fc9f35cffabb00448d71ef4f52892e8c4f4b2a0dc098909a26e9a20901e193da1aaa7448c7b9fa7bf59936628068", 0xf2}], 0xc, &(0x7f0000000400)=[{0x98, 0x0, 0x0, "05651510102ae3277d1f043f0fe4aca20ae0fcb08516dbfe2631f8cd81026489f1e227a84b75e81d989efbdde03b0f59fd8f56c5dfe0d828ab88a0ffbddfab9887849a8467f98a7cac60766d895b46a6392b3b546b69ad1cbe69a21c9ed9c49e2803a4c6da5351d64622b4bd8a1ece35c2dc10c843e7c4713ef1348753a7b6f06c1881"}, {0x70, 0x0, 0x0, "e4b68d6bd53986378235eadc8bf425bd02e5c7b5bd482a9ba304149d9a1f3d5c18429bfb99926fde39204ecef759fd4dd9ac4528c276fcf0348a311ddad851b90db56689d0fc5990ef4a66408eca0961b27c18c7b522c7fc40094840cd11"}, {0xa8, 0x0, 0x0, "ec7e76d2a0b3c7e9cc308ecaa4f6f2fe28ea431be85bdab810f3d1b692738fdeed7c0fc627a5456bc0f99ab0d07f5afb9a5e4460f0802a5ad2607cd7a65986c724eebf4b639eb5277af05e7d1763c48b66fd98417ef9939b0499c67698fced2f6d1f7437646814a01d033819cf77fab5fde09a01afdb4ee88dacec86cf04fad065628747073fbad402ec932318c7df94ef4ddc"}, {0x58, 0x0, 0x0, "e312389d030b5c5b4195812fc632c4df4bbbfce12ff21a55483ad2894271674206ac7d9887eb70e0168a75ca335590b5d29289fda5e26a3acf83350bd996f71bd37419dd"}], 0x208}, 0x48824) 10:01:59 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r1) ioctl$KDMKTONE(r0, 0x8905, 0x200000000000000) 10:01:59 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0xfd36793c) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000deff000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000400)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x12) 10:01:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) mount$tmpfs(0x20000000, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', 0x0, 0x2880c26, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36]}}]}) 10:01:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:01:59 executing program 0: r0 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) r1 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mount_setattr(r1, &(0x7f0000000300)='./file0\x00', 0x9100, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) 10:01:59 executing program 0: r0 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) r1 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mount_setattr(r1, &(0x7f0000000300)='./file0\x00', 0x9100, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) [ 75.730568][ T25] audit: type=1400 audit(1686736919.327:124): avc: denied { mounton } for pid=3446 comm="syz-executor.0" path="/root/syzkaller-testdir2915959031/syzkaller.3dkbZx/21/file0" dev="sda1" ino=1958 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 75.757560][ T25] audit: type=1400 audit(1686736919.327:125): avc: denied { mount } for pid=3446 comm="syz-executor.0" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 10:01:59 executing program 0: r0 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) r1 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mount_setattr(r1, &(0x7f0000000300)='./file0\x00', 0x9100, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) 10:01:59 executing program 0: r0 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) r1 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mount_setattr(r1, &(0x7f0000000300)='./file0\x00', 0x9100, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) [ 75.779827][ T25] audit: type=1400 audit(1686736919.327:126): avc: denied { unmount } for pid=3054 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 10:01:59 executing program 0: r0 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) r1 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mount_setattr(r1, &(0x7f0000000300)='./file0\x00', 0x9100, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) 10:02:03 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r1) ioctl$KDMKTONE(r0, 0x8905, 0x200000000000000) 10:02:03 executing program 0: r0 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) r1 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mount_setattr(r1, &(0x7f0000000300)='./file0\x00', 0x9100, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) 10:02:03 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r1) ioctl$KDMKTONE(r0, 0x8905, 0x200000000000000) 10:02:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) [ 96.582672][ T25] audit: type=1400 audit(1686736940.177:127): avc: denied { remount } for pid=3485 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 10:02:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) mount$tmpfs(0x20000000, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', 0x0, 0x2880c26, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36]}}]}) 10:02:22 executing program 0: r0 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) r1 = open$dir(&(0x7f0000000940)='.\x00', 0x0, 0x0) mount_setattr(r1, &(0x7f0000000300)='./file0\x00', 0x9100, &(0x7f0000000340)={0x0, 0x0, 0x20000}, 0x20) 10:02:22 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r1) ioctl$KDMKTONE(r0, 0x8905, 0x200000000000000) 10:02:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:22 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r1) ioctl$KDMKTONE(r0, 0x8905, 0x200000000000000) 10:02:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) mount$tmpfs(0x20000000, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', 0x0, 0x2880c26, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36]}}]}) 10:02:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) mount$tmpfs(0x20000000, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', 0x0, 0x2880c26, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36]}}]}) 10:02:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) mount$tmpfs(0x20000000, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', 0x0, 0x2880c26, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36]}}]}) 10:02:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) mount$tmpfs(0x20000000, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', 0x0, 0x2880c26, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36]}}]}) 10:02:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) mount$tmpfs(0x20000000, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', 