syzkaller login: ps_root_recvmsgcb: failed to send message to pid 2783: Connection refused ps_root_recvmsgcb: failed to send message to pid 2779: Connection refused [ 343.036478][ T2674] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. ps_root_recvmsgcb: failed to send message to pid 2794: Connection refused ps_root_recvmsgcb: failed to send message to pid 2793: Connection refused [ 351.835921][ T2674] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 375.582687][ T2824] warn_alloc: 5 callbacks suppressed [ 375.583063][ T2824] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 375.638494][ T2824] CPU: 0 PID: 2824 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 375.640121][ T2824] Hardware name: riscv-virtio,qemu (DT) [ 375.641296][ T2824] Call Trace: [ 375.642363][ T2824] [] dump_backtrace+0x2e/0x3c [ 375.644915][ T2824] [] show_stack+0x34/0x40 [ 375.646530][ T2824] [] dump_stack_lvl+0xe0/0x14c [ 375.648209][ T2824] [] dump_stack+0x1c/0x24 [ 375.650258][ T2824] [] warn_alloc+0x168/0x22c [ 375.651809][ T2824] [] __vmalloc_node_range+0xb6c/0xdb4 [ 375.653715][ T2824] [] bpf_jit_alloc_exec+0x46/0x52 [ 375.655279][ T2824] [] bpf_jit_binary_alloc+0x96/0x13c [ 375.656759][ T2824] [] bpf_int_jit_compile+0x886/0xaa6 [ 375.658306][ T2824] [] bpf_prog_select_runtime+0x1a2/0x22e [ 375.659868][ T2824] [] bpf_migrate_filter+0x258/0x2be [ 375.661484][ T2824] [] bpf_prepare_filter+0x10e/0x1b4 [ 375.663121][ T2824] [] __get_filter+0x148/0x1a0 [ 375.665581][ T2824] [] sk_attach_filter+0x22/0x11a [ 375.667062][ T2824] [] sk_setsockopt+0x144e/0x270c [ 375.668673][ T2824] [] sock_setsockopt+0x48/0x58 [ 375.670300][ T2824] [] __sys_setsockopt+0x3f0/0x418 [ 375.671805][ T2824] [] sys_setsockopt+0x3a/0x4c [ 375.673558][ T2824] [] ret_from_syscall+0x0/0x2 [ 375.738365][ T2824] Mem-Info: [ 375.740097][ T2824] active_anon:1065 inactive_anon:42 isolated_anon:0 [ 375.740097][ T2824] active_file:0 inactive_file:6279 isolated_file:0 [ 375.740097][ T2824] unevictable:768 dirty:4373 writeback:0 [ 375.740097][ T2824] slab_reclaimable:5234 slab_unreclaimable:18536 [ 375.740097][ T2824] mapped:1064 shmem:804 pagetables:118 [ 375.740097][ T2824] sec_pagetables:0 bounce:0 [ 375.740097][ T2824] kernel_misc_reclaimable:0 [ 375.740097][ T2824] free:279823 free_pcp:596 free_cma:4096 [ 375.766183][ T2824] Node 0 active_anon:4344kB inactive_anon:168kB active_file:0kB inactive_file:25116kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:4256kB dirty:17492kB writeback:0kB shmem:3216kB writeback_tmp:0kB kernel_stack:4440kB pagetables:472kB sec_pagetables:0kB all_unreclaimable? no [ 375.769408][ T2824] Node 0 DMA32 free:1119040kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:4344kB inactive_anon:168kB active_file:0kB inactive_file:25116kB unevictable:3072kB writepending:17492kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:2588kB local_pcp:1940kB free_cma:16384kB [ 375.772907][ T2824] lowmem_reserve[]: 0 0 0 [ 375.801394][ T2824] Node 0 DMA32: 2*4kB (UM) 1*8kB (E) 47*16kB (UME) 10*32kB (UE) 2*64kB (UM) 3*128kB (UME) 3*256kB (UME) 1*512kB (M) 2*1024kB (ME) 4*2048kB (UEC) 270*4096kB (MC) = 1119040kB [ 375.845354][ T2824] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 375.847325][ T2824] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 375.848803][ T2824] 7083 total pagecache pages [ 375.850088][ T2824] 0 pages in swap cache [ 375.851201][ T2824] Free swap = 0kB [ 375.852311][ T2824] Total swap = 0kB [ 375.884729][ T2824] 523776 pages RAM [ 375.886241][ T2824] 0 pages HighMem/MovableOnly [ 375.921926][ T2824] 184025 pages reserved [ 375.924587][ T2824] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 Warning: Permanently added '[localhost]:43249' (ECDSA) to the list of known hosts. 1970/01/01 00:06:52 fuzzer started 1970/01/01 00:07:02 dialing manager at localhost:40553 [ 426.399407][ T2842] cgroup: Unknown subsys name 'net' [ 427.639630][ T2842] cgroup: Unknown subsys name 'rlimit' 1970/01/01 00:07:07 syscalls: 2965 1970/01/01 00:07:07 code coverage: enabled 1970/01/01 00:07:07 comparison tracing: enabled 1970/01/01 00:07:07 extra coverage: enabled 1970/01/01 00:07:07 delay kcov mmap: enabled 1970/01/01 00:07:07 setuid sandbox: enabled 1970/01/01 00:07:07 namespace sandbox: enabled 1970/01/01 00:07:07 Android sandbox: /sys/fs/selinux/policy does not exist 1970/01/01 00:07:07 fault injection: enabled 1970/01/01 00:07:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 1970/01/01 00:07:07 net packet injection: enabled 1970/01/01 00:07:07 net device setup: enabled 1970/01/01 00:07:07 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 1970/01/01 00:07:07 devlink PCI setup: PCI device 0000:00:10.0 is not available 1970/01/01 00:07:07 NIC VF setup: PCI device 0000:00:11.0 is not available 1970/01/01 00:07:07 USB emulation: enabled 1970/01/01 00:07:07 hci packet injection: /dev/vhci does not exist 1970/01/01 00:07:07 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 1970/01/01 00:07:07 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 1970/01/01 00:07:08 fetching corpus: 0, signal 0/2000 (executing program) 1970/01/01 00:07:11 fetching corpus: 50, signal 34042/37592 (executing program) 1970/01/01 00:07:17 fetching corpus: 100, signal 55564/60468 (executing program) ps_root_recvmsgcb: failed to send message to pid 2825: Connection refused ps_root_recvmsgcb: failed to send message to pid 2824: Connection refused ps_root_recvmsgcb: failed to send message to pid 2826: Connection refused 1970/01/01 00:07:19 fetching corpus: 149, signal 62300/68674 (executing program) ps_root_recvmsgcb: failed to send message to pid 2827: Connection refused 1970/01/01 00:07:23 fetching corpus: 199, signal 70219/77922 (executing program) 1970/01/01 00:07:26 fetching corpus: 249, signal 74803/83889 (executing program) 1970/01/01 00:07:28 fetching corpus: 299, signal 78910/89314 (executing program) 1970/01/01 00:07:31 fetching corpus: 349, signal 86060/97580 (executing program) 1970/01/01 00:07:32 fetching corpus: 399, signal 89762/102489 (executing program) 1970/01/01 00:07:36 fetching corpus: 449, signal 95474/109231 (executing program) 1970/01/01 00:07:37 fetching corpus: 499, signal 97930/112876 (executing program) 1970/01/01 00:07:39 fetching corpus: 549, signal 102099/118084 (executing program) 1970/01/01 00:07:41 fetching corpus: 599, signal 105246/122317 (executing program) 1970/01/01 00:07:45 fetching corpus: 649, signal 107915/126076 (executing program) 1970/01/01 00:07:47 fetching corpus: 699, signal 109501/128779 (executing program) 1970/01/01 00:07:48 fetching corpus: 749, signal 111581/131961 (executing program) 1970/01/01 00:07:51 fetching corpus: 799, signal 114097/135451 (executing program) 1970/01/01 00:07:52 fetching corpus: 849, signal 119180/141151 (executing program) 1970/01/01 00:07:55 fetching corpus: 899, signal 121458/144408 (executing program) 1970/01/01 00:07:58 fetching corpus: 949, signal 123748/147564 (executing program) 1970/01/01 00:07:59 fetching corpus: 999, signal 126000/150723 (executing program) 1970/01/01 00:08:01 fetching corpus: 1049, signal 128597/154109 (executing program) 1970/01/01 00:08:03 fetching corpus: 1099, signal 130676/156988 (executing program) 1970/01/01 00:08:05 fetching corpus: 1149, signal 132593/159755 (executing program) 1970/01/01 00:08:06 fetching corpus: 1199, signal 135417/163225 (executing program) 1970/01/01 00:08:08 fetching corpus: 1249, signal 137061/165662 (executing program) 1970/01/01 00:08:10 fetching corpus: 1299, signal 139885/169081 (executing program) 1970/01/01 00:08:12 fetching corpus: 1349, signal 140984/171070 (executing program) 1970/01/01 00:08:14 fetching corpus: 1399, signal 142773/173559 (executing program) 1970/01/01 00:08:16 fetching corpus: 1449, signal 144734/176200 (executing program) 1970/01/01 00:08:17 fetching corpus: 1499, signal 146172/178357 (executing program) 1970/01/01 00:08:19 fetching corpus: 1549, signal 148520/181235 (executing program) 1970/01/01 00:08:22 fetching corpus: 1599, signal 150188/183546 (executing program) [ 504.070069][ T2853] warn_alloc: 3 callbacks suppressed [ 504.070445][ T2853] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 504.098066][ T2853] CPU: 1 PID: 2853 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 504.099758][ T2853] Hardware name: riscv-virtio,qemu (DT) [ 504.100962][ T2853] Call Trace: [ 504.102154][ T2853] [] dump_backtrace+0x2e/0x3c [ 504.104371][ T2853] [] show_stack+0x34/0x40 [ 504.106016][ T2853] [] dump_stack_lvl+0xe0/0x14c [ 504.107653][ T2853] [] dump_stack+0x1c/0x24 [ 504.109278][ T2853] [] warn_alloc+0x168/0x22c [ 504.110809][ T2853] [] __vmalloc_node_range+0xb6c/0xdb4 [ 504.112563][ T2853] [] bpf_jit_alloc_exec+0x46/0x52 [ 504.114820][ T2853] [] bpf_jit_binary_alloc+0x96/0x13c [ 504.116529][ T2853] [] bpf_int_jit_compile+0x886/0xaa6 [ 504.118111][ T2853] [] bpf_prog_select_runtime+0x1a2/0x22e [ 504.119683][ T2853] [] bpf_migrate_filter+0x258/0x2be [ 504.121381][ T2853] [] bpf_prepare_filter+0x10e/0x1b4 [ 504.122978][ T2853] [] __get_filter+0x148/0x1a0 [ 504.125009][ T2853] [] sk_attach_filter+0x22/0x11a [ 504.128281][ T2853] [] sk_setsockopt+0x144e/0x270c [ 504.130211][ T2853] [] sock_setsockopt+0x48/0x58 [ 504.131972][ T2853] [] __sys_setsockopt+0x3f0/0x418 [ 504.133606][ T2853] [] sys_setsockopt+0x3a/0x4c [ 504.135314][ T2853] [] ret_from_syscall+0x0/0x2 [ 504.245191][ T2853] Mem-Info: [ 504.246657][ T2853] active_anon:10070 inactive_anon:44 isolated_anon:0 [ 504.246657][ T2853] active_file:0 inactive_file:7103 isolated_file:0 [ 504.246657][ T2853] unevictable:768 dirty:0 writeback:0 [ 504.246657][ T2853] slab_reclaimable:5332 slab_unreclaimable:18832 [ 504.246657][ T2853] mapped:4315 shmem:806 pagetables:131 [ 504.246657][ T2853] sec_pagetables:0 bounce:0 [ 504.246657][ T2853] kernel_misc_reclaimable:0 [ 504.246657][ T2853] free:269435 free_pcp:882 free_cma:4096 [ 504.250313][ T2853] Node 0 active_anon:40280kB inactive_anon:176kB active_file:0kB inactive_file:28412kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:17260kB dirty:0kB writeback:0kB shmem:3224kB writeback_tmp:0kB kernel_stack:4752kB pagetables:524kB sec_pagetables:0kB all_unreclaimable? no [ 504.253096][ T2853] Node 0 DMA32 free:1077740kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:40280kB inactive_anon:176kB active_file:0kB inactive_file:28412kB unevictable:3072kB writepending:0kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:3528kB local_pcp:884kB free_cma:16384kB [ 504.279323][ T2853] lowmem_reserve[]: 0 0 0 [ 504.281774][ T2853] Node 0 DMA32: 3*4kB (E) 14*8kB (UME) 27*16kB (UME) 38*32kB (UM) 6*64kB (UME) 1*128kB (E) 3*256kB (UME) 1*512kB (E) 1*1024kB (M) 4*2048kB (MEC) 260*4096kB (MC) = 1077740kB [ 504.311358][ T2853] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 504.315295][ T2853] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 504.326440][ T2853] 7909 total pagecache pages [ 504.350810][ T2853] 0 pages in swap cache [ 504.352196][ T2853] Free swap = 0kB [ 504.355555][ T2853] Total swap = 0kB [ 504.356782][ T2853] 523776 pages RAM [ 504.357866][ T2853] 0 pages HighMem/MovableOnly [ 504.359029][ T2853] 184025 pages reserved [ 504.360209][ T2853] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 1970/01/01 00:08:25 fetching corpus: 1649, signal 151454/185559 (executing program) 1970/01/01 00:08:27 fetching corpus: 1699, signal 152545/187437 (executing program) 1970/01/01 00:08:29 fetching corpus: 1749, signal 154552/190033 (executing program) 1970/01/01 00:08:31 fetching corpus: 1799, signal 156023/192163 (executing program) 1970/01/01 00:08:33 fetching corpus: 1848, signal 157198/194002 (executing program) 1970/01/01 00:08:35 fetching corpus: 1898, signal 158695/196079 (executing program) 1970/01/01 00:08:37 fetching corpus: 1948, signal 160009/198000 (executing program) 1970/01/01 00:08:39 fetching corpus: 1998, signal 161584/200069 (executing program) 1970/01/01 00:08:41 fetching corpus: 2048, signal 163276/202224 (executing program) 1970/01/01 00:08:42 fetching corpus: 2098, signal 164809/204242 (executing program) 1970/01/01 00:08:44 fetching corpus: 2148, signal 166200/206185 (executing program) 1970/01/01 00:08:46 fetching corpus: 2198, signal 167723/208220 (executing program) 1970/01/01 00:08:49 fetching corpus: 2248, signal 169018/209986 (executing program) 1970/01/01 00:08:50 fetching corpus: 2298, signal 170430/211860 (executing program) 1970/01/01 00:08:54 fetching corpus: 2348, signal 171574/213589 (executing program) 1970/01/01 00:08:56 fetching corpus: 2398, signal 172426/215038 (executing program) 1970/01/01 00:08:57 fetching corpus: 2446, signal 173400/216586 (executing program) 1970/01/01 00:09:01 fetching corpus: 2496, signal 174489/218164 (executing program) 1970/01/01 00:09:02 fetching corpus: 2544, signal 175269/219552 (executing program) 1970/01/01 00:09:04 fetching corpus: 2594, signal 176178/221034 (executing program) 1970/01/01 00:09:06 fetching corpus: 2644, signal 177315/222648 (executing program) 1970/01/01 00:09:08 fetching corpus: 2694, signal 178267/224087 (executing program) 1970/01/01 00:09:11 fetching corpus: 2744, signal 179900/225973 (executing program) 1970/01/01 00:09:12 fetching corpus: 2793, signal 180581/227235 (executing program) 1970/01/01 00:09:15 fetching corpus: 2843, signal 181442/228576 (executing program) 1970/01/01 00:09:17 fetching corpus: 2892, signal 182584/230053 (executing program) 1970/01/01 00:09:20 fetching corpus: 2942, signal 183572/231463 (executing program) 1970/01/01 00:09:22 fetching corpus: 2992, signal 184470/232805 (executing program) 1970/01/01 00:09:23 fetching corpus: 3042, signal 184955/233894 (executing program) 1970/01/01 00:09:25 fetching corpus: 3092, signal 185926/235229 (executing program) ps_root_recvmsgcb: failed to send message to pid 2854: Connection refused 1970/01/01 00:09:27 fetching corpus: 3142, signal 186678/236471 (executing program) ps_root_recvmsgcb: failed to send message to pid 2853: Connection refused ps_root_recvmsgcb: failed to send message to pid 2855: Connection refused ps_root_recvmsgcb: failed to send message to pid 2856: Connection refused 1970/01/01 00:09:30 fetching corpus: 3192, signal 187259/237582 (executing program) 1970/01/01 00:09:32 fetching corpus: 3242, signal 188442/239027 (executing program) 1970/01/01 00:09:35 fetching corpus: 3292, signal 189198/240229 (executing program) 1970/01/01 00:09:37 fetching corpus: 3342, signal 189954/241364 (executing program) 1970/01/01 00:09:39 fetching corpus: 3391, signal 190900/242664 (executing program) 1970/01/01 00:09:41 fetching corpus: 3440, signal 191611/243784 (executing program) 1970/01/01 00:09:42 fetching corpus: 3490, signal 192638/245060 (executing program) 1970/01/01 00:09:45 fetching corpus: 3540, signal 193605/246290 (executing program) 1970/01/01 00:09:47 fetching corpus: 3589, signal 194424/247457 (executing program) 1970/01/01 00:09:49 fetching corpus: 3638, signal 195415/248681 (executing program) 1970/01/01 00:09:51 fetching corpus: 3687, signal 196338/249843 (executing program) 1970/01/01 00:09:53 fetching corpus: 3737, signal 197077/250895 (executing program) 1970/01/01 00:09:55 fetching corpus: 3787, signal 198626/252372 (executing program) 1970/01/01 00:09:57 fetching corpus: 3837, signal 199624/253620 (executing program) 1970/01/01 00:09:59 fetching corpus: 3887, signal 200600/254788 (executing program) 1970/01/01 00:10:00 fetching corpus: 3937, signal 201489/255898 (executing program) 1970/01/01 00:10:02 fetching corpus: 3987, signal 202528/257048 (executing program) 1970/01/01 00:10:04 fetching corpus: 4037, signal 203324/258131 (executing program) 1970/01/01 00:10:06 fetching corpus: 4086, signal 204155/259170 (executing program) 1970/01/01 00:10:08 fetching corpus: 4135, signal 204850/260199 (executing program) 1970/01/01 00:10:10 fetching corpus: 4184, signal 205626/261157 (executing program) 1970/01/01 00:10:12 fetching corpus: 4234, signal 206435/262191 (executing program) 1970/01/01 00:10:13 fetching corpus: 4284, signal 207416/263255 (executing program) 1970/01/01 00:10:15 fetching corpus: 4334, signal 208161/264198 (executing program) 1970/01/01 00:10:17 fetching corpus: 4383, signal 208845/265150 (executing program) 1970/01/01 00:10:20 fetching corpus: 4433, signal 209360/265973 (executing