0x0, 0x2880c26, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36]}}]}) 10:02:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) mount$tmpfs(0x20000000, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', 0x0, 0x2880c26, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36]}}]}) 10:02:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) mount$tmpfs(0x20000000, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', 0x0, 0x2880c26, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36]}}]}) 10:02:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) mount$tmpfs(0x20000000, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', 0x0, 0x2880c26, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x36]}}]}) 10:02:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:59 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='pids.events\x00', 0x275a, 0x0) pwritev2(r0, &(0x7f0000000180)=[{&(0x7f0000000000)='v', 0x1}], 0x1, 0x0, 0x0, 0xc) 10:02:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:02:59 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 10:02:59 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='pids.events\x00', 0x275a, 0x0) pwritev2(r0, &(0x7f0000000180)=[{&(0x7f0000000000)='v', 0x1}], 0x1, 0x0, 0x0, 0xc) 10:02:59 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='pids.events\x00', 0x275a, 0x0) pwritev2(r0, &(0x7f0000000180)=[{&(0x7f0000000000)='v', 0x1}], 0x1, 0x0, 0x0, 0xc) 10:02:59 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='pids.events\x00', 0x275a, 0x0) pwritev2(r0, &(0x7f0000000180)=[{&(0x7f0000000000)='v', 0x1}], 0x1, 0x0, 0x0, 0xc) 10:02:59 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000040), 0x40, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) 10:02:59 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000040), 0x40, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) 10:02:59 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000040), 0x40, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) 10:03:05 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000040), 0x40, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) 10:03:05 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000040), 0x40, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) 10:03:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:03:05 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000040), 0x40, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) 10:03:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:03:06 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000040), 0x40, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) 10:03:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @random="a001007d2125"}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000001b40)={r3, 0x1, 0x3, @local}, 0x10) close(r0) 10:03:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x103, 0x4, 0xa}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)=@tcp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000140), 0x0}, 0x20) 10:03:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0)='[', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0x2bb98205) splice(r0, 0x0, r3, 0x0, 0x4ff9c, 0x0) timer_create(0x0, &(0x7f0000002440)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000280)=0x0) timer_settime(r4, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, 0x0) 10:03:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x103, 0x4, 0xa}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)=@tcp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000140), 0x0}, 0x20) 10:03:06 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000040), 0x40, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) 10:03:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x103, 0x4, 0xa}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)=@tcp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000140), 0x0}, 0x20) 10:03:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x103, 0x4, 0xa}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)=@tcp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000140), 0x0}, 0x20) [ 143.228682][ T25] audit: type=1400 audit(1686736986.827:128): avc: denied { map_create } for pid=3613 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 10:03:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x103, 0x4, 0xa}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)=@tcp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000140), 0x0}, 0x20) 10:03:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x103, 0x4, 0xa}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)=@tcp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000140), 0x0}, 0x20) [ 143.261969][ T25] audit: type=1400 audit(1686736986.827:129): avc: denied { map_read map_write } for pid=3613 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 157.728254][ T25] audit: type=1400 audit(1686737001.327:130): avc: denied { ioctl } for pid=3633 comm="syz-executor.2" path="socket:[18330]" dev="sockfs" ino=18330 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 157.728337][ T3635] team0: entered promiscuous mode [ 157.758441][ T3635] team_slave_0: entered promiscuous mode [ 157.760065][ T25] audit: type=1400 audit(1686737001.327:131): avc: denied { setopt } for pid=3633 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 157.764185][ T3635] team_slave_1: entered promiscuous mode [ 158.757019][ T3633] team0: left promiscuous mode [ 158.761801][ T3633] team_slave_0: left promiscuous mode [ 158.767337][ T3633] team_slave_1: left promiscuous mode 10:03:30 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000040), 0x40, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) 10:03:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x103, 0x4, 0xa}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)=@tcp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000140), 0x0}, 0x20) 10:03:30 executing program 0: r0 = socket(0x2a, 0x2, 0x0) sendto$l2tp(r0, 0x0, 0x2000000, 0x0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) 