program) 1970/01/01 00:10:22 fetching corpus: 4483, signal 210201/266933 (executing program) 1970/01/01 00:10:24 fetching corpus: 4533, signal 210997/267901 (executing program) 1970/01/01 00:10:27 fetching corpus: 4582, signal 211646/268789 (executing program) 1970/01/01 00:10:29 fetching corpus: 4632, signal 212159/269608 (executing program) [ 631.835943][ T2857] warn_alloc: 3 callbacks suppressed [ 631.836181][ T2857] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 631.859149][ T2857] CPU: 0 PID: 2857 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 631.860189][ T2857] Hardware name: riscv-virtio,qemu (DT) [ 631.860888][ T2857] Call Trace: [ 631.861560][ T2857] [] dump_backtrace+0x2e/0x3c [ 631.862683][ T2857] [] show_stack+0x34/0x40 [ 631.864058][ T2857] [] dump_stack_lvl+0xe0/0x14c [ 631.865250][ T2857] [] dump_stack+0x1c/0x24 [ 631.866312][ T2857] [] warn_alloc+0x168/0x22c [ 631.867251][ T2857] [] __vmalloc_node_range+0xb6c/0xdb4 [ 631.868261][ T2857] [] bpf_jit_alloc_exec+0x46/0x52 [ 631.869152][ T2857] [] bpf_jit_binary_alloc+0x96/0x13c [ 631.870091][ T2857] [] bpf_int_jit_compile+0x886/0xaa6 [ 631.871006][ T2857] [] bpf_prog_select_runtime+0x1a2/0x22e [ 631.871978][ T2857] [] bpf_migrate_filter+0x258/0x2be [ 631.873015][ T2857] [] bpf_prepare_filter+0x10e/0x1b4 [ 631.874452][ T2857] [] __get_filter+0x148/0x1a0 [ 631.875764][ T2857] [] sk_attach_filter+0x22/0x11a [ 631.877082][ T2857] [] sk_setsockopt+0x144e/0x270c [ 631.878256][ T2857] [] sock_setsockopt+0x48/0x58 [ 631.879369][ T2857] [] __sys_setsockopt+0x3f0/0x418 [ 631.880455][ T2857] [] sys_setsockopt+0x3a/0x4c [ 631.881549][ T2857] [] ret_from_syscall+0x0/0x2 [ 631.959315][ T2857] Mem-Info: [ 631.960559][ T2857] active_anon:13965 inactive_anon:46 isolated_anon:0 [ 631.960559][ T2857] active_file:0 inactive_file:7107 isolated_file:0 [ 631.960559][ T2857] unevictable:768 dirty:0 writeback:0 [ 631.960559][ T2857] slab_reclaimable:5187 slab_unreclaimable:19623 [ 631.960559][ T2857] mapped:4331 shmem:808 pagetables:146 [ 631.960559][ T2857] sec_pagetables:0 bounce:0 [ 631.960559][ T2857] kernel_misc_reclaimable:0 [ 631.960559][ T2857] free:265235 free_pcp:620 free_cma:4096 [ 631.966175][ T2857] Node 0 active_anon:55860kB inactive_anon:184kB active_file:0kB inactive_file:28428kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:17324kB dirty:0kB writeback:0kB shmem:3232kB writeback_tmp:0kB kernel_stack:4760kB pagetables:584kB sec_pagetables:0kB all_unreclaimable? no [ 632.008900][ T2857] Node 0 DMA32 free:1060940kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:55860kB inactive_anon:184kB active_file:0kB inactive_file:28428kB unevictable:3072kB writepending:0kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:2456kB local_pcp:1036kB free_cma:16384kB [ 632.011806][ T2857] lowmem_reserve[]: 0 0 0 [ 632.037955][ T2857] Node 0 DMA32: 133*4kB (UE) 25*8kB (UME) 35*16kB (UME) 26*32kB (UME) 6*64kB (UME) 3*128kB (UE) 1*256kB (E) 2*512kB (ME) 0*1024kB 4*2048kB (UEC) 256*4096kB (MC) = 1060940kB [ 632.095886][ T2857] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 632.097712][ T2857] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 632.099147][ T2857] 7915 total pagecache pages [ 632.100241][ T2857] 0 pages in swap cache [ 632.101303][ T2857] Free swap = 0kB [ 632.102328][ T2857] Total swap = 0kB [ 632.129115][ T2857] 523776 pages RAM [ 632.136144][ T2857] 0 pages HighMem/MovableOnly [ 632.137606][ T2857] 184025 pages reserved [ 632.138691][ T2857] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 1970/01/01 00:10:32 fetching corpus: 4681, signal 212883/270485 (executing program) ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 1970/01/01 00:10:35 fetching corpus: 4731, signal 213573/271358 (executing program) 1970/01/01 00:10:38 fetching corpus: 4781, signal 214373/272291 (executing program) 1970/01/01 00:10:40 fetching corpus: 4830, signal 215203/273200 (executing program) 1970/01/01 00:10:41 fetching corpus: 4879, signal 215568/273911 (executing program) 1970/01/01 00:10:44 fetching corpus: 4929, signal 216160/274683 (executing program) 1970/01/01 00:10:45 fetching corpus: 4979, signal 216855/275495 (executing program) 1970/01/01 00:10:48 fetching corpus: 5029, signal 217505/276313 (executing program) 1970/01/01 00:10:51 fetching corpus: 5079, signal 218262/277099 (executing program) 1970/01/01 00:10:53 fetching corpus: 5129, signal 219208/277967 (executing program) 1970/01/01 00:10:55 fetching corpus: 5179, signal 219733/278723 (executing program) 1970/01/01 00:10:57 fetching corpus: 5229, signal 220289/279446 (executing program) 1970/01/01 00:10:59 fetching corpus: 5278, signal 220978/280216 (executing program) 1970/01/01 00:11:01 fetching corpus: 5328, signal 221563/280948 (executing program) 1970/01/01 00:11:02 fetching corpus: 5378, signal 222312/281725 (executing program) 1970/01/01 00:11:04 fetching corpus: 5427, signal 222848/282411 (executing program) 1970/01/01 00:11:05 fetching corpus: 5477, signal 223426/283151 (executing program) 1970/01/01 00:11:07 fetching corpus: 5527, signal 223926/283812 (executing program) 1970/01/01 00:11:09 fetching corpus: 5577, signal 224484/284514 (executing program) 1970/01/01 00:11:11 fetching corpus: 5627, signal 225009/285201 (executing program) 1970/01/01 00:11:13 fetching corpus: 5677, signal 225865/285950 (executing program) 1970/01/01 00:11:15 fetching corpus: 5726, signal 226497/286601 (executing program) 1970/01/01 00:11:17 fetching corpus: 5775, signal 226955/287264 (executing program) 1970/01/01 00:11:19 fetching corpus: 5825, signal 227713/287996 (executing program) 1970/01/01 00:11:21 fetching corpus: 5874, signal 228300/288668 (executing program) 1970/01/01 00:11:23 fetching corpus: 5924, signal 228977/289297 (executing program) 1970/01/01 00:11:25 fetching corpus: 5974, signal 229515/289905 (executing program) 1970/01/01 00:11:27 fetching corpus: 6023, signal 230083/290486 (executing program) 1970/01/01 00:11:28 fetching corpus: 6073, signal 230593/291103 (executing program) 1970/01/01 00:11:31 fetching corpus: 6123, signal 231189/291693 (executing program) 1970/01/01 00:11:34 fetching corpus: 6172, signal 231860/292293 (executing program) ps_root_recvmsgcb: failed to send message to pid 2858: Connection refused ps_root_recvmsgcb: failed to send message to pid 2857: Connection refused ps_root_recvmsgcb: failed to send message to pid 2859: Connection refused ps_root_recvmsgcb: failed to send message to pid 2860: Connection refused 1970/01/01 00:11:37 fetching corpus: 6222, signal 232451/292882 (executing program) 1970/01/01 00:11:39 fetching corpus: 6272, signal 233096/293450 (executing program) 1970/01/01 00:11:41 fetching corpus: 6322, signal 233854/294050 (executing program) 1970/01/01 00:11:43 fetching corpus: 6372, signal 234350/294616 (executing program) 1970/01/01 00:11:44 fetching corpus: 6422, signal 234785/295149 (executing program) 1970/01/01 00:11:46 fetching corpus: 6471, signal 235185/295671 (executing program) 1970/01/01 00:11:47 fetching corpus: 6521, signal 235712/296278 (executing program) 1970/01/01 00:11:49 fetching corpus: 6570, signal 236213/296768 (executing program) 1970/01/01 00:11:51 fetching corpus: 6620, signal 236714/297268 (executing program) 1970/01/01 00:11:53 fetching corpus: 6670, signal 237497/297813 (executing program) 1970/01/01 00:11:56 fetching corpus: 6720, signal 237946/298334 (executing program) 1970/01/01 00:11:57 fetching corpus: 6768, signal 238423/298815 (executing program) 1970/01/01 00:11:59 fetching corpus: 6817, signal 238784/299276 (executing program) 1970/01/01 00:12:01 fetching corpus: 6867, signal 239801/299828 (executing program) 1970/01/01 00:12:02 fetching corpus: 6917, signal 240253/300262 (executing program) 1970/01/01 00:12:04 fetching corpus: 6967, signal 240756/300715 (executing program) 1970/01/01 00:12:06 fetching corpus: 7016, signal 241089/301164 (executing program) 1970/01/01 00:12:08 fetching corpus: 7066, signal 241586/301622 (executing program) 1970/01/01 00:12:09 fetching corpus: 7115, signal 242222/302088 (executing program) 1970/01/01 00:12:12 fetching corpus: 7165, signal 242774/302506 (executing program) 1970/01/01 00:12:15 fetching corpus: 7214, signal 243158/302970 (executing program) 1970/01/01 00:12:17 fetching corpus: 7264, signal 243669/303383 (executing program) 1970/01/01 00:12:18 fetching corpus: 7314, signal 244295/303811 (executing program) 1970/01/01 00:12:20 fetching corpus: 7363, signal 244871/304231 (executing program) 1970/01/01 00:12:22 fetching corpus: 7413, signal 245303/304646 (executing program) 1970/01/01 00:12:24 fetching corpus: 7463, signal 245679/305026 (executing program) 1970/01/01 00:12:26 fetching corpus: 7513, signal 246233/305417 (executing program) 1970/01/01 00:12:28 fetching corpus: 7563, signal 246871/305720 (executing program) 1970/01/01 00:12:30 fetching corpus: 7612, signal 247295/305720 (executing program) 1970/01/01 00:12:33 fetching corpus: 7662, signal 247676/305720 (executing program) 1970/01/01 00:12:36 fetching corpus: 7712, signal 248037/305720 (executing program) [ 759.266940][ T2862] warn_alloc: 3 callbacks suppressed [ 759.267316][ T2862] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 759.272231][ T2862] CPU: 1 PID: 2862 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 759.274211][ T2862] Hardware name: riscv-virtio,qemu (DT) [ 759.275824][ T2862] Call Trace: [ 759.276904][ T2862] [] dump_backtrace+0x2e/0x3c [ 759.278539][ T2862] [] show_stack+0x34/0x40 [ 759.280186][ T2862] [] dump_stack_lvl+0xe0/0x14c [ 759.281808][ T2862] [] dump_stack+0x1c/0x24 [ 759.283431][ T2862] [] warn_alloc+0x168/0x22c [ 759.285410][ T2862] [] __vmalloc_node_range+0xb6c/0xdb4 [ 759.287071][ T2862] [] bpf_jit_alloc_exec+0x46/0x52 [ 759.288557][ T2862] [] bpf_jit_binary_alloc+0x96/0x13c [ 759.290158][ T2862] [] bpf_int_jit_compile+0x886/0xaa6 [ 759.291704][ T2862] [] bpf_prog_select_runtime+0x1a2/0x22e [ 759.293366][ T2862] [] bpf_migrate_filter+0x258/0x2be [ 759.295509][ T2862] [] bpf_prepare_filter+0x10e/0x1b4 [ 759.297239][ T2862] [] __get_filter+0x148/0x1a0 [ 759.300076][ T2862] [] sk_attach_filter+0x22/0x11a [ 759.301613][ T2862] [] sk_setsockopt+0x144e/0x270c [ 759.303240][ T2862] [] sock_setsockopt+0x48/0x58 [ 759.306941][ T2862] [] __sys_setsockopt+0x3f0/0x418 [ 759.310694][ T2862] [] sys_setsockopt+0x3a/0x4c [ 759.314404][ T2862] [] ret_from_syscall+0x0/0x2 [ 759.435619][ T2862] Mem-Info: [ 759.437105][ T2862] active_anon:17821 inactive_anon:47 isolated_anon:0 [ 759.437105][ T2862] active_file:0 inactive_file:7111 isolated_file:0 [ 759.437105][ T2862] unevictable:768 dirty:0 writeback:0 [ 759.437105][ T2862] slab_reclaimable:5168 slab_unreclaimable:19528 [ 759.437105][ T2862] mapped:4331 shmem:809 pagetables:146 [ 759.437105][ T2862] sec_pagetables:0 bounce:0 [ 759.437105][ T2862] kernel_misc_reclaimable:0 [ 759.437105][ T2862] free:261402 free_pcp:636 free_cma:4096 [ 759.440894][ T2862] Node 0 active_anon:71284kB inactive_anon:188kB active_file:0kB inactive_file:28444kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:17324kB dirty:0kB writeback:0kB shmem:3236kB writeback_tmp:0kB kernel_stack:4592kB pagetables:584kB sec_pagetables:0kB all_unreclaimable? no [ 759.475115][ T2862] Node 0 DMA32 free:1045608kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:71284kB inactive_anon:188kB active_file:0kB inactive_file:28444kB unevictable:3072kB writepending:0kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:2544kB local_pcp:632kB free_cma:16384kB [ 759.479146][ T2862] lowmem_reserve[]: 0 0 0 [ 759.481882][ T2862] Node 0 DMA32: 150*4kB (UE) 72*8kB (UE) 23*16kB (UME) 35*32kB (UME) 6*64kB (UE) 1*128kB (E) 2*256kB (UE) 3*512kB (UME) 2*1024kB (UM) 3*2048kB (EC) 252*4096kB (MC) = 1045608kB [ 759.529840][ T2862] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 759.531523][ T2862] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 759.533141][ T2862] 7920 total pagecache pages [ 759.558025][ T2862] 0 pages in swap cache [ 759.559304][ T2862] Free swap = 0kB [ 759.560518][ T2862] Total swap = 0kB [ 759.561756][ T2862] 523776 pages RAM [ 759.562981][ T2862] 0 pages HighMem/MovableOnly [ 759.594898][ T2862] 184025 pages reserved [ 759.596609][ T2862] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 1970/01/01 00:12:40 fetching corpus: 7762, signal 248374/305720 (executing program) ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 1970/01/01 00:12:43 fetching corpus: 7811, signal 248891/305720 (executing program) 1970/01/01 00:12:45 fetching corpus: 7860, signal 249340/305723 (executing program) 1970/01/01 00:12:47 fetching corpus: 7910, signal 249749/305723 (executing program) 1970/01/01 00:12:49 fetching corpus: 7960, signal 250071/305723 (executing program) 1970/01/01 00:12:51 fetching corpus: 8010, signal 250971/305725 (executing program) 1970/01/01 00:12:53 fetching corpus: 8059, signal 251392/305725 (executing program) 1970/01/01 00:12:54 fetching corpus: 8109, signal 251736/305725 (executing program) 1970/01/01 00:12:56 fetching corpus: 8159, signal 251975/305725 (executing program) 1970/01/01 00:12:58 fetching corpus: 8209, signal 252503/305725 (executing program) 1970/01/01 00:13:00 fetching corpus: 8259, signal 252861/305725 (executing program) 1970/01/01 00:13:02 fetching corpus: 8309, signal 253275/305725 (executing program) 1970/01/01 00:13:04 fetching corpus: 8358, signal 253663/305727 (executing program) 1970/01/01 00:13:06 fetching corpus: 8408, signal 254127/305728 (executing program) 1970/01/01 00:13:07 fetching corpus: 8458, signal 254517/305730 (executing program) 1970/01/01 00:13:09 fetching corpus: 8508, signal 254911/305730 (executing program) 1970/01/01 00:13:10 fetching corpus: 8557, signal 255350/305730 (executing program) 1970/01/01 00:13:12 fetching corpus: 8607, signal 255694/305730 (executing program) 1970/01/01 00:13:14 fetching corpus: 8657, signal 256122/305730 (executing program) 1970/01/01 00:13:16 fetching corpus: 8707, signal 256486/305730 (executing program) 1970/01/01 00:13:18 fetching corpus: 8757, signal 256906/305752 (executing program) 1970/01/01 00:13:21 fetching corpus: 8807, signal 257581/305752 (executing program) 1970/01/01 00:13:23 fetching corpus: 8856, signal 257943/305752 (executing program) 1970/01/01 00:13:25 fetching corpus: 8906, signal 258403/305757 (executing program) 1970/01/01 00:13:27 fetching corpus: 8956, signal 258874/305757 (executing program) 1970/01/01 00:13:29 fetching corpus: 9004, signal 259389/305757 (executing program) 1970/01/01 00:13:30 fetching corpus: 9053, signal 259776/305757 (executing program) 1970/01/01 00:13:34 fetching corpus: 9103, signal 260265/305761 (executing program) 1970/01/01 00:13:37 fetching corpus: 9153, signal 260825/305763 (executing program) 1970/01/01 00:13:41 fetching corpus: 9203, signal 261372/305763 (executing program) 1970/01/01 00:13:42 fetching corpus: 9251, signal 261736/305763 (executing program) ps_root_recvmsgcb: failed to send message to pid 2862: Connection refused ps_root_recvmsgcb: failed to send message to pid 2864: Connection refused ps_root_recvmsgcb: failed to send message to pid 2865: Connection refused 1970/01/01 00:13:44 fetching corpus: 9301, signal 262075/305765 (executing program) ps_root_recvmsgcb: failed to send message to pid 2866: Connection refused 1970/01/01 00:13:46 fetching corpus: 9351, signal 262495/305765 (executing program) 1970/01/01 00:13:48 fetching corpus: 9401, signal 262787/305765 (executing program) 1970/01/01 00:13:49 fetching corpus: 9451, signal 263341/305766 (executing program) 1970/01/01 00:13:51 fetching corpus: 9501, signal 263635/305766 (executing program) 1970/01/01 00:13:53 fetching corpus: 9550, signal 263985/305775 (executing program) 1970/01/01 00:13:55 fetching corpus: 9599, signal 264380/305775 (executing program) 1970/01/01 00:13:57 fetching corpus: 9649, signal 264916/305775 (executing program) 1970/01/01 00:13:59 fetching corpus: 9698, signal 265306/305775 (executing program) 1970/01/01 00:14:01 fetching corpus: 9747, signal 265856/305777 (executing program) 1970/01/01 00:14:04 fetching corpus: 9797, signal 266209/305777 (executing program) 1970/01/01 00:14:05 fetching corpus: 9846, signal 266569/305777 (executing program) 1970/01/01 00:14:07 fetching corpus: 9896, signal 266912/305777 (executing program) 1970/01/01 00:14:09 fetching corpus: 9945, signal 267272/305791 (executing program) 1970/01/01 00:14:12 fetching corpus: 9995, signal 267749/305796 (executing program) 1970/01/01 00:14:14 fetching corpus: 10044, signal 268181/305796 (executing program) 1970/01/01 00:14:16 fetching corpus: 10092, signal 268648/305796 (executing program) 1970/01/01 00:14:17 fetching corpus: 10142, signal 269120/305796 (executing program) 1970/01/01 00:14:18 fetching corpus: 10191, signal 269394/305796 (executing program) 1970/01/01 00:14:20 fetching corpus: 10241, signal 269776/305796 (executing program) 1970/01/01 00:14:23 fetching corpus: 10291, signal 270070/305796 (executing program) 1970/01/01 00:14:25 fetching corpus: 10341, signal 270455/305796 (executing program) 1970/01/01 00:14:26 fetching corpus: 10391, signal 270891/305796 (executing program) 1970/01/01 00:14:29 fetching corpus: 10441, signal 271251/305799 (executing program) 1970/01/01 00:14:31 fetching corpus: 10491, signal 271648/305799 (executing program) 1970/01/01 00:14:33 fetching corpus: 10540, signal 271907/305799 (executing program) 1970/01/01 00:14:35 fetching corpus: 10588, signal 272181/305799 (executing program) 1970/01/01 00:14:38 fetching corpus: 10638, signal 272518/305799 (executing program) 1970/01/01 00:14:40 fetching corpus: 10688, signal 272841/305799 (executing program) 1970/01/01 00:14:43 fetching corpus: 10738, signal 273240/305799 (executing program) 1970/01/01 00:14:44 fetching corpus: 10786, signal 273532/305799 (executing program) 1970/01/01 00:14:47 fetching corpus: 10836, signal 273818/305803 (executing program) [ 887.888829][ T2867] warn_alloc: 3 callbacks suppressed [ 887.889170][ T2867] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 887.896097][ T2867] CPU: 0 PID: 2867 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 887.897856][ T2867] Hardware name: riscv-virtio,qemu (DT) [ 887.899268][ T2867] Call Trace: [ 887.900278][ T2867] [] dump_backtrace+0x2e/0x3c [ 887.901942][ T2867] [] show_stack+0x34/0x40 [ 887.903529][ T2867] [] dump_stack_lvl+0xe0/0x14c [ 887.905034][ T2867] [] dump_stack+0x1c/0x24 [ 887.906386][ T2867] [] warn_alloc+0x168/0x22c [ 887.907698][ T2867] [] __vmalloc_node_range+0xb6c/0xdb4 [ 887.908905][ T2867] [] bpf_jit_alloc_exec+0x46/0x52 [ 887.910055][ T2867] [] bpf_jit_binary_alloc+0x96/0x13c [ 887.911187][ T2867] [] bpf_int_jit_compile+0x886/0xaa6 [ 887.912345][ T2867] [] bpf_prog_select_runtime+0x1a2/0x22e [ 887.913865][ T2867] [] bpf_migrate_filter+0x258/0x2be [ 887.916036][ T2867] [] bpf_prepare_filter+0x10e/0x1b4 [ 887.917318][ T2867] [] __get_filter+0x148/0x1a0 [ 887.918519][ T2867] [] sk_attach_filter+0x22/0x11a [ 887.919649][ T2867] [] sk_setsockopt+0x144e/0x270c [ 887.920850][ T2867] [] sock_setsockopt+0x48/0x58 [ 887.922037][ T2867] [] __sys_setsockopt+0x3f0/0x418 [ 887.923113][ T2867] [] sys_setsockopt+0x3a/0x4c [ 887.924997][ T2867] [] ret_from_syscall+0x0/0x2 [ 887.967143][ T2867] Mem-Info: [ 887.968599][ T2867] active_anon:21020 inactive_anon:49 isolated_anon:0 [ 887.968599][ T2867] active_file:0 inactive_file:7115 isolated_file:0 [ 887.968599][ T2867] unevictable:768 dirty:0 writeback:0 [ 887.968599][ T2867] slab_reclaimable:5168 slab_unreclaimable:19772 [ 887.968599][ T2867] mapped:4331 shmem:811 pagetables:160 [ 887.968599][ T2867] sec_pagetables:0 bounce:0 [ 887.968599][ T2867] kernel_misc_reclaimable:0 [ 887.968599][ T2867] free:257783 free_pcp:801 free_cma:4096 [ 887.972011][ T2867] Node 0 active_anon:84080kB inactive_anon:196kB active_file:0kB inactive_file:28460kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:17324kB dirty:0kB writeback:0kB shmem:3244kB writeback_tmp:0kB kernel_stack:4632kB pagetables:640kB sec_pagetables:0kB all_unreclaimable? no [ 888.032456][ T2867] Node 0 DMA32 free:1031132kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:84080kB inactive_anon:196kB active_file:0kB inactive_file:28460kB unevictable:3072kB writepending:0kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:3088kB local_pcp:1096kB free_cma:16384kB [ 888.039404][ T2867] lowmem_reserve[]: 0 0 0 [ 888.042378][ T2867] Node 0 DMA32: 151*4kB (UME) 12*8kB (ME) 22*16kB (UME) 2*32kB (ME) 6*64kB (UME) 2*128kB (ME) 3*256kB (UME) 3*512kB (UME) 1*1024kB (U) 3*2048kB (EC) 249*4096kB (MC) = 1031132kB [ 888.084765][ T2867] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 888.086626][ T2867] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 888.087649][ T2867] 7926 total pagecache pages [ 888.088467][ T2867] 0 pages in swap cache [ 888.089545][ T2867] Free swap = 0kB [ 888.090661][ T2867] Total swap = 0kB [ 888.091800][ T2867] 523776 pages RAM [ 888.092941][ T2867] 0 pages HighMem/MovableOnly [ 888.144657][ T2867] 184025 pages reserved [ 888.145929][ T2867] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 1970/01/01 00:14:49 fetching corpus: 10886, signal 274166/305803 (executing program) ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 1970/01/01 00:14:51 fetching corpus: 10936, signal 274479/305803 (executing program) 1970/01/01 00:14:53 fetching corpus: 10986, signal 274843/305803 (executing program) 1970/01/01 00:14:55 fetching corpus: 11036, signal 275142/305810 (executing program) 1970/01/01 00:14:56 fetching corpus: 11086, signal 275486/305810 (executing program) 1970/01/01 00:14:58 fetching corpus: 11136, signal 275781/305810 (executing program) 1970/01/01 00:15:00 fetching corpus: 11184, signal 276059/305810 (executing program) 1970/01/01 00:15:01 fetching corpus: 11234, signal 276355/305810 (executing program) 1970/01/01 00:15:04 fetching corpus: 11284, signal 276714/305810 (executing program) 1970/01/01 00:15:06 fetching corpus: 11332, signal 277027/305818 (executing program) 1970/01/01 00:15:08 fetching corpus: 11382, signal 277449/305818 (executing program) 1970/01/01 00:15:10 fetching corpus: 11432, signal 277807/305818 (executing program) 1970/01/01 00:15:11 fetching corpus: 11481, signal 278119/305818 (executing program) 1970/01/01 00:15:13 fetching corpus: 11530, signal 278547/305824 (executing program) 1970/01/01 00:15:16 fetching corpus: 11580, signal 278867/305824 (executing program) 1970/01/01 00:15:17 fetching corpus: 11630, signal 279223/305824 (executing program) 1970/01/01 00:15:19 fetching corpus: 11680, signal 279676/305824 (executing program) 1970/01/01 00:15:21 fetching corpus: 11730, signal 279999/305829 (executing program) 1970/01/01 00:15:23 fetching corpus: 11780, signal 280325/305833 (executing program) 1970/01/01 00:15:25 fetching corpus: 11830, signal 280786/305833 (executing program) 1970/01/01 00:15:27 fetching corpus: 11879, signal 281061/305833 (executing program) 1970/01/01 00:15:30 fetching corpus: 11929, signal 281292/305833 (executing program) 1970/01/01 00:15:33 fetching corpus: 11978, signal 281600/305833 (executing program) 1970/01/01 00:15:36 fetching corpus: 12027, signal 281828/305833 (executing program) 1970/01/01 00:15:38 fetching corpus: 12076, signal 282166/305833 (executing program) 1970/01/01 00:15:41 fetching corpus: 12126, signal 282505/305833 (executing program) 1970/01/01 00:15:45 fetching corpus: 12176, signal 282931/305834 (executing program) 1970/01/01 00:15:47 fetching corpus: 12226, signal 283257/305834 (executing program) 1970/01/01 00:15:48 fetching corpus: 12274, signal 283554/305834 (executing program) ps_root_recvmsgcb: failed to send message to pid 2867: Connection refused 1970/01/01 00:15:51 fetching corpus: 12322, signal 283930/305835 (executing program) ps_root_recvmsgcb: failed to send message to pid 2869: Connection refused ps_root_recvmsgcb: failed to send message to pid 2868: Connection refused ps_root_recvmsgcb: failed to send message to pid 2870: Connection refused 1970/01/01 00:15:53 fetching corpus: 12372, signal 284295/305835 (executing program) 1970/01/01 00:15:55 fetching corpus: 12421, signal 285041/305835 (executing program) 1970/01/01 00:15:57 fetching corpus: 12470, signal 285405/305835 (executing program) 1970/01/01 00:15:59 fetching corpus: 12520, signal 285687/305835 (executing program) 1970/01/01 00:16:00 fetching corpus: 12570, signal 285941/305835 (executing program) 1970/01/01 00:16:02 fetching corpus: 12618, signal 286215/305835 (executing program) 1970/01/01 00:16:03 fetching corpus: 12668, signal 286614/305835 (executing program) 1970/01/01 00:16:05 fetching corpus: 12718, signal 286886/305835 (executing program) 1970/01/01 00:16:07 fetching corpus: 12768, signal 287209/305835 (executing program) 1970/01/01 00:16:09 fetching corpus: 12817, signal 287561/305839 (executing program) 1970/01/01 00:16:12 fetching corpus: 12867, signal 287901/305839 (executing program) 1970/01/01 00:16:13 fetching corpus: 12917, signal 288134/305839 (executing program) 1970/01/01 00:16:16 fetching corpus: 12967, signal 288442/305839 (executing program) 1970/01/01 00:16:19 fetching corpus: 13017, signal 288730/305839 (executing program) 1970/01/01 00:16:20 fetching corpus: 13067, signal 288965/305839 (executing program) 1970/01/01 00:16:22 fetching corpus: 13117, signal 289276/305839 (executing program) 1970/01/01 00:16:24 fetching corpus: 13165, signal 289618/305841 (executing program) 1970/01/01 00:16:25 fetching corpus: 13215, signal 289875/305841 (executing program) 1970/01/01 00:16:28 fetching corpus: 13265, signal 290237/305841 (executing program) 1970/01/01 00:16:30 fetching corpus: 13313, signal 290577/305843 (executing program) 1970/01/01 00:16:32 fetching corpus: 13363, signal 290921/305845 (executing program) 1970/01/01 00:16:34 fetching corpus: 13412, signal 291187/305845 (executing program) 1970/01/01 00:16:37 fetching corpus: 13462, signal 291523/305845 (executing program) 1970/01/01 00:16:40 fetching corpus: 13512, signal 291826/305845 (executing program) 1970/01/01 00:16:43 fetching corpus: 13562, signal 292088/305845 (executing program) 1970/01/01 00:16:46 fetching corpus: 13610, signal 292299/305847 (executing program) 1970/01/01 00:16:50 fetching corpus: 13660, signal 292565/305847 (executing program) 1970/01/01 00:16:52 fetching corpus: 13709, signal 292843/305847 (executing program) 1970/01/01 00:16:54 fetching corpus: 13758, signal 293253/305847 (executing program) [ 1016.059094][ T2877] warn_alloc: 3 callbacks suppressed [ 1016.059462][ T2877] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 1016.140265][ T2877] CPU: 0 PID: 2877 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 1016.143049][ T2877] Hardware name: riscv-virtio,qemu (DT) [ 1016.144800][ T2877] Call Trace: [ 1016.146147][ T2877] [] dump_backtrace+0x2e/0x3c [ 1016.147964][ T2877] [] show_stack+0x34/0x40 [ 1016.150186][ T2877] [] dump_stack_lvl+0xe0/0x14c [ 1016.151955][ T2877] [] dump_stack+0x1c/0x24 [ 1016.153731][ T2877] [] warn_alloc+0x168/0x22c [ 1016.155882][ T2877] [] __vmalloc_node_range+0xb6c/0xdb4 [ 1016.157606][ T2877] [] bpf_jit_alloc_exec+0x46/0x52 [ 1016.159165][ T2877] [] bpf_jit_binary_alloc+0x96/0x13c [ 1016.160737][ T2877] [] bpf_int_jit_compile+0x886/0xaa6 [ 1016.162302][ T2877] [] bpf_prog_select_runtime+0x1a2/0x22e [ 1016.164153][ T2877] [] bpf_migrate_filter+0x258/0x2be [ 1016.165901][ T2877] [] bpf_prepare_filter+0x10e/0x1b4 [ 1016.167569][ T2877] [] __get_filter+0x148/0x1a0 [ 1016.169248][ T2877] [] sk_attach_filter+0x22/0x11a [ 1016.170750][ T2877] [] sk_setsockopt+0x144e/0x270c [ 1016.172393][ T2877] [] sock_setsockopt+0x48/0x58 [ 1016.176040][ T2877] [] __sys_setsockopt+0x3f0/0x418 [ 1016.177738][ T2877] [] sys_setsockopt+0x3a/0x4c [ 1016.179376][ T2877] [] ret_from_syscall+0x0/0x2 [ 1016.324679][ T2877] Mem-Info: [ 1016.326549][ T2877] active_anon:23926 inactive_anon:51 isolated_anon:0 [ 1016.326549][ T2877] active_file:0 inactive_file:7125 isolated_file:0 [ 1016.326549][ T2877] unevictable:768 dirty:10 writeback:0 [ 1016.326549][ T2877] slab_reclaimable:5168 slab_unreclaimable:19009 [ 1016.326549][ T2877] mapped:4347 shmem:813 pagetables:166 [ 1016.326549][ T2877] sec_pagetables:0 bounce:0 [ 1016.326549][ T2877] kernel_misc_reclaimable:0 [ 1016.326549][ T2877] free:255778 free_pcp:652 free_cma:4096 [ 1016.331301][ T2877] Node 0 active_anon:95704kB inactive_anon:204kB active_file:0kB inactive_file:28500kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:17388kB dirty:40kB writeback:0kB shmem:3252kB writeback_tmp:0kB kernel_stack:4656kB pagetables:664kB sec_pagetables:0kB all_unreclaimable? no [ 1016.366660][ T2877] Node 0 DMA32 free:1023112kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:95704kB inactive_anon:204kB active_file:0kB inactive_file:28500kB unevictable:3072kB writepending:40kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:2604kB local_pcp:1240kB free_cma:16384kB [ 1016.371455][ T2877] lowmem_reserve[]: 0 0 0 [ 1016.399852][ T2877] Node 0 DMA32: 358*4kB (UME) 20*8kB (UME) 33*16kB (UE) 70*32kB (UE) 14*64kB (UME) 2*128kB (ME) 3*256kB (UME) 2*512kB (UE) 2*1024kB (UM) 3*2048kB (EC) 246*4096kB (MC) = 1023112kB [ 1016.465156][ T2877] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1016.467232][ T2877] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 1016.468604][ T2877] 7938 total pagecache pages [ 1016.469617][ T2877] 0 pages in swap cache [ 1016.470561][ T2877] Free swap = 0kB [ 1016.471470][ T2877] Total swap = 0kB [ 1016.472388][ T2877] 523776 pages RAM [ 1016.498706][ T2877] 0 pages HighMem/MovableOnly [ 1016.500194][ T2877] 184025 pages reserved [ 1016.501398][ T2877] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 1970/01/01 00:16:56 fetching corpus: 13808, signal 293423/305847 (executing program) ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 1970/01/01 00:16:58 fetching corpus: 13857, signal 293750/305848 (executing program) 1970/01/01 00:17:00 fetching corpus: 13906, signal 294016/305850 (executing program) 1970/01/01 00:17:02 fetching corpus: 13956, signal 294377/305850 (executing program) 1970/01/01 00:17:05 fetching corpus: 14006, signal 294779/305850 (executing program) 1970/01/01 00:17:08 fetching corpus: 14056, signal 295081/305850 (executing program) 1970/01/01 00:17:10 fetching corpus: 14106, signal 295349/305854 (executing program) 1970/01/01 00:17:11 fetching corpus: 14156, signal 295587/305854 (executing program) 1970/01/01 00:17:13 fetching corpus: 14206, signal 295829/305854 (executing program) 1970/01/01 00:17:14 fetching corpus: 14256, signal 296156/305854 (executing program) 1970/01/01 00:17:17 fetching corpus: 14304, signal 296413/305855 (executing program) 1970/01/01 00:17:19 fetching corpus: 14353, signal 296689/305855 (executing program) 1970/01/01 00:17:21 fetching corpus: 14402, signal 296992/305859 (executing program) 1970/01/01 00:17:23 fetching corpus: 14452, signal 297204/305859 (executing program) 1970/01/01 00:17:26 fetching corpus: 14499, signal 297580/305859 (executing program) 1970/01/01 00:17:28 fetching corpus: 14549, signal 297794/305859 (executing program) 1970/01/01 00:17:30 fetching corpus: 14598, signal 298134/305859 (executing program) 1970/01/01 00:17:32 fetching corpus: 14646, signal 298427/305859 (executing program) 1970/01/01 00:17:35 fetching corpus: 14696, signal 298714/305859 (executing program) 1970/01/01 00:17:37 fetching corpus: 14745, signal 298921/305859 (executing program) 1970/01/01 00:17:40 fetching corpus: 14795, signal 299139/305859 (executing program) 1970/01/01 00:17:43 fetching corpus: 14845, signal 299436/305863 (executing program) 1970/01/01 00:17:46 fetching corpus: 14894, signal 299789/305866 (executing program) 1970/01/01 00:17:48 fetching corpus: 14944, signal 300098/305866 (executing program) 1970/01/01 00:17:50 fetching corpus: 14993, signal 300335/305866 (executing program) 1970/01/01 00:17:53 fetching corpus: 15043, signal 300634/305866 (executing program) 1970/01/01 00:17:54 fetching corpus: 15093, signal 300896/305866 (executing program) 1970/01/01 00:17:56 fetching corpus: 15142, signal 301104/305867 (executing program) ps_root_recvmsgcb: failed to send message to pid 2877: Connection refused 1970/01/01 00:17:58 fetching corpus: 15192, signal 301395/305867 (executing program) ps_root_recvmsgcb: failed to send message to pid 2879: Connection refused ps_root_recvmsgcb: failed to send message to pid 2878: Connection refused 1970/01/01 00:18:00 fetching corpus: 15241, signal 301727/305867 (executing program) ps_root_recvmsgcb: failed to send message to pid 2880: Connection refused 1970/01/01 00:18:02 fetching corpus: 15291, signal 302012/305867 (executing program) 1970/01/01 00:18:04 fetching corpus: 15341, signal 302357/305867 (executing program) 1970/01/01 00:18:06 fetching corpus: 15391, signal 302730/305867 (executing program) 1970/01/01 00:18:08 fetching corpus: 15441, signal 303032/305867 (executing program) 1970/01/01 00:18:09 fetching corpus: 15491, signal 303275/305867 (executing program) 1970/01/01 00:18:10 fetching corpus: 15499, signal 303302/305867 (executing program) 1970/01/01 00:18:10 fetching corpus: 15499, signal 303302/305867 (executing program) [ 1142.841052][ T2882] warn_alloc: 3 callbacks suppressed [ 1142.866245][ T2882] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 1142.870302][ T2882] CPU: 1 PID: 2882 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 1142.871894][ T2882] Hardware name: riscv-virtio,qemu (DT) [ 1142.872985][ T2882] Call Trace: [ 1142.874459][ T2882] [] dump_backtrace+0x2e/0x3c [ 1142.876091][ T2882] [] show_stack+0x34/0x40 [ 1142.877629][ T2882] [] dump_stack_lvl+0xe0/0x14c [ 1142.879261][ T2882] [] dump_stack+0x1c/0x24 [ 1142.880864][ T2882] [] warn_alloc+0x168/0x22c [ 1142.882360][ T2882] [] __vmalloc_node_range+0xb6c/0xdb4 [ 1142.884326][ T2882] [] bpf_jit_alloc_exec+0x46/0x52 [ 1142.885953][ T2882] [] bpf_jit_binary_alloc+0x96/0x13c [ 1142.887487][ T2882] [] bpf_int_jit_compile+0x886/0xaa6 [ 1142.889040][ T2882] [] bpf_prog_select_runtime+0x1a2/0x22e [ 1142.890780][ T2882] [] bpf_migrate_filter+0x258/0x2be [ 1142.892435][ T2882] [] bpf_prepare_filter+0x10e/0x1b4 [ 1142.894830][ T2882] [] __get_filter+0x148/0x1a0 [ 1142.896443][ T2882] [] sk_attach_filter+0x22/0x11a [ 1142.897939][ T2882] [] sk_setsockopt+0x144e/0x270c [ 1142.899522][ T2882] [] sock_setsockopt+0x48/0x58 [ 1142.901090][ T2882] [] __sys_setsockopt+0x3f0/0x418 [ 1142.902614][ T2882] [] sys_setsockopt+0x3a/0x4c [ 1142.904879][ T2882] [] ret_from_syscall+0x0/0x2 [ 1142.917648][ T2882] Mem-Info: [ 1142.919084][ T2882] active_anon:41848 inactive_anon:52 isolated_anon:0 [ 1142.919084][ T2882] active_file:0 inactive_file:7129 isolated_file:0 [ 1142.919084][ T2882] unevictable:768 dirty:0 writeback:0 [ 1142.919084][ T2882] slab_reclaimable:5168 slab_unreclaimable:19012 [ 1142.919084][ T2882] mapped:4347 shmem:814 pagetables:201 [ 1142.919084][ T2882] sec_pagetables:0 bounce:0 [ 1142.919084][ T2882] kernel_misc_reclaimable:0 [ 1142.919084][ T2882] free:238155 free_pcp:391 free_cma:4096 [ 1142.927163][ T2882] Node 0 active_anon:167392kB inactive_anon:208kB active_file:0kB inactive_file:28516kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:17388kB dirty:0kB writeback:0kB shmem:3256kB writeback_tmp:0kB kernel_stack:4608kB pagetables:804kB sec_pagetables:0kB all_unreclaimable? no [ 1142.939936][ T2882] Node 0 DMA32 free:952368kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:167392kB inactive_anon:208kB active_file:0kB inactive_file:28516kB unevictable:3072kB writepending:0kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:1792kB local_pcp:588kB free_cma:16384kB [ 1142.945265][ T2882] lowmem_reserve[]: 0 0 0 [ 1142.947801][ T2882] Node 0 DMA32: 332*4kB (UE) 64*8kB (UE) 34*16kB (UE) 87*32kB (UE) 14*64kB (UE) 1*128kB (E) 2*256kB (UE) 3*512kB (UME) 2*1024kB (UM) 4*2048kB (MEC) 228*4096kB (MC) = 952368kB [ 1142.982014][ T2882] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1142.989900][ T2882] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 1142.991617][ T2882] 7943 total pagecache pages [ 1143.009317][ T2882] 0 pages in swap cache [ 1143.010577][ T2882] Free swap = 0kB [ 1143.011710][ T2882] Total swap = 0kB [ 1143.012852][ T2882] 523776 pages RAM [ 1143.016441][ T2882] 0 pages HighMem/MovableOnly [ 1143.017800][ T2882] 184025 pages reserved [ 1143.035532][ T2882] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsgcb: failed to send message to pid 2882: Connection refused ps_root_recvmsgcb: failed to send message to pid 2883: Connection refused ps_root_recvmsgcb: failed to send message to pid 2884: Connection refused ps_root_recvmsgcb: failed to send message to pid 2885: Connection refused 1970/01/01 00:20:27 starting 2 fuzzer processes 00:20:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private}}}}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private}}}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='sit0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000c2f7196bc800dd0a00000000000000009078ac1414aa00000000"]}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0xffff, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private=0xa0100ff}}}}) ioctl$FIONCLEX(r0, 0x5450) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r4, &(0x7f0000000140)='$', 0x1) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f00000000c0)={0x8000}) close(r4) mmap$dsp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x102030, r4, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x1800, 0x0, 0x3, 0x7fff0000}]}) mknodat$null(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x103) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 00:20:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ppoll(&(0x7f0000000240)=[{r0}], 0x1, &(0x7f0000000340)={0x0, 0x3938700}, 0x0, 0x0) [ 1264.186033][ T2889] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1264.252475][ T2889] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1268.289086][ T2888] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1268.489090][ T2888] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1270.401673][ T3251] warn_alloc: 3 callbacks suppressed [ 1270.402001][ T3251] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 1270.431488][ T3251] CPU: 1 PID: 3251 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 1270.433466][ T3251] Hardware name: riscv-virtio,qemu (DT) [ 1270.435288][ T3251] Call Trace: [ 1270.436390][ T3251] [] dump_backtrace+0x2e/0x3c [ 1270.438123][ T3251] [] show_stack+0x34/0x40 [ 1270.439885][ T3251] [] dump_stack_lvl+0xe0/0x14c [ 1270.441586][ T3251] [] dump_stack+0x1c/0x24 [ 1270.443241][ T3251] [] warn_alloc+0x168/0x22c [ 1270.445284][ T3251] [] __vmalloc_node_range+0xb6c/0xdb4 [ 1270.447062][ T3251] [] bpf_jit_alloc_exec+0x46/0x52 [ 1270.448734][ T3251] [] bpf_jit_binary_alloc+0x96/0x13c [ 1270.450403][ T3251] [] bpf_int_jit_compile+0x886/0xaa6 [ 1270.452115][ T3251] [] bpf_prog_select_runtime+0x1a2/0x22e [ 1270.454036][ T3251] [] bpf_migrate_filter+0x258/0x2be [ 1270.455916][ T3251] [] bpf_prepare_filter+0x10e/0x1b4 [ 1270.457587][ T3251] [] __get_filter+0x148/0x1a0 [ 1270.459253][ T3251] [] sk_attach_filter+0x22/0x11a [ 1270.460802][ T3251] [] sk_setsockopt+0x144e/0x270c [ 1270.464152][ T3251] [] sock_setsockopt+0x48/0x58 [ 1270.466903][ T3251] [] __sys_setsockopt+0x3f0/0x418 [ 1270.469670][ T3251] [] sys_setsockopt+0x3a/0x4c [ 1270.471574][ T3251] [] ret_from_syscall+0x0/0x2 [ 1270.535721][ T3251] Mem-Info: [ 1270.537287][ T3251] active_anon:72936 inactive_anon:58 isolated_anon:0 [ 1270.537287][ T3251] active_file:0 inactive_file:7151 isolated_file:0 [ 1270.537287][ T3251] unevictable:768 dirty:0 writeback:0 [ 1270.537287][ T3251] slab_reclaimable:5207 slab_unreclaimable:20225 [ 1270.537287][ T3251] mapped:8618 shmem:821 pagetables:323 [ 1270.537287][ T3251] sec_pagetables:0 bounce:0 [ 1270.537287][ T3251] kernel_misc_reclaimable:0 [ 1270.537287][ T3251] free:189978 free_pcp:363 free_cma:4096 [ 1270.541123][ T3251] Node 0 active_anon:291744kB inactive_anon:232kB active_file:0kB inactive_file:28604kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34472kB dirty:0kB writeback:0kB shmem:3284kB writeback_tmp:0kB kernel_stack:5176kB pagetables:1292kB sec_pagetables:0kB all_unreclaimable? no [ 1270.555337][ T3251] Node 0 DMA32 free:759912kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:291744kB inactive_anon:232kB active_file:0kB inactive_file:28604kB unevictable:3072kB writepending:0kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:1480kB local_pcp:48kB free_cma:16384kB [ 1270.559261][ T3251] lowmem_reserve[]: 0 0 0 [ 1270.561844][ T3251] Node 0 DMA32: 264*4kB (UME) 95*8kB (UME) 10*16kB (M) 58*32kB (UME) 13*64kB (UME) 5*128kB (UME) 0*256kB 2*512kB (UE) 2*1024kB (UM) 3*2048kB (EC) 182*4096kB (MC) = 759992kB [ 1270.625390][ T3251] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1270.627267][ T3251] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 1270.628760][ T3251] 7972 total pagecache pages [ 1270.629953][ T3251] 0 pages in swap cache [ 1270.631053][ T3251] Free swap = 0kB [ 1270.632142][ T3251] Total swap = 0kB [ 1270.670703][ T3251] 523776 pages RAM [ 1270.672030][ T3251] 0 pages HighMem/MovableOnly [ 1270.672988][ T3251] 184025 pages reserved [ 1270.677164][ T3251] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 [ 1281.398159][ T2889] device hsr_slave_0 entered promiscuous mode [ 1281.440996][ T2889] device hsr_slave_1 entered promiscuous mode [ 1285.649992][ T2888] device hsr_slave_0 entered promiscuous mode [ 1285.681956][ T2888] device hsr_slave_1 entered promiscuous mode [ 1285.709733][ T2888] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1285.731292][ T2888] Cannot create hsr debugfs directory [ 1290.159420][ T2889] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1290.418328][ T2889] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1290.708074][ T2889] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1291.002402][ T2889] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1294.487936][ T2888] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1294.648100][ T2888] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1294.772238][ T2888] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1294.887894][ T2888] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1304.861844][ T2889] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1305.659053][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1305.719498][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1309.072984][ T2888] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1309.588668][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1309.628555][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1318.007194][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1318.071453][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1318.350015][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1318.439470][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1318.882101][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1319.060395][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1320.160500][ T2889] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1320.162116][ T2889] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1320.270833][ T3274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1320.308837][ T3274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1320.351919][ T3274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1320.408418][ T3274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1320.440470][ T3274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1322.988298][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1323.021591][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1324.058068][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1324.156416][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1324.177503][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1324.227518][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1324.788612][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1324.849639][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1325.190584][ T2888] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1325.336743][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1325.543096][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1325.611044][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1330.720261][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1330.729349][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1333.480815][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1333.491223][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready ps_root_recvmsgcb: failed to send message to pid 3251: Connection refused ps_root_recvmsgcb: failed to send message to pid 3265: Connection refused ps_root_recvmsgcb: failed to send message to pid 3273: Connection refused ps_root_recvmsgcb: failed to send message to pid 3284: Connection refused [ 1352.119401][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1352.207064][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1354.488173][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1354.571245][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1363.200773][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1363.289273][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1363.522854][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1363.559161][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1363.609039][ T2889] device veth0_vlan entered promiscuous mode [ 1364.097329][ T2889] device veth1_vlan entered promiscuous mode [ 1365.057860][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1365.087813][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1365.209329][ T3274] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1365.251105][ T3274] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1365.395369][ T2888] device veth0_vlan entered promiscuous mode [ 1365.918253][ T2888] device veth1_vlan entered promiscuous mode [ 1366.350198][ T2889] device veth0_macvtap entered promiscuous mode [ 1366.627882][ T2889] device veth1_macvtap entered promiscuous mode [ 1366.707318][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1366.749828][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1366.786294][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1366.852164][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1367.466683][ T3274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1367.518088][ T3274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1367.859018][ T2888] device veth0_macvtap entered promiscuous mode [ 1368.318981][ T2888] device veth1_macvtap entered promiscuous mode [ 1368.548786][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1368.578907][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1368.609841][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1368.667011][ T2952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1368.814321][ T2889] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1368.820080][ T2889] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1368.821671][ T2889] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1368.870904][ T2889] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1370.250974][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1370.272864][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1370.848031][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1370.906161][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1370.977698][ T2888] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1370.979904][ T2888] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1370.981734][ T2888] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1371.006181][ T2888] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 00:22:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private}}}}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private}}}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='sit0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000c2f7196bc800dd0a00000000000000009078ac1414aa00000000"]}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0xffff, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private=0xa0100ff}}}}) ioctl$FIONCLEX(r0, 0x5450) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r4, &(0x7f0000000140)='$', 0x1) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f00000000c0)={0x8000}) close(r4) mmap$dsp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x102030, r4, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x1800, 0x0, 0x3, 0x7fff0000}]}) mknodat$null(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x103) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 00:22:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000140)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x1}]}, 