10:03:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x103, 0x4, 0xa}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)=@tcp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000140), 0x0}, 0x20) 10:03:30 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x15}, {0x35, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) epoll_create(0x9) 10:03:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r1}, &(0x7f0000000200)=0x8) 10:03:30 executing program 0: r0 = socket(0x2a, 0x2, 0x0) sendto$l2tp(r0, 0x0, 0x2000000, 0x0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) 10:03:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x103, 0x4, 0xa}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)=@tcp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000140), 0x0}, 0x20) 10:03:30 executing program 0: r0 = socket(0x2a, 0x2, 0x0) sendto$l2tp(r0, 0x0, 0x2000000, 0x0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) 10:03:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x103, 0x4, 0xa}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f00000001c0)=@tcp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000140), 0x0}, 0x20) 10:03:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto, @volatile={0x0, 0x0, 0x0, 0x2, 0x3}, @volatile]}}, 0x0, 0x3e}, 0x20) 10:03:30 executing program 0: r0 = socket(0x2a, 0x2, 0x0) sendto$l2tp(r0, 0x0, 0x2000000, 0x0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) [ 167.265222][ T25] audit: type=1400 audit(1686737010.857:132): avc: denied { create } for pid=3647 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 167.285344][ T25] audit: type=1400 audit(1686737010.857:133): avc: denied { write } for pid=3647 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 10:03:46 executing program 3: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000040), 0x40, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) 10:03:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:03:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto, @volatile={0x0, 0x0, 0x0, 0x2, 0x3}, @volatile]}}, 0x0, 0x3e}, 0x20) 10:03:46 executing program 1: open$dir(&(0x7f0000002500)='./file0\x00', 0xc0, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.selinux\x00', 0x0, 0x0, 0x0) 10:03:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180), &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r0, 0x0) 10:03:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)=@mpls_getnetconf={0x14, 0x52, 0xb01}, 0x14}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x6f2, 0x0, 0x0) 10:03:46 executing program 1: open$dir(&(0x7f0000002500)='./file0\x00', 0xc0, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.selinux\x00', 0x0, 0x0, 0x0) 10:03:46 executing program 1: open$dir(&(0x7f0000002500)='./file0\x00', 0xc0, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.selinux\x00', 0x0, 0x0, 0x0) 10:03:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto, @volatile={0x0, 0x0, 0x0, 0x2, 0x3}, @volatile]}}, 0x0, 0x3e}, 0x20) [ 182.745194][ T25] audit: type=1400 audit(1686737026.337:134): avc: denied { mac_admin } for pid=3668 comm="syz-executor.1" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 10:03:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:03:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto, @volatile={0x0, 0x0, 0x0, 0x2, 0x3}, @volatile]}}, 0x0, 0x3e}, 0x20) [ 182.776139][ T25] audit: type=1400 audit(1686737026.377:135): avc: denied { shutdown } for pid=3671 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 182.796145][ T25] audit: type=1400 audit(1686737026.377:136): avc: denied { getopt } for pid=3671 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 182.815886][ T25] audit: type=1400 audit(1686737026.377:137): avc: denied { connect } for pid=3671 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 10:03:46 executing program 1: open$dir(&(0x7f0000002500)='./file0\x00', 0xc0, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.selinux\x00', 0x0, 0x0, 0x0) [ 182.835847][ T25] audit: type=1400 audit(1686737026.377:138): avc: denied { name_connect } for pid=3671 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 10:03:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:03:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:03:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:03:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:03:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x2, 0x4e24, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast2}}}, @ip_ttl={{0x14, 0x0, 0x34, 0x3}}], 0x38}, 0x0) 10:03:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:03:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:03:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:03:53 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:03:53 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:03:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:03:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:03:53 executing program 5: creat(&(0x7f0000000480)='./file0\x00', 0x0) capset(&(0x7f0000000300)={0x20071026}, &(0x7f0000000340)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '&\x00'}, 0x0, 0x0, 0x0) 10:03:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002f00)={0x0, 0x10, &(0x7f0000002ec0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000380)={r2}, 0x8) 10:03:53 executing program 5: creat(&(0x7f0000000480)='./file0\x00', 0x0) capset(&(0x7f0000000300)={0x20071026}, &(0x7f0000000340)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '&\x00'}, 0x0, 0x0, 0x0) [ 189.935106][ T3712] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure [ 189.999087][ T25] audit: type=1400 audit(1686737033.597:139): avc: denied { read } for pid=3704 comm="syz-executor.0" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 190.023565][ T25] audit: type=1400 audit(1686737033.597:140): avc: denied { open } for pid=3704 comm="syz-executor.0" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 190.048467][ T25] audit: type=1400 audit(1686737033.597:141): avc: denied { ioctl } for pid=3704 comm="syz-executor.0" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 10:04:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:04:11 executing program 5: creat(&(0x7f0000000480)='./file0\x00', 0x0) capset(&(0x7f0000000300)={0x20071026}, &(0x7f0000000340)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '&\x00'}, 0x0, 0x0, 0x0) 10:04:11 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:04:11 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002f00)={0x0, 0x10, &(0x7f0000002ec0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000380)={r2}, 0x8) 10:04:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002f00)={0x0, 0x10, &(0x7f0000002ec0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000380)={r2}, 0x8) 10:04:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:04:11 executing program 5: creat(&(0x7f0000000480)='./file0\x00', 0x0) capset(&(0x7f0000000300)={0x20071026}, &(0x7f0000000340)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '&\x00'}, 0x0, 0x0, 0x0) 10:04:11 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() [ 207.448779][ T25] audit: type=1400 audit(1686737051.047:142): avc: denied { write } for pid=3032 comm="syz-fuzzer" path="pipe:[15227]" dev="pipefs" ino=15227 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 10:04:11 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002f00)={0x0, 0x10, &(0x7f0000002ec0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000380)={r2}, 0x8) 10:04:11 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:04:11 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:04:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002f00)={0x0, 0x10, &(0x7f0000002ec0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000380)={r2}, 0x8) 10:04:31 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:04:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:04:31 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:04:31 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:04:31 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0xc) 10:04:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002f00)={0x0, 0x10, &(0x7f0000002ec0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000380)={r2}, 0x8) 10:04:32 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:04:32 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:04:32 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:04:34 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:04:34 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:04:34 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() [ 232.059488][ T3780] udevd[3780]: inotify_add_watch(7, /dev/loop11, 10) failed: No such file or directory 10:04:35 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() [ 232.195152][ C0] sched: RT throttling activated 10:04:46 executing program 1: creat(&(0x7f0000000480)='./file0\x00', 0x0) capset(&(0x7f0000000300)={0x20071026}, &(0x7f0000000340)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '&\x00'}, 0x0, 0x0, 0x0) 10:04:46 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000003600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x47, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) open(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000300)=0x3) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) getrlimit(0x9, &(0x7f0000000480)) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) ptrace(0x10, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) getrlimit(0x2, &(0x7f0000000280)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) sync() 10:04:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$eJzs3M9rHGUYB/CnMaY1NT/UWm2h+KIXvQxNDl70EiQF6UKlbYRWEKZmokvG3WVnCWwRW09e/Q+8i0dvgnjTSy7+A1685eIxB3HEndRtlxRUuibYz+eyDzzvd/cZFgbeYd/de/OLj7e3qmwrH8TMiRMx04tI+ylSzMQ9d+O1N3748cK1Gzcvr7Va61dTurR2feX1lNLiS9+998nXL38/OP3uN4vfnozd5ff3fl39Zffs7rm9369/1K7S3YP3SLe63UF+qyzSZrvazlJ6pyzyqkjtTlX0Bykf97fKbq83THlnc2G+1y+qKuWdYdouhmnQTYP+MOUf5u1OyrIsLcwHB+b+TWjjq/26riPq+smYi7qu66diPk7H07EQi7EUy/FMPBvPxZl4Ps7GC/FinButevTjAwAAAAAAAAAAAAAAAAAAwOPM+X8AAAAAAAAAAAAAAAAAAAA4etdu3Ly81mqtX03pVET5+c7Gzkbz2vTXtqIdZRRxMZbitxid/m809aW3W+sX08hyfFbeOcjf2dnYv7euya+M/k7g0PxKk08P5k/G/P2fvxpLcebw/Oqh+VPx6iv35bNYip8+iG6UsRl/Zsf5T1dSeutKayJ/frQOAAAA/g+y9JeJ/fsTTT97WL/JTz4fmIvx/vzKzw88H5jYX8/G+dmjvXYiquHt7bwsi75iqsWF4zGG4hEVc3Esxphi8ZAbxpfr//Edimkaf+n/MDgzpYEAAAAAAAAAAAD4W6rh7dmI6f6Y8aivEQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPiDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXwUAAP//BT3V4w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) 10:04:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000180)={r2}, &(0x7f0000000340)=0x8) 10:04:46 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002f00)={0x0, 0x10, &(0x7f0000002ec0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000380)={r2}, 0x8) 10:04:46 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = epoll_create1(0x0) r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r4, r2, 0x11, 0x0, r4}, 0x14) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000140)={@cgroup=r1, r2, 0x11, 0x0, r1}, 0x11) 10:04:46 executing program 1: creat(&(0x7f0000000480)='./file0\x00', 0x0) capset(&(0x7f0000000300)={0x20071026}, &(0x7f0000000340)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '&\x00'}, 0x0, 0x0, 0x0) 10:04:46 executing program 1: creat(&(0x7f0000000480)='./file0\x00', 0x0) capset(&(0x7f0000000300)={0x20071026}, &(0x7f0000000340)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '&\x00'}, 0x0, 0x0, 0x0) 10:04:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@delchain={0x24}, 0x24}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x24, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x4}}]}, 0x24}}, 0x0) [ 242.839759][ T3817] loop5: detected capacity change from 0 to 8192 [ 242.847104][ T3817] ======================================================= [ 242.847104][ T3817] WARNING: The mand mount option has been deprecated and [ 242.847104][ T3817] and is ignored by this kernel. Remove the mand [ 242.847104][ T3817] option from the mount to silence this warning. [ 242.847104][ T3817] ======================================================= [ 242.905586][ T25] audit: type=1400 audit(1686737086.487:143): avc: denied { prog_run } for pid=3824 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 242.924897][ T25] audit: type=1400 audit(1686737086.497:144): avc: denied { mount } for pid=3815 comm="syz-executor.5" name="/" dev="loop5" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 242.960722][ T3809] udevd[3809]: inotify_add_watch(7, /dev/loop11, 10) failed: No such file or directory 10:04:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@delchain={0x24}, 0x24}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x24, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x4}}]}, 0x24}}, 0x0) 10:04:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) [ 243.066982][ T25] audit: type=1400 audit(1686737086.637:145): avc: denied { create } for pid=3815 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 243.086795][ T25] audit: type=1400 audit(1686737086.647:146): avc: denied { getopt } for pid=3815 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 10:04:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@delchain={0x24}, 0x24}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x24, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x4}}]}, 0x24}}, 0x0) [ 243.106544][ T25] audit: type=1400 audit(1686737086.667:147): avc: denied { unmount } for pid=3064 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 10:04:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@delchain={0x24}, 0x24}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x24, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x4}}]}, 0x24}}, 0x0) [ 243.244709][ T3838] loop5: detected capacity change from 0 to 8192 10:04:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) 10:04:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) [ 243.689475][ T3842] loop1: detected capacity change from 0 to 8192 [ 243.690098][ T3841] loop5: detected capacity change from 0 to 8192 10:04:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000180)={r2}, &(0x7f0000000340)=0x8) 10:04:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) [ 249.961196][ T3849] loop0: detected capacity change from 0 to 8192 10:04:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) 10:04:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$eJzs3M9rHGUYB/CnMaY1NT/UWm2h+KIXvQxNDl70EiQF6UKlbYRWEKZmokvG3WVnCWwRW09e/Q+8i0dvgnjTSy7+A1685eIxB3HEndRtlxRUuibYz+eyDzzvd/cZFgbeYd/de/OLj7e3qmwrH8TMiRMx04tI+ylSzMQ9d+O1N3748cK1Gzcvr7Va61dTurR2feX1lNLiS9+998nXL38/OP3uN4vfnozd5ff3fl39Zffs7rm9369/1K7S3YP3SLe63UF+qyzSZrvazlJ6pyzyqkjtTlX0Bykf97fKbq83THlnc2G+1y+qKuWdYdouhmnQTYP+MOUf5u1OyrIsLcwHB+b+TWjjq/26riPq+smYi7qu66diPk7H07EQi7EUy/FMPBvPxZl4Ps7GC/FinButevTjAwAAAAAAAAAAAAAAAAAAwOPM+X8AAAAAAAAAAAAAAAAAAAA4etdu3Ly81mqtX03pVET5+c7Gzkbz2vTXtqIdZRRxMZbitxid/m809aW3W+sX08hyfFbeOcjf2dnYv7euya+M/k7g0PxKk08P5k/G/P2fvxpLcebw/Oqh+VPx6iv35bNYip8+iG6UsRl/Zsf5T1dSeutKayJ/frQOAAAA/g+y9JeJ/fsTTT97WL/JTz4fmIvx/vzKzw88H5jYX8/G+dmjvXYiquHt7bwsi75iqsWF4zGG4hEVc3Esxphi8ZAbxpfr//Edimkaf+n/MDgzpYEAAAAAAAAAAAD4W6rh7dmI6f6Y8aivEQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPiDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXwUAAP//BT3V4w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) 10:04:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000180)={r2}, &(0x7f0000000340)=0x8) 10:04:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) 10:04:55 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000180)={r2}, &(0x7f0000000340)=0x8) 10:04:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$eJzs3M9rHGUYB/CnMaY1NT/UWm2h+KIXvQxNDl70EiQF6UKlbYRWEKZmokvG3WVnCWwRW09e/Q+8i0dvgnjTSy7+A1685eIxB3HEndRtlxRUuibYz+eyDzzvd/cZFgbeYd/de/OLj7e3qmwrH8TMiRMx04tI+ylSzMQ9d+O1N3748cK1Gzcvr7Va61dTurR2feX1lNLiS9+998nXL38/OP3uN4vfnozd5ff3fl39Zffs7rm9369/1K7S3YP3SLe63UF+qyzSZrvazlJ6pyzyqkjtTlX0Bykf97fKbq83THlnc2G+1y+qKuWdYdouhmnQTYP+MOUf5u1OyrIsLcwHB+b+TWjjq/26riPq+smYi7qu66diPk7H07EQi7EUy/FMPBvPxZl4Ps7GC/FinButevTjAwAAAAAAAAAAAAAAAAAAwOPM+X8AAAAAAAAAAAAAAAAAAAA4etdu3Ly81mqtX03pVET5+c7Gzkbz2vTXtqIdZRRxMZbitxid/m809aW3W+sX08hyfFbeOcjf2dnYv7euya+M/k7g0PxKk08P5k/G/P2fvxpLcebw/Oqh+VPx6iv35bNYip8+iG6UsRl/Zsf5T1dSeutKayJ/frQOAAAA/g+y9JeJ/fsTTT97WL/JTz4fmIvx/vzKzw88H5jYX8/G+dmjvXYiquHt7bwsi75iqsWF4zGG4hEVc3Esxphi8ZAbxpfr//Edimkaf+n/MDgzpYEAAAAAAAAAAAD4W6rh7dmI6f6Y8aivEQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPiDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXwUAAP//BT3V4w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) 10:04:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) 10:04:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) [ 252.062441][ T3853] loop0: detected capacity change from 0 to 8192 [ 252.082562][ T3854] loop1: detected capacity change from 0 to 8192 [ 252.084696][ T3855] loop5: detected capacity change from 0 to 8192 10:04:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) 10:04:55 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@delchain={0x24}, 0x24}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x24, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x4}}]}, 0x24}}, 0x0) [ 252.174384][ T3860] loop0: detected capacity change from 0 to 8192 10:04:55 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@delchain={0x24}, 0x24}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x24, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x4}}]}, 0x24}}, 0x0) 10:04:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@delchain={0x24}, 0x24}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x24, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x4}}]}, 0x24}}, 0x0) 10:04:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) [ 252.231595][ T3859] loop1: detected capacity change from 0 to 8192 [ 252.242033][ T3862] loop5: detected capacity change from 0 to 8192 [ 252.340636][ T3870] loop5: detected capacity change from 0 to 8192 10:05:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) 