0x24}}, 0x0) 00:23:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private}}}}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private}}}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='sit0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000c2f7196bc800dd0a00000000000000009078ac1414aa00000000"]}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0xffff, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private=0xa0100ff}}}}) ioctl$FIONCLEX(r0, 0x5450) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r4, &(0x7f0000000140)='$', 0x1) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f00000000c0)={0x8000}) close(r4) mmap$dsp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x102030, r4, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x1800, 0x0, 0x3, 0x7fff0000}]}) mknodat$null(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x103) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 00:23:05 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/route\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/208, 0xd0}], 0x1, 0x5, 0x0) readv(r0, &(0x7f0000002740)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x2) 00:23:09 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/route\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/208, 0xd0}], 0x1, 0x5, 0x0) readv(r0, &(0x7f0000002740)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x2) 00:23:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private}}}}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private}}}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='sit0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000c2f7196bc800dd0a00000000000000009078ac1414aa00000000"]}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f2, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0xffff, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private=0xa0100ff}}}}) ioctl$FIONCLEX(r0, 0x5450) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write(r4, &(0x7f0000000140)='$', 0x1) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f00000000c0)={0x8000}) close(r4) mmap$dsp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x102030, r4, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x1800, 0x0, 0x3, 0x7fff0000}]}) mknodat$null(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x103) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 00:23:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/route\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/208, 0xd0}], 0x1, 0x5, 0x0) readv(r0, &(0x7f0000002740)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x2) 00:23:16 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/route\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/208, 0xd0}], 0x1, 0x5, 0x0) readv(r0, &(0x7f0000002740)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x2) 00:23:16 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/route\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/208, 0xd0}], 0x1, 0x5, 0x0) readv(r0, &(0x7f0000002740)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x2) [ 1398.820133][ T3606] warn_alloc: 3 callbacks suppressed [ 1398.820495][ T3606] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 1398.827273][ T3606] CPU: 1 PID: 3606 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 1398.828783][ T3606] Hardware name: riscv-virtio,qemu (DT) [ 1398.829905][ T3606] Call Trace: [ 1398.830886][ T3606] [] dump_backtrace+0x2e/0x3c [ 1398.832403][ T3606] [] show_stack+0x34/0x40 [ 1398.834121][ T3606] [] dump_stack_lvl+0xe0/0x14c [ 1398.835789][ T3606] [] dump_stack+0x1c/0x24 [ 1398.837478][ T3606] [] warn_alloc+0x168/0x22c [ 1398.839432][ T3606] [] __vmalloc_node_range+0xb6c/0xdb4 [ 1398.841129][ T3606] [] bpf_jit_alloc_exec+0x46/0x52 [ 1398.843088][ T3606] [] bpf_jit_binary_alloc+0x96/0x13c [ 1398.845020][ T3606] [] bpf_int_jit_compile+0x886/0xaa6 [ 1398.846569][ T3606] [] bpf_prog_select_runtime+0x1a2/0x22e [ 1398.848136][ T3606] [] bpf_migrate_filter+0x258/0x2be [ 1398.849787][ T3606] [] bpf_prepare_filter+0x10e/0x1b4 [ 1398.851400][ T3606] [] __get_filter+0x148/0x1a0 [ 1398.852966][ T3606] [] sk_attach_filter+0x22/0x11a [ 1398.854792][ T3606] [] sk_setsockopt+0x144e/0x270c [ 1398.856409][ T3606] [] sock_setsockopt+0x48/0x58 [ 1398.857966][ T3606] [] __sys_setsockopt+0x3f0/0x418 [ 1398.859471][ T3606] [] sys_setsockopt+0x3a/0x4c [ 1398.860877][ T3606] [] ret_from_syscall+0x0/0x2 [ 1398.946164][ T3606] Mem-Info: [ 1398.947649][ T3606] active_anon:70098 inactive_anon:59 isolated_anon:0 [ 1398.947649][ T3606] active_file:0 inactive_file:7211 isolated_file:0 [ 1398.947649][ T3606] unevictable:768 dirty:18 writeback:0 [ 1398.947649][ T3606] slab_reclaimable:5398 slab_unreclaimable:23912 [ 1398.947649][ T3606] mapped:8710 shmem:858 pagetables:354 [ 1398.947649][ T3606] sec_pagetables:0 bounce:0 [ 1398.947649][ T3606] kernel_misc_reclaimable:0 [ 1398.947649][ T3606] free:187705 free_pcp:851 free_cma:4096 [ 1398.951545][ T3606] Node 0 active_anon:280392kB inactive_anon:236kB active_file:0kB inactive_file:28844kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34840kB dirty:72kB writeback:0kB shmem:3432kB writeback_tmp:0kB kernel_stack:5440kB pagetables:1416kB sec_pagetables:0kB all_unreclaimable? no [ 1398.989852][ T3606] Node 0 DMA32 free:750820kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:280392kB inactive_anon:236kB active_file:0kB inactive_file:28844kB unevictable:3072kB writepending:72kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:3372kB local_pcp:1640kB free_cma:16384kB [ 1399.016253][ T3606] lowmem_reserve[]: 0 0 0 [ 1399.019164][ T3606] Node 0 DMA32: 453*4kB (UME) 456*8kB (UME) 197*16kB (UME) 18*32kB (UM) 16*64kB (UM) 8*128kB (ME) 7*256kB (ME) 5*512kB (ME) 4*1024kB (ME) 3*2048kB (UC) 177*4096kB (MC) = 750820kB [ 1399.092610][ T3606] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1399.097416][ T3606] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 1399.099029][ T3606] 8069 total pagecache pages [ 1399.100278][ T3606] 0 pages in swap cache [ 1399.101459][ T3606] Free swap = 0kB [ 1399.102566][ T3606] Total swap = 0kB [ 1399.130796][ T3606] 523776 pages RAM [ 1399.135155][ T3606] 0 pages HighMem/MovableOnly [ 1399.136474][ T3606] 184025 pages reserved [ 1399.137627][ T3606] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:23:20 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/route\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/208, 0xd0}], 0x1, 0x5, 0x0) readv(r0, &(0x7f0000002740)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x2) ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:23:22 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x541b, 0x0) ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:23:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/route\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/208, 0xd0}], 0x1, 0x5, 0x0) readv(r0, &(0x7f0000002740)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x2) 00:23:25 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x238, 0x0, 0xffffffff, 0xffffffff, 0x1a0, 0xffffffff, 0x1a0, 0xffffffff, 0xffffffff, 0x1a0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x5}}}, {{@uncond, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@unspec=@connlabel={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'veth0_to_hsr\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) 00:23:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) ftruncate(r0, 0xa36) write(r0, &(0x7f00000003c0), 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000300)="87", 0x1}], 0x1) ftruncate(r0, 0xa00005) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xfe, "ef95d2", "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"}}, 0x110) 00:23:28 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x238, 0x0, 0xffffffff, 0xffffffff, 0x1a0, 0xffffffff, 0x1a0, 0xffffffff, 0xffffffff, 0x1a0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x5}}}, {{@uncond, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@unspec=@connlabel={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'veth0_to_hsr\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) 00:23:31 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x238, 0x0, 0xffffffff, 0xffffffff, 0x1a0, 0xffffffff, 0x1a0, 0xffffffff, 0xffffffff, 0x1a0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x5}}}, {{@uncond, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@unspec=@connlabel={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'veth0_to_hsr\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) 00:23:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) ftruncate(r0, 0xa36) write(r0, &(0x7f00000003c0), 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000300)="87", 0x1}], 0x1) ftruncate(r0, 0xa00005) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xfe, "ef95d2", "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"}}, 0x110) 00:23:34 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x238, 0x0, 0xffffffff, 0xffffffff, 0x1a0, 0xffffffff, 0x1a0, 0xffffffff, 0xffffffff, 0x1a0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x5}}}, {{@uncond, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@unspec=@connlabel={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'veth0_to_hsr\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) 00:23:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) ftruncate(r0, 0xa36) write(r0, &(0x7f00000003c0), 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000300)="87", 0x1}], 0x1) ftruncate(r0, 0xa00005) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xfe, "ef95d2", "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"}}, 0x110) 00:23:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) ftruncate(r0, 0xa36) write(r0, &(0x7f00000003c0), 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000300)="87", 0x1}], 0x1) ftruncate(r0, 0xa00005) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xfe, "ef95d2", "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"}}, 0x110) 00:23:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) ftruncate(r0, 0xa36) write(r0, &(0x7f00000003c0), 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000300)="87", 0x1}], 0x1) ftruncate(r0, 0xa00005) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xfe, "ef95d2", "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"}}, 0x110) 00:23:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) ftruncate(r0, 0xa36) write(r0, &(0x7f00000003c0), 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000300)="87", 0x1}], 0x1) ftruncate(r0, 0xa00005) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xfe, "ef95d2", "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"}}, 0x110) 00:23:45 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = dup(r0) bind$rds(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, 0x0, 0x100000, 0x0, &(0x7f00000005c0)={0x2, 0x0, @private=0xa010101}, 0x10) 00:23:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) ftruncate(r0, 0xa36) write(r0, &(0x7f00000003c0), 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000300)="87", 0x1}], 0x1) ftruncate(r0, 0xa00005) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xfe, "ef95d2", "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"}}, 0x110) 00:23:47 executing program 0: prlimit64(0x0, 0x0, 0x0, &(0x7f0000000040)) 00:23:51 executing program 0: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x40a6071, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ff4000/0xa000)=nil, 0xa000, 0x2, &(0x7f0000000a00)=0x7, 0x9, 0x0) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x0) 00:23:51 executing program 1: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000ff8000/0x2000)=nil) syz_io_uring_setup(0xf6c, &(0x7f00000000c0), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000280)) 00:23:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendfile(r5, r4, 0x0, 0x7) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendfile(r1, r4, 0x0, 0x2fff2) 00:23:56 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000001340)='\b', 0xff04, 0x0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) [ 1438.980969][ T27] audit: type=1804 audit(1438.360:2): pid=3648 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/14/file1" dev="vda" ino=639 res=1 errno=0 [ 1439.218525][ T27] audit: type=1804 audit(1438.610:3): pid=3648 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/14/file1" dev="vda" ino=639 res=1 errno=0 00:23:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendfile(r5, r4, 0x0, 0x7) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendfile(r1, r4, 0x0, 0x2fff2) 00:24:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000001340)='\b', 0xff04, 0x0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) [ 1443.259231][ T27] audit: type=1804 audit(1442.650:4): pid=3652 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/15/file1" dev="vda" ino=643 res=1 errno=0 [ 1443.747125][ T27] audit: type=1804 audit(1443.100:5): pid=3652 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/15/file1" dev="vda" ino=643 res=1 errno=0 00:24:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000001340)='\b', 0xff04, 0x0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) 00:24:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendfile(r5, r4, 0x0, 0x7) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendfile(r1, r4, 0x0, 0x2fff2) [ 1448.178771][ T27] audit: type=1804 audit(1447.490:6): pid=3657 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/16/file1" dev="vda" ino=643 res=1 errno=0 [ 1449.391926][ T27] audit: type=1804 audit(1448.780:7): pid=3658 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/16/file1" dev="vda" ino=643 res=1 errno=0 00:24:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000001340)='\b', 0xff04, 0x0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) 00:24:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendfile(r5, r4, 0x0, 0x7) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendfile(r1, r4, 0x0, 0x2fff2) [ 1453.430569][ T27] audit: type=1804 audit(1452.820:8): pid=3662 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/17/file1" dev="vda" ino=643 res=1 errno=0 [ 1454.036443][ T27] audit: type=1804 audit(1453.420:9): pid=3662 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/17/file1" dev="vda" ino=643 res=1 errno=0 00:24:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendfile(r5, r4, 0x0, 0x7) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendfile(r1, r4, 0x0, 0x2fff2) 00:24:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) setxattr$system_posix_acl(&(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [{0x2, 0x0, 0xee00}, {}], {}, [{}, {}, {}, {0x8, 0x0, 0xee00}, {}]}, 0x5c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) [ 1457.540069][ T27] audit: type=1804 audit(1456.930:10): pid=3665 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/19/file1" dev="vda" ino=641 res=1 errno=0 [ 1457.815710][ T27] audit: type=1804 audit(1457.200:11): pid=3665 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/19/file1" dev="vda" ino=641 res=1 errno=0 00:24:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) setxattr$system_posix_acl(&(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [{0x2, 0x0, 0xee00}, {}], {}, [{}, {}, {}, {0x8, 0x0, 0xee00}, {}]}, 0x5c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) 00:24:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendfile(r5, r4, 0x0, 0x7) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendfile(r1, r4, 0x0, 0x2fff2) [ 1461.312420][ T27] audit: type=1804 audit(1460.700:12): pid=3670 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/20/file1" dev="vda" ino=644 res=1 errno=0 [ 1461.797257][ T27] audit: type=1804 audit(1461.140:13): pid=3670 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/20/file1" dev="vda" ino=644 res=1 errno=0 00:24:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) setxattr$system_posix_acl(&(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [{0x2, 0x0, 0xee00}, {}], {}, [{}, {}, {}, {0x8, 0x0, 0xee00}, {}]}, 0x5c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) 00:24:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendfile(r5, r4, 0x0, 0x7) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendfile(r1, r4, 