10:05:15 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@delchain={0x24}, 0x24}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x24, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x4}}]}, 0x24}}, 0x0) 10:05:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@delchain={0x24}, 0x24}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x24, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x4}}]}, 0x24}}, 0x0) 10:05:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) 10:05:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000180)={r2}, &(0x7f0000000340)=0x8) 10:05:15 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000180)={r2}, &(0x7f0000000340)=0x8) 10:05:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=@newtfilter={0x34, 0x2c, 0x1, 0x0, 0x0, {}, [@filter_kind_options=@f_flow={{0x9}, {0x4}}]}, 0x34}}, 0x0) 10:05:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@delchain={0x24}, 0x24}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@bridge_newvlan={0x24, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x4}}]}, 0x24}}, 0x0) 10:05:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=@newtfilter={0x34, 0x2c, 0x1, 0x0, 0x0, {}, [@filter_kind_options=@f_flow={{0x9}, {0x4}}]}, 0x34}}, 0x0) 10:05:15 executing program 1: r0 = gettid() r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000001c0)=0x7ff, 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x7) 10:05:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=@newtfilter={0x34, 0x2c, 0x1, 0x0, 0x0, {}, [@filter_kind_options=@f_flow={{0x9}, {0x4}}]}, 0x34}}, 0x0) 10:05:15 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) [ 271.692891][ T3885] loop5: detected capacity change from 0 to 8192 [ 271.703221][ T25] audit: type=1400 audit(1686737115.297:148): avc: denied { read } for pid=3893 comm="syz-executor.1" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 10:05:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./bus\x00', 0x14552, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRES64], 0xfd, 0x1204, &(0x7f0000003680)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000834c0000000000000000000000000000000000000000000000000000fa0061233d0ab81bd5a272720056b4e048622b460405c6df101e7060be7e57e65fc829944265ea90fb44571f228d0d66423306c12a76b03d75581cee8878a85dc9efd690d18f5b66ee3b0246fa90d286351ab78a77330f7311eebf3849bc278a038b87b58b86c907963b8203b4531b2f2b0e3ffb86af63dcb4171e9b1d114f37b4385c915a4fa0f2bf81860a0df4d37082e98e0a10f49d1d2193d4002bbb5893f6"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc4, 0x0, &(0x7f00000000c0)) 10:05:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=@newtfilter={0x34, 0x2c, 0x1, 0x0, 0x0, {}, [@filter_kind_options=@f_flow={{0x9}, {0x4}}]}, 0x34}}, 0x0) 10:05:22 executing program 1: r0 = gettid() r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000001c0)=0x7ff, 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x7) 10:05:22 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000180)={r2}, &(0x7f0000000340)=0x8) 10:05:25 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:25 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:25 executing program 1: r0 = gettid() r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000001c0)=0x7ff, 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x7) 10:05:25 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:25 executing program 1: r0 = gettid() r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000001c0)=0x7ff, 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x7) 10:05:25 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:25 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:35 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:35 executing program 3: r0 = gettid() r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000001c0)=0x7ff, 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x7) 10:05:35 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:35 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) io_setup(0xab2, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x8, 0x0, 0x0, r0, 0x0}]) 10:05:52 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:52 executing program 0: r0 = gettid() r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000001c0)=0x7ff, 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x7) 10:05:52 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:52 executing program 3: r0 = gettid() r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000001c0)=0x7ff, 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x7) 10:05:52 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:52 executing program 0: r0 = gettid() r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000001c0)=0x7ff, 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x7) 10:05:52 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:52 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:05:52 executing program 0: r0 = gettid() r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000001c0)=0x7ff, 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x7) 10:05:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xa}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_FLAGS={0x8, 0xb, 0x4}]}}]}, 0x38}}, 0x0) 10:05:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x34, r1, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'nicvf0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x0) [ 308.927949][ T3971] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3971 comm=syz-executor.0 [ 308.941349][ T3971] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 308.960100][ T3971] syz-executor.0 (3971) used greatest stack depth: 11312 bytes left 10:06:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) io_setup(0xab2, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x8, 0x0, 0x0, r0, 0x0}]) 10:06:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xa}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_FLAGS={0x8, 0xb, 0x4}]}}]}, 0x38}}, 0x0) 10:06:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff00c}, {0x84}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="c40a611b", 0x33fe0}], 0x1}}], 0x1, 0x0) 10:06:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x34, r1, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'nicvf0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x0) 10:06:13 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) lstat(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) r2 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0}) setrlimit(0x7, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000300)={r3, 0x2, r0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r3}) 10:06:13 executing program 3: r0 = gettid() r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000001c0)=0x7ff, 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) tkill(r0, 0x7) 10:06:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x34, r1, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'nicvf0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x0) 10:06:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff00c}, {0x84}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="c40a611b", 0x33fe0}], 0x1}}], 0x1, 0x0) 10:06:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff00c}, {0x84}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="c40a611b", 0x33fe0}], 0x1}}], 0x1, 0x0) 10:06:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x34, r1, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'nicvf0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x0) 10:06:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff00c}, {0x84}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="c40a611b", 0x33fe0}], 0x1}}], 0x1, 0x0) 10:06:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff00c}, {0x84}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="c40a611b", 0x33fe0}], 0x1}}], 0x1, 0x0) [ 329.545372][ T3998] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3998 comm=syz-executor.0 [ 329.570653][ T3998] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 10:06:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) io_setup(0xab2, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x8, 0x0, 0x0, r0, 0x0}]) 10:06:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xa}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_FLAGS={0x8, 0xb, 0x4}]}}]}, 0x38}}, 0x0) 10:06:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff00c}, {0x84}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="c40a611b", 0x33fe0}], 0x1}}], 0x1, 0x0) 10:06:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) io_setup(0xab2, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x8, 0x0, 0x0, r0, 0x0}]) 10:06:27 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x4024700a, 0x0) [ 344.059656][ T4023] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4023 comm=syz-executor.0 [ 344.078407][ T4023] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 10:06:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14010000160001000000000000000000ac1e00010000000000000000000000007f00000100"/64, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000033000000fe8000000000000000000000000000bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000160000000000000000000000000000000000000000000000000000000000000000000000faffffff050019000000000014"], 0x114}}, 0x0) 10:06:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff00c}, {0x84}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="c40a611b", 0x33fe0}], 0x1}}], 0x1, 0x0) 10:06:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c}, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xa}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_FLAGS={0x8, 0xb, 0x4}]}}]}, 0x38}}, 0x0) 10:06:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) io_setup(0xab2, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x8, 0x0, 0x0, r0, 0x0}]) 10:06:37 executing program 3: setresuid(0xee00, 0xee01, 0xee01) r0 = geteuid() setresuid(r0, 0xffffffffffffffff, 0xee00) 10:06:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000180)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r0, r1, 0x0, 0xf2090292) setsockopt$sock_timeval(r0, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) [ 354.179189][ T4030] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4030 comm=syz-executor.0 [ 354.202644][ T4030] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 10:06:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x4b69, &(0x7f0000000140)) [ 354.240542][ T4030] syz-executor.0 (4030) used greatest stack depth: 11216 bytes left 10:06:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) io_setup(0xab2, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x8, 0x0, 0x0, r0, 0x0}]) 10:06:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000180)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r0, r1, 0x0, 0xf2090292) setsockopt$sock_timeval(r0, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 10:06:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x4b69, &(0x7f0000000140)) 10:06:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000180)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r0, r1, 0x0, 0xf2090292) setsockopt$sock_timeval(r0, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 10:06:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) io_setup(0xab2, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x8, 0x0, 0x0, r0, 0x0}]) [ 361.729694][ T4050] ================================================================== [ 361.737794][ T4050] BUG: KCSAN: data-race in filemap_read / generic_write_end [ 361.745089][ T4050] [ 361.747407][ T4050] write to 0xffff88810a5cfb08 of 8 bytes by task 4048 on cpu 1: [ 361.755030][ T4050] generic_write_end+0xb4/0x360 [ 361.759885][ T4050] ext4_da_write_end+0x4df/0x690 [ 361.764835][ T4050] generic_perform_write+0x253/0x3d0 [ 361.770129][ T4050] ext4_buffered_write_iter+0x234/0x3e0 [ 361.775679][ T4050] ext4_file_write_iter+0xd7/0x10e0 [ 361.780867][ T4050] vfs_write+0x47b/0x780 [ 361.785097][ T4050] ksys_write+0xeb/0x1a0 [ 361.789334][ T4050] __x64_sys_write+0x42/0x50 [ 361.793921][ T4050] do_syscall_64+0x41/0xc0 [ 361.798337][ T4050] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 361.804222][ T4050] [ 361.806535][ T4050] read to 0xffff88810a5cfb08 of 8 bytes by task 4050 on cpu 0: [ 361.814067][ T4050] filemap_read+0x247/0x680 [ 361.818722][ T4050] generic_file_read_iter+0x76/0x320 [ 361.824021][ T4050] ext4_file_read_iter+0x1cc/0x290 [ 361.829152][ T4050] generic_file_splice_read+0xe3/0x290 [ 361.834613][ T4050] splice_direct_to_actor+0x25a/0x5f0 [ 361.839994][ T4050] do_splice_direct+0x104/0x180 [ 361.844854][ T4050] do_sendfile+0x3b8/0x950 [ 361.849282][ T4050] __x64_sys_sendfile64+0x110/0x150 [ 361.854487][ T4050] do_syscall_64+0x41/0xc0 [ 361.858887][ T4050] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 361.864760][ T4050] [ 361.867065][ T4050] value changed: 0x0000000000873000 -> 0x0000000000874000 [ 361.874156][ T4050] [ 361.876457][ T4050] Reported by Kernel Concurrency Sanitizer on: [ 361.882580][ T4050] CPU: 0 PID: 4050 Comm: syz-executor.1 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 361.892887][ T4050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 361.902931][ T4050] ================================================================== [ 367.810765][ T25] audit: type=1400 audit(1686737211.407:149): avc: denied { create } for pid=4052 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 10:06:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14010000160001000000000000000000ac1e00010000000000000000000000007f00000100"/64, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000033000000fe8000000000000000000000000000bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000160000000000000000000000000000000000000000000000000000000000000000000000faffffff050019000000000014"], 0x114}}, 0x0) 10:06:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x4b69, &(0x7f0000000140)) 10:06:53 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) preadv(r0, &(0x7f0000001840)=[{&(0x7f0000001680)=""/182, 0xb6}], 0x1, 0x0, 0x0) 10:06:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000180)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r0, r1, 0x0, 0xf2090292) setsockopt$sock_timeval(r0, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 10:06:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4500, &(0x7f0000000080)={[{@errors_remount}, {@sysvgroups}, {@dioread_lock}, {@grpquota}, {@noauto_da_alloc}, {@jqfmt_vfsv1}, {@barrier}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x20}}, {@usrquota}]}, 0x12, 0x4b4, &(0x7f0000001b00)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000300)="c4", 0x1}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) pwritev2(r0, &(0x7f00000009c0)=[{&(0x7f00000001c0)="97", 0x1}], 0x1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)={0x5c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}]]}, 0x5c}}, 0x0) writev(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000440)="49e32f61e3c9cbfd49f4b31226602a62730c74c5379e370dd7db6ea1a54a81b7f6", 0x21}], 0x1) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) 10:06:53 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) preadv(r0, &(0x7f0000001840)=[{&(0x7f0000001680)=""/182, 0xb6}], 0x1, 0x0, 0x0) 10:06:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x4b69, &(0x7f0000000140)) 10:06:53 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) preadv(r0, &(0x7f0000001840)=[{&(0x7f0000001680)=""/182, 0xb6}], 0x1, 0x0, 0x0) 10:06:53 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x20) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68d80000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYBLOB="3b0a1cbd17"], 0x20000600}}, 0x0) connect$can_bcm(r0, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) socket$l2tp(0x2, 0x2, 0x73) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x0, 0x5517, 0x48000000}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001a00)=ANY=[@ANYBLOB="bf16000000000000b70700000100e0ff5070000028000000770000000000000095000200000000007ae9413df8ff0af5aa35339f4b382c4cad9db6fa7a9b857b72abaca100af1ba23d699b89e890c10500000000000000000000000000ac0e064c27bdfbd301150500000000000000bfdc995279d64072aacbb0595b95060000009ad3bf16a42d4062093f4cb1c3d9532abad2085401f098eb039ae4f4103699b9e0c09c1a72cb6d47cef1595e84d21951010eee74b1445a2ad6a7ad73827cccc21842599e0ae7b91f0b878b9267aa0b28d69a74ffdea613e892f0f9ff94e690b6ad68e4cb6dd65f67bf3124702c6b1c2aea53ee0cb83ff1807459c7cba77cedca0bff6d8370c33e2bd9cebd29c152ff9dc8c2772fe552fecfd84608416780983c2f380bc01cefe9773a9a5cd5b24aa24a561e72393c0ce2bf44825b05c138779fe74f884c2472ab45c2af60289cb1a5963312dd1929096c6f49d116f1612a7b97f77169fa5e8a66a372ef8e3ee7167f7d2a26fc6c3cfa4dc5860277223d6eb3460e3b10a0dc040000009fca19d7beb5e700498b43bdadc916c01264d22d7969530633f94b257fbc5da7a96820e31444c0b0f62619c9e351996185e4015510875b774666ba5c0ba9845ad25b578dc357702f1de5d0a3dbffed16c7d50608dd77dc4cb06457cf5fce5403e210fe281e22480b2a5bdbc5fc0b4323f21dd3f3d38621565e85179533"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x9}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$USBDEVFS_IOCTL(r4, 0x8108551b, 0x0) [ 369.954685][ T25] audit: type=1400 audit(1686737213.547:150): avc: denied { create } for pid=4075 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 369.995235][ T25] audit: type=1400 audit(1686737213.547:151): avc: denied { connect } for pid=4075 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 370.015189][ T25] audit: type=1400 audit(1686737213.547:152): avc: denied { write } for pid=4075 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 370.034820][ T25] audit: type=1400 audit(1686737213.547:153): avc: denied { open } for pid=4075 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 370.054364][ T25] audit: type=1400 audit(1686737213.547:154): avc: denied { kernel } for pid=4075 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 370.099888][ T25] audit: type=1400 audit(1686737213.597:155): avc: denied { write } for pid=4075 comm="syz-executor.0" name="001" dev="devtmpfs" ino=146 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1