0x0, 0x2fff2) ps_root_recvmsgcb: failed to send message to pid 3606: Connection refused ps_root_recvmsgcb: failed to send message to pid 3607: Connection refused ps_root_recvmsgcb: failed to send message to pid 3608: Connection refused 00:24:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) setxattr$system_posix_acl(&(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [{0x2, 0x0, 0xee00}, {}], {}, [{}, {}, {}, {0x8, 0x0, 0xee00}, {}]}, 0x5c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) [ 1465.691197][ T27] audit: type=1804 audit(1465.080:14): pid=3674 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/21/file1" dev="vda" ino=645 res=1 errno=0 [ 1466.009439][ T27] audit: type=1804 audit(1465.390:15): pid=3674 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/21/file1" dev="vda" ino=645 res=1 errno=0 ps_root_recvmsgcb: failed to send message to pid 3609: Connection refused 00:24:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) setxattr$system_posix_acl(&(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [{0x2, 0x0, 0xee00}, {}], {}, [{}, {}, {}, {0x8, 0x0, 0xee00}, {}]}, 0x5c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) 00:24:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) setxattr$system_posix_acl(&(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [{0x2, 0x0, 0xee00}, {}], {}, [{}, {}, {}, {0x8, 0x0, 0xee00}, {}]}, 0x5c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) 00:24:31 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000005380), 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000005340)=ANY=[@ANYRES16=r0], 0xac) 00:24:34 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x8, 0x3, 0x278, 0xb8, 0xffffffff, 0xffffffff, 0xb8, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x38, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "a873"}}, @common=@ttl={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) 00:24:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) setxattr$system_posix_acl(&(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [{0x2, 0x0, 0xee00}, {}], {}, [{}, {}, {}, {0x8, 0x0, 0xee00}, {}]}, 0x5c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) 00:24:36 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x8, 0x3, 0x278, 0xb8, 0xffffffff, 0xffffffff, 0xb8, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x38, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "a873"}}, @common=@ttl={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) 00:24:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x1800006, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYRES16=0x0, @ANYRESOCT], 0x10, 0x24f, &(0x7f00000005c0)="$eJzs3T9oJGUcBuB3Zncv5m6RUxtB8AQR0YNwdoLN2SgcyHGICCpExE5JBEmwS7SxsdBaJZVNEDujpaQJNopgFWOK2AgaLAwWWqzMzq5EXUlw4446zwOz82e/md83zLzfbDNsgNa6mORqkk6Sy0l6SYrjDe6qp4uj1Y35ncVkMHj8h2LYrl6vjfe7kGQ9yYNJtssiL3ST1a2nD37affTeN1Z697y39dT8TE9y5PBg/7Gjd6+//uG1B1Y///K760Wupv+78zp7xYRt3SK59Z8o9i9RdJvuAadx45UPvqpyf1uSu4f576VMffHefPncdi/3v/NX+771/Rd3zLKvwNkbDHrVM3B9cJK50aPsxIbAf0WZpJ+iXEhSL5flwkL9G36vc758cflSkuWVpeebHqmAs9JP9h/5eO6jC3/I/7edOv/A/1eV/ydubH5dLR91mu4NMEtV/i8/u3Zf5B9aZ5z/PfmH1vH8h/aSf2gv+Yf2kn9on3OjufxDe8k/tJf8Q3vJP7TX8fwDAO0ymBu/Cdwbb6m81uQ7ycBsNDz8AAAAAAAAAAAAAAAAAAAAE2zM7yyOp1nV/PTt5PDhJN1J9TvD/yNObhp+nv+xqJr9pqh3m8ozl6Y8wGSn7tb7Db99ffM3zdb/7M5m668tJeuvJrnS7f75/itG99/fd8sJ3/eem7LAlB56stn6v2w2W//abvJJNf5cmTT+lLl9OJ88/vSr6zdl/Zd+nvIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAzMyvAQAA//8jH1xW") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 00:24:39 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x8, 0x3, 0x278, 0xb8, 0xffffffff, 0xffffffff, 0xb8, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x38, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "a873"}}, @common=@ttl={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) [ 1481.796481][ T3691] loop1: detected capacity change from 0 to 128 00:24:41 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x8, 0x3, 0x278, 0xb8, 0xffffffff, 0xffffffff, 0xb8, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x38, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "a873"}}, @common=@ttl={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) [ 1482.730286][ T3691] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 without journal. Quota mode: none. [ 1483.170370][ T3691] EXT4-fs error (device loop1): __ext4_find_entry:1674: inode #2: comm syz-executor.1: checksumming directory block 0 00:24:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x1800006, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYRES16=0x0, @ANYRESOCT], 0x10, 0x24f, &(0x7f00000005c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1484.020621][ T2888] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. 00:24:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000064c0)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1b}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_EXPR={0xc, 0x11, 0x0, 0x1, @fib={{0x6}, @void}}, @NFTA_SET_ID={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x70}}, 0x0) [ 1488.240948][ T3701] loop1: detected capacity change from 0 to 128 00:24:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000064c0)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1b}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_EXPR={0xc, 0x11, 0x0, 0x1, @fib={{0x6}, @void}}, @NFTA_SET_ID={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x70}}, 0x0) [ 1489.219869][ T3701] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 without journal. Quota mode: none. [ 1489.898876][ T3701] EXT4-fs error (device loop1): __ext4_find_entry:1674: inode #2: comm syz-executor.1: checksumming directory block 0 00:24:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x1800006, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYRES16=0x0, @ANYRESOCT], 0x10, 0x24f, &(0x7f00000005c0)="$eJzs3T9oJGUcBuB3Zncv5m6RUxtB8AQR0YNwdoLN2SgcyHGICCpExE5JBEmwS7SxsdBaJZVNEDujpaQJNopgFWOK2AgaLAwWWqzMzq5EXUlw4446zwOz82e/md83zLzfbDNsgNa6mORqkk6Sy0l6SYrjDe6qp4uj1Y35ncVkMHj8h2LYrl6vjfe7kGQ9yYNJtssiL3ST1a2nD37affTeN1Z697y39dT8TE9y5PBg/7Gjd6+//uG1B1Y///K760Wupv+78zp7xYRt3SK59Z8o9i9RdJvuAadx45UPvqpyf1uSu4f576VMffHefPncdi/3v/NX+771/Rd3zLKvwNkbDHrVM3B9cJK50aPsxIbAf0WZpJ+iXEhSL5flwkL9G36vc758cflSkuWVpeebHqmAs9JP9h/5eO6jC3/I/7edOv/A/1eV/ydubH5dLR91mu4NMEtV/i8/u3Zf5B9aZ5z/PfmH1vH8h/aSf2gv+Yf2kn9on3OjufxDe8k/tJf8Q3vJP7TX8fwDAO0ymBu/Cdwbb6m81uQ7ycBsNDz8AAAAAAAAAAAAAAAAAAAAE2zM7yyOp1nV/PTt5PDhJN1J9TvD/yNObhp+nv+xqJr9pqh3m8ozl6Y8wGSn7tb7Db99ffM3zdb/7M5m668tJeuvJrnS7f75/itG99/fd8sJ3/eem7LAlB56stn6v2w2W//abvJJNf5cmTT+lLl9OJ88/vSr6zdl/Zd+nvIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAzMyvAQAA//8jH1xW") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 00:24:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000064c0)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1b}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_EXPR={0xc, 0x11, 0x0, 0x1, @fib={{0x6}, @void}}, @NFTA_SET_ID={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x70}}, 0x0) [ 1491.622537][ T2888] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. 00:24:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000064c0)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1b}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_EXPR={0xc, 0x11, 0x0, 0x1, @fib={{0x6}, @void}}, @NFTA_SET_ID={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x70}}, 0x0) [ 1495.227123][ T3712] loop1: detected capacity change from 0 to 128 [ 1495.946629][ T3712] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 without journal. Quota mode: none. [ 1496.912446][ T3712] EXT4-fs error (device loop1): __ext4_find_entry:1674: inode #2: comm syz-executor.1: checksumming directory block 0 00:24:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x1800006, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYRES16=0x0, @ANYRESOCT], 0x10, 0x24f, &(0x7f00000005c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1498.159179][ T3714] EXT4-fs error (device loop1): ext4_validate_block_bitmap:390: comm ext4lazyinit: bg 0: bad block bitmap checksum [ 1498.459898][ T2888] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. 00:24:59 executing program 0: timerfd_create(0x7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo/3\x00') read$FUSE(r0, &(0x7f0000003d80)={0x2020}, 0x2020) 00:25:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/124, 0x7c}, {&(0x7f0000000200)=""/113, 0x71}, {&(0x7f0000000280)=""/236, 0xec}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000000380)=""/133, 0x85}, {&(0x7f0000000440)=""/69, 0x45}, {&(0x7f00000004c0)=""/178, 0xb2}], 0x7) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c03000026000139"], 0x36c}}, 0x0) [ 1502.669531][ T3723] loop1: detected capacity change from 0 to 128 [ 1503.183125][ T3723] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 without journal. Quota mode: none. [ 1503.611443][ T3723] EXT4-fs error (device loop1): __ext4_find_entry:1674: inode #2: comm syz-executor.1: checksumming directory block 0 [ 1503.778428][ T3726] EXT4-fs error (device loop1): ext4_validate_block_bitmap:390: comm ext4lazyinit: bg 0: bad block bitmap checksum [ 1505.388355][ T3728] netlink: 840 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1505.492271][ T2888] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 1505.503083][ T3727] netlink: 840 bytes leftover after parsing attributes in process `syz-executor.0'. 00:25:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/124, 0x7c}, {&(0x7f0000000200)=""/113, 0x71}, {&(0x7f0000000280)=""/236, 0xec}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000000380)=""/133, 0x85}, {&(0x7f0000000440)=""/69, 0x45}, {&(0x7f00000004c0)=""/178, 0xb2}], 0x7) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c03000026000139"], 0x36c}}, 0x0) 00:25:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000500)={[{@minixdf}, {@discard}, {@abort}, {@i_version}, {@lazytime}, {@acl}, {@max_batch_time={'max_batch_time', 0x3d, 0x93}}, {@nobarrier}, {@noload}, {@lazytime}]}, 0x1, 0x74e, &(0x7f0000000840)="$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") r0 = syz_open_procfs(0x0, &(0x7f00000012c0)='mountinfo\x00') preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 1510.973078][ T3735] netlink: 840 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1511.040243][ T3734] netlink: 840 bytes leftover after parsing attributes in process `syz-executor.0'. 00:25:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/124, 0x7c}, {&(0x7f0000000200)=""/113, 0x71}, {&(0x7f0000000280)=""/236, 0xec}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000000380)=""/133, 0x85}, {&(0x7f0000000440)=""/69, 0x45}, {&(0x7f00000004c0)=""/178, 0xb2}], 0x7) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c03000026000139"], 0x36c}}, 0x0) [ 1512.939450][ T3732] loop1: detected capacity change from 0 to 2048 [ 1513.147571][ T3732] EXT4-fs: Ignoring removed i_version option [ 1513.936901][ T3732] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 00:25:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000500)={[{@minixdf}, {@discard}, {@abort}, {@i_version}, {@lazytime}, {@acl}, {@max_batch_time={'max_batch_time', 0x3d, 0x93}}, {@nobarrier}, {@noload}, {@lazytime}]}, 0x1, 0x74e, &(0x7f0000000840)="$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") r0 = syz_open_procfs(0x0, &(0x7f00000012c0)='mountinfo\x00') preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 1515.849450][ T3740] netlink: 840 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1515.929285][ T3739] netlink: 840 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1516.731564][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:25:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/124, 0x7c}, {&(0x7f0000000200)=""/113, 0x71}, {&(0x7f0000000280)=""/236, 0xec}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000000380)=""/133, 0x85}, {&(0x7f0000000440)=""/69, 0x45}, {&(0x7f00000004c0)=""/178, 0xb2}], 0x7) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c03000026000139"], 0x36c}}, 0x0) [ 1519.696737][ T3747] netlink: 840 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1519.730855][ T3745] netlink: 840 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1520.985965][ T3746] loop1: detected capacity change from 0 to 2048 [ 1521.080608][ T3746] EXT4-fs: Ignoring removed i_version option [ 1521.853163][ T3746] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 00:25:21 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/devices.allow\x00', 0x1, 0x0) 00:25:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000500)={[{@minixdf}, {@discard}, {@abort}, {@i_version}, {@lazytime}, {@acl}, {@max_batch_time={'max_batch_time', 0x3d, 0x93}}, {@nobarrier}, {@noload}, {@lazytime}]}, 0x1, 0x74e, &(0x7f0000000840)="$eJzs3c9rHOUfB/DPzOZX23y/SaVUK4IBDxXUTVNbf53SKgpVRFQ8N6TbUrptShLBxB5Sjx5EUPCo/hcFL714FjxUvepJoUi1l4qyMrO7ydLsJjFsdtB5vWA2zzPPJs/zzpA8MzvLPgGU1lT2kEYciYizScREa38SEcN5aShitvm8e3euzf9x59p8Eo3GW78m+XOyfdHxPZkDrcpYRHx7OokHKpv7XVpZvTRXr9cWW/Xp5ctXp5dWVp+6eHnuQu1C7crxEydnnj353DMnnu9b1sNnnnz98Acv3vqq8eYrL31zci2J2RhvtXXm6JepmFr/nXQaioiX+91ZQSqtPJ05k6ECB8Q/knYcw8MxEZXYOHgT8fV3hQ4OANgTjUpEAwAomcT8DwAl034d4N6da/PtrdhXJAbr9qnIb1Ruzj8Us/nXsfw+6P7fk+i8rZVExGQf+p+KiBt337mVbbFH9yG3snY9Ih7qlj/J80/md3E3569ExLE+9D91X/3flH+2D/0XnR+Acrp5qjmRbZ7/0vXzn+gy/411mbt2o+j5r/f530b+So/zvzd22McXHz3yYK+2zvO/bMv6b58LDsLt6xEPD/U+/8nyJz3yn91hHzd+fn+uV1vR+RtfRhztev2z8Y62ZOv3J06fv1ivHWs+du3jk+kzH/bqv+j82fHf3yP/dsf/6g77+OvQj6d7tW2fP/1lJHk7L4209rw3t7y8OBMxkry2ef/xrcfSfk77Z2T5H39s67//bvmza8K1Heb//NXfPtt9/r2V5T+3y+P/8Q77+HPhp7FebUXnBwAAAAAAAAAAAAAAAAAAAAAAAIBBSCNiPJK0ul5O02q1uYb3odif1heWlp84v/DulXORr5U9GcNp+5MuJ5r1JKvPtD4Pv10/fl/96Yg4GBGfju7L69X5hfq5osMDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQMuB+9b/vzvaXP8fAPiPGyt6AADAwJn/AaB8zP8AUD7mfwAoH/M/AJSP+R8Aysf8DwAAAAAAAAAAAAAAAAAAAAAAA3Xw0Zs/JBGx9sK+fMuMtNqGCx0ZsNfSogcAFKZS9ACAwgwVPQCgMK7xgWSb9p4fEb7mCgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgPI4esT6/1BW1v+H8rJ6J5SX9f+hvFzjA9b/BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA7Y3nW5JWW2uBj0eaVqsR/4uIyRhOzl+s145FxP8j4vvR4dGsPlP0oAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgz5ZWVi/N1eu1RQUFBYX1QtH/mQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGDwNhb9LnokAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFGlpZfXSXL1eW9zDQtEZAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPrp7wAAAP//3MYrEg==") r0 = syz_open_procfs(0x0, &(0x7f00000012c0)='mountinfo\x00') preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 1523.696787][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:25:24 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/devices.allow\x00', 0x1, 0x0) [ 1527.281694][ T3755] loop1: detected capacity change from 0 to 2048 [ 1527.401563][ T3755] EXT4-fs: Ignoring removed i_version option [ 1527.721452][ T3755] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 1528.378630][ T3760] warn_alloc: 3 callbacks suppressed [ 1528.378865][ T3760] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 1528.381715][ T3760] CPU: 1 PID: 3760 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 1528.382654][ T3760] Hardware name: riscv-virtio,qemu (DT) [ 1528.383466][ T3760] Call Trace: [ 1528.384299][ T3760] [] dump_backtrace+0x2e/0x3c [ 1528.385357][ T3760] [] show_stack+0x34/0x40 [ 1528.386356][ T3760] [] dump_stack_lvl+0xe0/0x14c [ 1528.387400][ T3760] [] dump_stack+0x1c/0x24 [ 1528.388373][ T3760] [] warn_alloc+0x168/0x22c [ 1528.389321][ T3760] [] __vmalloc_node_range+0xb6c/0xdb4 [ 1528.390333][ T3760] [] bpf_jit_alloc_exec+0x46/0x52 [ 1528.391259][ T3760] [] bpf_jit_binary_alloc+0x96/0x13c [ 1528.392182][ T3760] [] bpf_int_jit_compile+0x886/0xaa6 [ 1528.393089][ T3760] [] bpf_prog_select_runtime+0x1a2/0x22e [ 1528.394509][ T3760] [] bpf_migrate_filter+0x258/0x2be [ 1528.395633][ T3760] [] bpf_prepare_filter+0x10e/0x1b4 [ 1528.396654][ T3760] [] __get_filter+0x148/0x1a0 [ 1528.397742][ T3760] [] sk_attach_filter+0x22/0x11a [ 1528.398702][ T3760] [] sk_setsockopt+0x144e/0x270c [ 1528.399725][ T3760] [] sock_setsockopt+0x48/0x58 [ 1528.400801][ T3760] [] __sys_setsockopt+0x3f0/0x418 [ 1528.401879][ T3760] [] sys_setsockopt+0x3a/0x4c [ 1528.402894][ T3760] [] ret_from_syscall+0x0/0x2 [ 1528.406816][ T3760] Mem-Info: [ 1528.407788][ T3760] active_anon:67600 inactive_anon:319 isolated_anon:0 [ 1528.407788][ T3760] active_file:0 inactive_file:7299 isolated_file:0 [ 1528.407788][ T3760] unevictable:768 dirty:9 writeback:0 [ 1528.407788][ T3760] slab_reclaimable:5456 slab_unreclaimable:24017 [ 1528.407788][ T3760] mapped:8713 shmem:1137 pagetables:347 [ 1528.407788][ T3760] sec_pagetables:0 bounce:0 [ 1528.407788][ T3760] kernel_misc_reclaimable:0 [ 1528.407788][ T3760] free:189839 free_pcp:643 free_cma:4096 [ 1528.410369][ T3760] Node 0 active_anon:270400kB inactive_anon:1276kB active_file:0kB inactive_file:29196kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34852kB dirty:36kB writeback:0kB shmem:4548kB writeback_tmp:0kB kernel_stack:5496kB pagetables:1388kB sec_pagetables:0kB all_unreclaimable? no [ 1528.412316][ T3760] Node 0 DMA32 free:759356kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:270400kB inactive_anon:1276kB active_file:0kB inactive_file:29196kB unevictable:3072kB writepending:36kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:2572kB local_pcp:576kB free_cma:16384kB [ 1528.416082][ T3760] lowmem_reserve[]: 0 0 0 [ 1528.418045][ T3760] Node 0 DMA32: 235*4kB (ME) 550*8kB (UM) 238*16kB (UM) 74*32kB (UM) 23*64kB (UME) 21*128kB (UME) 13*256kB (UME) 8*512kB (ME) 7*1024kB (ME) 2*2048kB (C) 177*4096kB (UMC) = 759356kB [ 1528.436369][ T3760] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1528.468120][ T3760] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 1528.469444][ T3760] 8441 total pagecache pages [ 1528.470349][ T3760] 0 pages in swap cache [ 1528.471112][ T3760] Free swap = 0kB [ 1528.471825][ T3760] Total swap = 0kB [ 1528.472579][ T3760] 523776 pages RAM [ 1528.496336][ T3760] 0 pages HighMem/MovableOnly [ 1528.497517][ T3760] 184025 pages reserved [ 1528.498296][ T3760] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 00:25:28 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/devices.allow\x00', 0x1, 0x0) ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:25:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000500)={[{@minixdf}, {@discard}, {@abort}, {@i_version}, {@lazytime}, {@acl}, {@max_batch_time={'max_batch_time', 0x3d, 0x93}}, {@nobarrier}, {@noload}, {@lazytime}]}, 0x1, 0x74e, &(0x7f0000000840)="$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") r0 = syz_open_procfs(0x0, &(0x7f00000012c0)='mountinfo\x00') preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 1530.188298][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:25:31 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/devices.allow\x00', 0x1, 0x0) [ 1534.926308][ T3769] loop1: detected capacity change from 0 to 2048 [ 1535.119331][ T3769] EXT4-fs: Ignoring removed i_version option 00:25:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@subsystem='blkio'}, {}]}) [ 1536.128056][ T3769] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 1537.426398][ T3775] cgroup: subsys name conflicts with all [ 1538.229828][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:25:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@subsystem='blkio'}, {}]}) [ 1541.327617][ T3779] cgroup: subsys name conflicts with all 00:25:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@subsystem='blkio'}, {}]}) 00:25:42 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0x8008af26, 0xe9002) inotify_add_watch(0xffffffffffffffff, 0x0, 0x645b8dc9176338d8) [ 1544.789070][ T3783] cgroup: subsys name conflicts with all 00:25:44 executing program 1: mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4001, 0x0, 0x0, 0x0) 00:25:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@subsystem='blkio'}, {}]}) 00:25:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001440)={'batadv_slave_0\x00', 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r3, 0x10, 0x10003, 0x400) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}}, 0x0, 0x0, 0x42, 0x0, "7cb26ccab83f65b82c1634228bc5d63060e07f1ccfb0010e90de3fcee5e7b21a4617e952ed844f1312eb43d173c98ec081911010281104b308c3067f7287451effad55fe4efff5dfc697fb11aa4b338a"}, 0xd8) r4 = openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000000380), 0x200000, 0x17) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x890c, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r2}) socket$rds(0x15, 0x5, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x90000, 0x0) setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000340)=0xffffffffffffffff, 0x4) setsockopt$inet6_int(r6, 0x29, 0xc8, 0x0, 0x0) io_cancel(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x7, r6, &(0x7f0000000080)="677aff21661b1941d1bc6b268351b5ed2c5447dceac5aa393533e276614bb4c428e077d590a49be904d1073fe6cc5e8e09002818900e7af3cfde1129e6373a3049ea0e64761c46fa741ae11312ec94dedf9ea9f8aa111859b8196e648d93fde3a10b7235925b6ce9d9254a5fb714cc42cf95a82927e415ae2800ac8257402e65af5a69b730ab503cb355ebc5d30de3ec0a0f864768ce3610dd42db46e0d97353c9882957b130a69c6598f692e0e8e1350cb3c1a6cf4faaac71395e6ff649c6547bfe1a9e32138f1a8bea29ca2a3e19623eb110ef17c288c04043fd7b0e", 0xdd, 0x4, 0x0, 0x2}, &(0x7f00000001c0)) [ 1548.222511][ T3787] cgroup: subsys name conflicts with all 00:25:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)={0x14, 0x15, 0x1, 0x0, 0x0, {0x2b}}, 0x14}}, 0x0) 00:25:52 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000), 0xebc, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, 0x0) 00:25:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001440)={'batadv_slave_0\x00', 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r3, 0x10, 0x10003, 0x400) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}}, 0x0, 0x0, 0x42, 0x0, "7cb26ccab83f65b82c1634228bc5d63060e07f1ccfb0010e90de3fcee5e7b21a4617e952ed844f1312eb43d173c98ec081911010281104b308c3067f7287451effad55fe4efff5dfc697fb11aa4b338a"}, 0xd8) r4 = openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000000380), 0x200000, 0x17) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x890c, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r2}) socket$rds(0x15, 0x5, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x90000, 0x0) setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000340)=0xffffffffffffffff, 0x4) setsockopt$inet6_int(r6, 0x29, 0xc8, 0x0, 0x0) io_cancel(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x7, r6, &(0x7f0000000080)="677aff21661b1941d1bc6b268351b5ed2c5447dceac5aa393533e276614bb4c428e077d590a49be904d1073fe6cc5e8e09002818900e7af3cfde1129e6373a3049ea0e64761c46fa741ae11312ec94dedf9ea9f8aa111859b8196e648d93fde3a10b7235925b6ce9d9254a5fb714cc42cf95a82927e415ae2800ac8257402e65af5a69b730ab503cb355ebc5d30de3ec0a0f864768ce3610dd42db46e0d97353c9882957b130a69c6598f692e0e8e1350cb3c1a6cf4faaac71395e6ff649c6547bfe1a9e32138f1a8bea29ca2a3e19623eb110ef17c288c04043fd7b0e", 0xdd, 0x4, 0x0, 0x2}, &(0x7f00000001c0)) 00:25:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001440)={'batadv_slave_0\x00', 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r3, 0x10, 0x10003, 0x400) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}}, 0x0, 0x0, 0x42, 0x0, "7cb26ccab83f65b82c1634228bc5d63060e07f1ccfb0010e90de3fcee5e7b21a4617e952ed844f1312eb43d173c98ec081911010281104b308c3067f7287451effad55fe4efff5dfc697fb11aa4b338a"}, 0xd8) r4 = openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000000380), 0x200000, 0x17) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x890c, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r2}) socket$rds(0x15, 0x5, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x90000, 0x0) setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000340)=0xffffffffffffffff, 0x4) setsockopt$inet6_int(r6, 0x29, 0xc8, 0x0, 0x0) io_cancel(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x7, r6, &(0x7f0000000080)="677aff21661b1941d1bc6b268351b5ed2c5447dceac5aa393533e276614bb4c428e077d590a49be904d1073fe6cc5e8e09002818900e7af3cfde1129e6373a3049ea0e64761c46fa741ae11312ec94dedf9ea9f8aa111859b8196e648d93fde3a10b7235925b6ce9d9254a5fb714cc42cf95a82927e415ae2800ac8257402e65af5a69b730ab503cb355ebc5d30de3ec0a0f864768ce3610dd42db46e0d97353c9882957b130a69c6598f692e0e8e1350cb3c1a6cf4faaac71395e6ff649c6547bfe1a9e32138f1a8bea29ca2a3e19623eb110ef17c288c04043fd7b0e", 0xdd, 0x4, 0x0, 0x2}, &(0x7f00000001c0)) 00:25:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001440)={'batadv_slave_0\x00', 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r3, 0x10, 0x10003, 0x400) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}}, 0x0, 0x0, 0x42, 0x0, "7cb26ccab83f65b82c1634228bc5d63060e07f1ccfb0010e90de3fcee5e7b21a4617e952ed844f1312eb43d173c98ec081911010281104b308c3067f7287451effad55fe4efff5dfc697fb11aa4b338a"}, 0xd8) r4 = openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000000380), 0x200000, 0x17) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x890c, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r2}) socket$rds(0x15, 0x5, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x90000, 0x0) setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000340)=0xffffffffffffffff, 0x4) setsockopt$inet6_int(r6, 0x29, 0xc8, 0x0, 0x0) io_cancel(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x7, r6, &(0x7f0000000080)="677aff21661b1941d1bc6b268351b5ed2c5447dceac5aa393533e276614bb4c428e077d590a49be904d1073fe6cc5e8e09002818900e7af3cfde1129e6373a3049ea0e64761c46fa741ae11312ec94dedf9ea9f8aa111859b8196e648d93fde3a10b7235925b6ce9d9254a5fb714cc42cf95a82927e415ae2800ac8257402e65af5a69b730ab503cb355ebc5d30de3ec0a0f864768ce3610dd42db46e0d97353c9882957b130a69c6598f692e0e8e1350cb3c1a6cf4faaac71395e6ff649c6547bfe1a9e32138f1a8bea29ca2a3e19623eb110ef17c288c04043fd7b0e", 0xdd, 0x4, 0x0, 0x2}, &(0x7f00000001c0)) 00:25:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001440)={'batadv_slave_0\x00', 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r3, 0x10, 0x10003, 0x400) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}}, 0x0, 0x0, 0x42, 0x0, "7cb26ccab83f65b82c1634228bc5d63060e07f1ccfb0010e90de3fcee5e7b21a4617e952ed844f1312eb43d173c98ec081911010281104b308c3067f7287451effad55fe4efff5dfc697fb11aa4b338a"}, 0xd8) r4 = openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000000380), 0x200000, 0x17) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x890c, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r2}) socket$rds(0x15, 0x5, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x90000, 0x0) setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000340)=0xffffffffffffffff, 0x4) setsockopt$inet6_int(r6, 0x29, 0xc8, 0x0, 0x0) io_cancel(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x7, r6, &(0x7f0000000080)="677aff21661b1941d1bc6b268351b5ed2c5447dceac5aa393533e276614bb4c428e077d590a49be904d1073fe6cc5e8e09002818900e7af3cfde1129e6373a3049ea0e64761c46fa741ae11312ec94dedf9ea9f8aa111859b8196e648d93fde3a10b7235925b6ce9d9254a5fb714cc42cf95a82927e415ae2800ac8257402e65af5a69b730ab503cb355ebc5d30de3ec0a0f864768ce3610dd42db46e0d97353c9882957b130a69c6598f692e0e8e1350cb3c1a6cf4faaac71395e6ff649c6547bfe1a9e32138f1a8bea29ca2a3e19623eb110ef17c288c04043fd7b0e", 0xdd, 0x4, 0x0, 0x2}, &(0x7f00000001c0)) 00:26:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001440)={'batadv_slave_0\x00', 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r3, 0x10, 0x10003, 0x400) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}}, 0x0, 0x0, 0x42, 0x0, "7cb26ccab83f65b82c1634228bc5d63060e07f1ccfb0010e90de3fcee5e7b21a4617e952ed844f1312eb43d173c98ec081911010281104b308c3067f7287451effad55fe4efff5dfc697fb11aa4b338a"}, 0xd8) r4 = openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000000380), 0x200000, 0x17) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x890c, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r2}) socket$rds(0x15, 0x5, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x90000, 0x0) setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000340)=0xffffffffffffffff, 0x4) setsockopt$inet6_int(r6, 0x29, 0xc8, 0x0, 0x0) io_cancel(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x7, r6, &(0x7f0000000080)="677aff21661b1941d1bc6b268351b5ed2c5447dceac5aa393533e276614bb4c428e077d590a49be904d1073fe6cc5e8e09002818900e7af3cfde1129e6373a3049ea0e64761c46fa741ae11312ec94dedf9ea9f8aa111859b8196e648d93fde3a10b7235925b6ce9d9254a5fb714cc42cf95a82927e415ae2800ac8257402e65af5a69b730ab503cb355ebc5d30de3ec0a0f864768ce3610dd42db46e0d97353c9882957b130a69c6598f692e0e8e1350cb3c1a6cf4faaac71395e6ff649c6547bfe1a9e32138f1a8bea29ca2a3e19623eb110ef17c288c04043fd7b0e", 0xdd, 0x4, 0x0, 0x2}, &(0x7f00000001c0)) 00:26:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001440)={'batadv_slave_0\x00', 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r3, 0x10, 0x10003, 0x400) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}}, 0x0, 0x0, 0x42, 0x0, "7cb26ccab83f65b82c1634228bc5d63060e07f1ccfb0010e90de3fcee5e7b21a4617e952ed844f1312eb43d173c98ec081911010281104b308c3067f7287451effad55fe4efff5dfc697fb11aa4b338a"}, 0xd8) r4 = openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000000380), 0x200000, 0x17) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x890c, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r2}) socket$rds(0x15, 0x5, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x90000, 0x0) setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000340)=0xffffffffffffffff, 0x4) setsockopt$inet6_int(r6, 0x29, 0xc8, 0x0, 0x0) io_cancel(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x7, r6, &(0x7f0000000080)="677aff21661b1941d1bc6b268351b5ed2c5447dceac5aa393533e276614bb4c428e077d590a49be904d1073fe6cc5e8e09002818900e7af3cfde1129e6373a3049ea0e64761c46fa741ae11312ec94dedf9ea9f8aa111859b8196e648d93fde3a10b7235925b6ce9d9254a5fb714cc42cf95a82927e415ae2800ac8257402e65af5a69b730ab503cb355ebc5d30de3ec0a0f864768ce3610dd42db46e0d97353c9882957b130a69c6598f692e0e8e1350cb3c1a6cf4faaac71395e6ff649c6547bfe1a9e32138f1a8bea29ca2a3e19623eb110ef17c288c04043fd7b0e", 0xdd, 0x4, 0x0, 0x2}, &(0x7f00000001c0)) 00:26:05 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x182, 0x0) sendfile(r0, r0, 0x0, 0x4b203622) ioctl$BLKRRPART(r0, 0x125f, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x402100, 0x0) getcwd(&(0x7f0000000300)=""/245, 0x122) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f00000001c0)={0x6, 0x1f, 0x0, 0x0, 0x4e, "07327a7bbd0a00"}) r1 = openat(0xffffffffffffff9c, 0x0, 0x1636e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0xffffffff7ffffffb) socket$alg(0x26, 0x5, 0x0) 00:26:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20020, &(0x7f0000000340)=ANY=[]) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000024c0), 0x4) [ 1573.018145][ T3811] sctp: [Deprecated]: syz-executor.0 (pid 3811) Use of int in maxseg socket option. [ 1573.018145][ T3811] Use struct sctp_assoc_value instead [ 1573.296757][ T3809] EXT4-fs (vda): re-mounted 63c8d848-cf63-4a7d-9e29-be05513524b0. Quota mode: none. 00:26:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20020, &(0x7f0000000340)=ANY=[]) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000024c0), 0x4) 00:26:15 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x182, 0x0) sendfile(r0, r0, 0x0, 0x4b203622) ioctl$BLKRRPART(r0, 0x125f, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x402100, 0x0) getcwd(&(0x7f0000000300)=""/245, 0x122) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f00000001c0)={0x6, 0x1f, 0x0, 0x0, 0x4e, "07327a7bbd0a00"}) r1 = openat(0xffffffffffffff9c, 0x0, 0x1636e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0xffffffff7ffffffb) socket$alg(0x26, 0x5, 0x0) [ 1576.776818][ T3815] ext4: Unknown parameter '0 80 ip_vti0 [ 1576.776818][ T3815] fe800000000000000000000000000023 2d 78 20 80 hsr0 [ 1576.776818][ T3815] fe800000000000000000000000000035 35 78 20 80 macvlan1 [ 1576.776818][ T3815] 000000000000000000000000ac141410 0a 60 80 80 ip6gre0 [ 1576.776818][ T3815] fe80000000000000a8aaaafffeaaaa2e 2e 40 20 80 veth1_virt_wifi [ 1576.776818][ T3815] fe80000000000000a8aaaafffeaaaa1c 1a 40 20 80 veth1_to_bridge [ 1576.776818][ T3815] fe800000000000000000000000000018 13 78 20 80 veth0 [ 1576.776818][ T3815] fe800000000000006427c8fffef1e4a7 40 40 20 80 netdevsim2 [ 1576.776818][ T3815] fe80000000000000000000000000003c 24 78 20 80 veth0_to_batadv [ 1576.776818][ T3815] fe80000000000000a8aaaafffeaaaa39 38 40 20 80 veth1_macvtap [ 1576.776818][ T3815] 00000000000000000000000000000001 01 80 10 80 lo [ 1576.776818][ T3815] fe80000000000000a8aaaafffeaaaa15 0c 40 20 80 ip6gretap0 [ 1576.776818][ T3815] fe80000000000000000000000000001f 20 78 20 c0 veth0_to_team [ 1577.008892][ T3815] sctp: [Deprecated]: syz-executor.0 (pid 3815) Use of int in maxseg socket option. [ 1577.008892][ T3815] Use struct sctp_assoc_value instead 00:26:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20020, &(0x7f0000000340)=ANY=[]) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000024c0), 0x4) [ 1580.630732][ T3821] ext4: Unknown parameter '0 80 ip_vti0 [ 1580.630732][ T3821] fe800000000000000000000000000023 2d 78 20 80 hsr0 [ 1580.630732][ T3821] fe800000000000000000000000000035 35 78 20 80 macvlan1 [ 1580.630732][ T3821] 000000000000000000000000ac141410 0a 60 80 80 ip6gre0 [ 1580.630732][ T3821] fe80000000000000a8aaaafffeaaaa2e 2e 40 20 80 veth1_virt_wifi [ 1580.630732][ T3821] fe80000000000000a8aaaafffeaaaa1c 1a 40 20 80 veth1_to_bridge [ 1580.630732][ T3821] fe800000000000000000000000000018 13 78 20 80 veth0 [ 1580.630732][ T3821] fe800000000000006427c8fffef1e4a7 40 40 20 80 netdevsim2 [ 1580.630732][ T3821] fe80000000000000000000000000003c 24 78 20 80 veth0_to_batadv [ 1580.630732][ T3821] fe80000000000000a8aaaafffeaaaa39 38 40 20 80 veth1_macvtap [ 1580.630732][ T3821] 00000000000000000000000000000001 01 80 10 80 lo [ 1580.630732][ T3821] fe80000000000000a8aaaafffeaaaa15 0c 40 20 80 ip6gretap0 [ 1580.630732][ T3821] fe80000000000000000000000000001f 20 78 20 c0 veth0_to_team [ 1580.970728][ T3821] sctp: [Deprecated]: syz-executor.0 (pid 3821) Use of int in maxseg socket option. [ 1580.970728][ T3821] Use struct sctp_assoc_value instead 00:26:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20020, &(0x7f0000000340)=ANY=[]) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000024c0), 0x4) 00:26:22 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x182, 0x0) sendfile(r0, r0, 0x0, 0x4b203622) ioctl$BLKRRPART(r0, 0x125f, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x402100, 0x0) getcwd(&(0x7f0000000300)=""/245, 0x122) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f00000001c0)={0x6, 0x1f, 0x0, 0x0, 0x4e, "07327a7bbd0a00"}) r1 = openat(0xffffffffffffff9c, 0x0, 0x1636e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0xffffffff7ffffffb) socket$alg(0x26, 0x5, 0x0) [ 1583.931957][ T3823] ext4: Unknown parameter '0 80 ip_vti0 [ 1583.931957][ T3823] fe800000000000000000000000000023 2d 78 20 80 hsr0 [ 1583.931957][ T3823] fe800000000000000000000000000035 35 78 20 80 macvlan1 [ 1583.931957][ T3823] 000000000000000000000000ac141410 0a 60 80 80 ip6gre0 [ 1583.931957][ T3823] fe80000000000000a8aaaafffeaaaa2e 2e 40 20 80 veth1_virt_wifi [ 1583.931957][ T3823] fe80000000000000a8aaaafffeaaaa1c 1a 40 20 80 veth1_to_bridge [ 1583.931957][ T3823] fe800000000000000000000000000018 13 78 20 80 veth0 [ 1583.931957][ T3823] fe800000000000006427c8fffef1e4a7 40 40 20 80 netdevsim2 [ 1583.931957][ T3823] fe80000000000000000000000000003c 24 78 20 80 veth0_to_batadv [ 1583.931957][ T3823] fe80000000000000a8aaaafffeaaaa39 38 40 20 80 veth1_macvtap [ 1583.931957][ T3823] 00000000000000000000000000000001 01 80 10 80 lo [ 1583.931957][ T3823] fe80000000000000a8aaaafffeaaaa15 0c 40 20 80 ip6gretap0 [ 1583.931957][ T3823] fe80000000000000000000000000001f 20 78 20 c0 veth0_to_team [ 1584.065871][ T3823] sctp: [Deprecated]: syz-executor.0 (pid 3823) Use of int in maxseg socket option. [ 1584.065871][ T3823] Use struct sctp_assoc_value instead 00:26:25 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x182, 0x0) sendfile(r0, r0, 0x0, 0x4b203622) ioctl$BLKRRPART(r0, 0x125f, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x402100, 0x0) getcwd(&(0x7f0000000300)=""/245, 0x122) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f00000001c0)={0x6, 0x1f, 0x0, 0x0, 0x4e, "07327a7bbd0a00"}) r1 = openat(0xffffffffffffff9c, 0x0, 0x1636e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0xffffffff7ffffffb) socket$alg(0x26, 0x5, 0x0) 00:26:29 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x182, 0x0) sendfile(r0, r0, 0x0, 0x4b203622) ioctl$BLKRRPART(r0, 0x125f, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x402100, 0x0) getcwd(&(0x7f0000000300)=""/245, 0x122) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f00000001c0)={0x6, 0x1f, 0x0, 0x0, 0x4e, "07327a7bbd0a00"}) r1 = openat(0xffffffffffffff9c, 0x0, 0x1636e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0xffffffff7ffffffb) socket$alg(0x26, 0x5, 0x0) 00:26:31 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x182, 0x0) sendfile(r0, r0, 0x0, 0x4b203622) ioctl$BLKRRPART(r0, 0x125f, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x402100, 0x0) getcwd(&(0x7f0000000300)=""/245, 0x122) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f00000001c0)={0x6, 0x1f, 0x0, 0x0, 0x4e, "07327a7bbd0a00"}) r1 = openat(0xffffffffffffff9c, 0x0, 0x1636e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0xffffffff7ffffffb) socket$alg(0x26, 0x5, 0x0) 00:26:39 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x182, 0x0) sendfile(r0, r0, 0x0, 0x4b203622) ioctl$BLKRRPART(r0, 0x125f, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x402100, 0x0) getcwd(&(0x7f0000000300)=""/245, 0x122) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f00000001c0)={0x6, 0x1f, 0x0, 0x0, 0x4e, "07327a7bbd0a00"}) r1 = openat(0xffffffffffffff9c, 0x0, 0x1636e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0xffffffff7ffffffb) socket$alg(0x26, 0x5, 0x0) 00:26:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20020, &(0x7f0000000340)=ANY=[]) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000024c0), 0x4) [ 1604.348678][ T3844] ext4: Unknown parameter '0 80 geneve0 [ 1604.348678][ T3844] fe800000000000000000000000000015 0c 78 20 80 ip6gretap0 [ 1604.348678][ T3844] fe800000000000000000000000000031 30 78 20 80 veth1_vlan [ 1604.348678][ T3844] fe80000000000000a8aaaafffeaaaa38 39 40 20 80 veth0_macvtap [ 1604.348678][ T3844] fe8000000000000058d31dfffe90bdad 41 40 20 80 netdevsim3 [ 1604.348678][ T3844] 000000000000000000000000ac14140b 0a 60 80 80 ip6gre0 [ 1604.348678][ T3844] 000000000000000000000000ac14140b 03 60 80 80 gre0 [ 1604.348678][ T3844] 000000000000000000000000ac14140b 08 60 80 80 sit0 [ 1604.348678][ T3844] fe80000000000000a8aaaafffeaaaa1c 1a 40 20 80 veth1_to_bridge [ 1604.348678][ T3844] fe80000000000000000000000000001c 1a 78 20 80 veth1_to_bridge [ 1604.348678][ T3844] fe80000000000000000000000000000a 01 78 20 80 lo [ 1604.348678][ T3844] fe800000000000000000000000000038 39 78 20 80 veth0_macvtap [ 1604.348678][ T3844] fe80000000000000a8aaaafffeaaaa31 30 40 20 80 veth1_vlan [ 1604.507964][ T3844] sctp: [Deprecated]: syz-executor.1 (pid 3844) Use of int in maxseg socket option. [ 1604.507964][ T3844] Use struct sctp_assoc_value instead ps_root_recvmsgcb: failed to send message to pid 3760: Connection refused ps_root_recvmsgcb: failed to send message to pid 3762: Connection refused ps_root_recvmsgcb: failed to send message to pid 3761: Connection refused ps_root_recvmsgcb: failed to send message to pid 3767: Connection refused 00:26:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20020, &(0x7f0000000340)=ANY=[]) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000024c0), 0x4) [ 1610.357478][ T3849] ext4: Unknown parameter '0 80 geneve0 [ 1610.357478][ T3849] fe800000000000000000000000000015 0c 78 20 80 ip6gretap0 [ 1610.357478][ T3849] fe800000000000000000000000000031 30 78 20 80 veth1_vlan [ 1610.357478][ T3849] fe80000000000000a8aaaafffeaaaa38 39 40 20 80 veth0_macvtap [ 1610.357478][ T3849] fe8000000000000058d31dfffe90bdad 41 40 20 80 netdevsim3 [ 1610.357478][ T3849] 000000000000000000000000ac14140b 0a 60 80 80 ip6gre0 [ 1610.357478][ T3849] 000000000000000000000000ac14140b 03 60 80 80 gre0 [ 1610.357478][ T3849] 000000000000000000000000ac14140b 08 60 80 80 sit0 [ 1610.357478][ T3849] fe80000000000000a8aaaafffeaaaa1c 1a 40 20 80 veth1_to_bridge [ 1610.357478][ T3849] fe80000000000000000000000000001c 1a 78 20 80 veth1_to_bridge [ 1610.357478][ T3849] fe80000000000000000000000000000a 01 78 20 80 lo [ 1610.357478][ T3849] fe800000000000000000000000000038 39 78 20 80 veth0_macvtap [ 1610.357478][ T3849] fe80000000000000a8aaaafffeaaaa31 30 40 20 80 veth1_vlan [ 1610.507006][ T3849] sctp: [Deprecated]: syz-executor.1 (pid 3849) Use of int in maxseg socket option. [ 1610.507006][ T3849] Use struct sctp_assoc_value instead 00:26:50 executing program 0: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) sendmmsg(r0, &(0x7f0000009bc0)=[{{&(0x7f0000002ac0)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, 0x0}}], 0x1, 0x0) 00:26:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20020, &(0x7f0000000340)=ANY=[]) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000024c0), 0x4) 00:26:52 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000016c0), 0x0, 0x0) readv(r0, &(0x7f0000006140)=[{&(0x7f0000006080)=""/11, 0xb}], 0x1) [ 1614.910262][ T3854] ext4: Unknown parameter '0 80 geneve0 [ 1614.910262][ T3854] fe800000000000000000000000000015 0c 78 20 80 ip6gretap0 [ 1614.910262][ T3854] fe800000000000000000000000000031 30 78 20 80 veth1_vlan [ 1614.910262][ T3854] fe80000000000000a8aaaafffeaaaa38 39 40 20 80 veth0_macvtap [ 1614.910262][ T3854] fe8000000000000058d31dfffe90bdad 41 40 20 80 netdevsim3 [ 1614.910262][ T3854] 000000000000000000000000ac14140b 0a 60 80 80 ip6gre0 [ 1614.910262][ T3854] 000000000000000000000000ac14140b 03 60 80 80 gre0 [ 1614.910262][ T3854] 000000000000000000000000ac14140b 08 60 80 80 sit0 [ 1614.910262][ T3854] fe80000000000000a8aaaafffeaaaa1c 1a 40 20 80 veth1_to_bridge [ 1614.910262][ T3854] fe80000000000000000000000000001c 1a 78 20 80 veth1_to_bridge [ 1614.910262][ T3854] fe80000000000000000000000000000a 01 78 20 80 lo [ 1614.910262][ T3854] fe800000000000000000000000000038 39 78 20 80 veth0_macvtap [ 1614.910262][ T3854] fe80000000000000a8aaaafffeaaaa31 30 40 20 80 veth1_vlan [ 1614.959432][ T3854] sctp: [Deprecated]: syz-executor.1 (pid 3854) Use of int in maxseg socket option. [ 1614.959432][ T3854] Use struct sctp_assoc_value instead 00:26:55 executing program 1: add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000b00)="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", 0x5c1, 0xffffffffffffffff) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000b00)="b9", 0x1, 0xffffffffffffffff) 00:26:55 executing program 0: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) 00:26:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x44, r2, 0x921, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6}]}]}, 0x44}}, 0x0) 00:27:00 executing program 1: add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000b00)="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", 0x5c1, 0xffffffffffffffff) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000b00)="b9", 0x1, 0xffffffffffffffff) 00:27:02 executing program 1: add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000b00)="b9eb954bfed65a39b7bfb22c1723e71d762176d4a83eb72db434b2559b6e44680253f1fb510f9a38267648fe0303ff02ddff153b4e4bf2ec39f6db1b63ed594ecbe6c9ed3a3f79b6e8f05105a2ab04b59b210afd7f3d4fd8bf3210c2279a216f086758ff16dc2b7b3daf53d2e7ac22a8fe22c307f0c3f6ebe8476772831833ba3d6012efe99edf7ec4915adc3149637e41975352e733f48e09034792400602d99bc6a0413682d2ddf4e2a42af4eefcc2853d17769d77f5d13ef731ce6c18fefdb12c899e21a138eb776f10d347ee24f95d50caa1babc76ff2df115ceb46459a8ce5d7afa9343b7f62b379bcef6442b726befabd8d30d6cefbf20879525db9b16c81e6faa78accbc592dd1c327f4644db9dfd39522203a28266e988d90750b31e0fe92a3a355e3e5391ecb4c360c0e3151f0c371597959d9113cf3e94dda47b35cc4201f5186423322a67d1a0051fe8db5abb79f549a171a51d37ccf2f297e5980a56ee5733684f2789eb220a10da6cac908cfa09958a2111f47d77b72dc5c74a8f6305f93da9d67b01db7f45fcd2f38e5c7a0e69480d278981eaa0eb428801e3eaa05ac0f956d66dbe398aa38bdf3d979d7dea7c0c1c0d70b8d1871b188852677d1a925bb98541b1c3a3466ccc52b3d9b108213f25c291a4e9d5068dbbcbf929588407d97eff300f8c5e3c6ca357b7905a8cc27279fc0492ce7da7be0829e726ce1b9f1d9b6181cdc2cdcc2b672fe02393e2bf348da9cc6a87d4ec5859331ab31e22d68c76809460c6e971da9c20efb96b1693fad117b2ddead102c13cdea9c65fa7ce5458e09287b4d1fe8abeb78423506a76560e81f6f58e3e8ebc6d1f6ea2c7f00678cba3da2965d063e415d9b45bba802a9795ea96035b3c41bd7954436fff82884c1930c347873c7b7bba2cc7a449a59e54452f950f72ddf7e3335620be74256749a9c1c40f7ad3ef4397473d9d05f59ed9fe482e959fcffbb23ead4e46fef57c015937974a200ba46ec83b3051894022821faf712af92a15ca85ff0cf13ac3f70add0441553543b137d71f493bc1acd7ee0c738d3a12d3f07d72a6305256facdf8f44cdaf87473a89cac04eb6d63e6923c949032c0c5f39b3843662c924f1d80e0d6c69443da98a833477d2d7704e8c39049ed7fc152dcb7263ef6c9bd17e610273e890ddd1485a0f906685115b50a80a162c4d051a73c6623665acd4c41c014ee02d94789d3ab710d03b2fa0b9f0043297b6e264112eda96b34c8f8c345e4bb5ff6d33e27f00fffa27d5d6a627c36971fe2b6c2d716c5d15920366293e74b9ab7b86862bf76447efc021b317b7aed1bb0eb1b67e24746c5e1da7cdf48f3f44cd1414d6fb881c1d90c8caa59dfd3f8ff128c7a498cc798c2d1338f85c0b48f3a5f2bf52b73067970129c788d686b482d4018058ec33fd62ff4bfd90234db1b6cd044e3e04b749d767b5cb03dcecf4177da1501bd92cafb8ec124ff6c6888f5414bc1d641f5630c60678bf63fde9a705ca5a3676b7e18e02663fe40a686fc0bc2428f7afc0c1f8f485a7df6872349d9588a23421bdc5bbb43a822ed8e1f3055271b02e392921f7467ce52467d602f00f4a298cf44ce5dbf03ca411d66182d768dbaaa10ceec2a84c8468c238263d9d8df8d76a8b028f9f3d13c812723c90a4a8bef00743e77a815509010a459b2fd5da1a939af5df1fe0500ec1b71bdf86c8166e754c544cdb2aa2adbbb8ed89ac91d8be2bcd851cbf4c37f5360cf1a58625b4518424fc2d0c943137dfefa34cf6553e37f8fc1059e50fd5ca368bd37028ed292d702dc1509972f19c73bfd77082a7af46a1973797f1a6f4fb429abf73bc44c42d112ad4cdd9d6e6a57fc5550f5a9aa7861fa33003b2079d6e56798e879a2927b3aaae5bca1c1ca18fe83487c6732d3f9ceb51db40fdf100cbb01ae49dd1e17d24dd7fd3b904f0358f0ad0d5bf105c291bcab35a45786baadaa347fd8cd7dafe1ca682c121f6705f24a476f956a01f106d7a72ad221c8e1aa063d55e09949eaff1d168385c4ae99ecd7a4d23dd9d38aecedb4d1c6e6b30f39b6eaddf09a73", 0x5c1, 0xffffffffffffffff) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000b00)="b9", 0x1, 0xffffffffffffffff) 00:27:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000001c40)={0xa, 0x0, 0x0, @private2}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f0000000000)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x74, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1408}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @initdev={0xac, 0x1e, 0xfe, 0x0}}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xf000}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x74}}, 0x0) 00:27:06 executing program 1: add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000b00)="b9eb954bfed65a39b7bfb22c1723e71d762176d4a83eb72db434b2559b6e44680253f1fb510f9a38267648fe0303ff02ddff153b4e4bf2ec39f6db1b63ed594ecbe6c9ed3a3f79b6e8f05105a2ab04b59b210afd7f3d4fd8bf3210c2279a216f086758ff16dc2b7b3daf53d2e7ac22a8fe22c307f0c3f6ebe8476772831833ba3d6012efe99edf7ec4915adc3149637e41975352e733f48e09034792400602d99bc6a0413682d2ddf4e2a42af4eefcc2853d17769d77f5d13ef731ce6c18fefdb12c899e21a138eb776f10d347ee24f95d50caa1babc76ff2df115ceb46459a8ce5d7afa9343b7f62b379bcef6442b726befabd8d30d6cefbf20879525db9b16c81e6faa78accbc592dd1c327f4644db9dfd39522203a28266e988d90750b31e0fe92a3a355e3e5391ecb4c360c0e3151f0c371597959d9113cf3e94dda47b35cc4201f5186423322a67d1a0051fe8db5abb79f549a171a51d37ccf2f297e5980a56ee5733684f2789eb220a10da6cac908cfa09958a2111f47d77b72dc5c74a8f6305f93da9d67b01db7f45fcd2f38e5c7a0e69480d278981eaa0eb428801e3eaa05ac0f956d66dbe398aa38bdf3d979d7dea7c0c1c0d70b8d1871b188852677d1a925bb98541b1c3a3466ccc52b3d9b108213f25c291a4e9d5068dbbcbf929588407d97eff300f8c5e3c6ca357b7905a8cc27279fc0492ce7da7be0829e726ce1b9f1d9b6181cdc2cdcc2b672fe02393e2bf348da9cc6a87d4ec5859331ab31e22d68c76809460c6e971da9c20efb96b1693fad117b2ddead102c13cdea9c65fa7ce5458e09287b4d1fe8abeb78423506a76560e81f6f58e3e8ebc6d1f6ea2c7f00678cba3da2965d063e415d9b45bba802a9795ea96035b3c41bd7954436fff82884c1930c347873c7b7bba2cc7a449a59e54452f950f72ddf7e3335620be74256749a9c1c40f7ad3ef4397473d9d05f59ed9fe482e959fcffbb23ead4e46fef57c015937974a200ba46ec83b3051894022821faf712af92a15ca85ff0cf13ac3f70add0441553543b137d71f493bc1acd7ee0c738d3a12d3f07d72a6305256facdf8f44cdaf87473a89cac04eb6d63e6923c949032c0c5f39b3843662c924f1d80e0d6c69443da98a833477d2d7704e8c39049ed7fc152dcb7263ef6c9bd17e610273e890ddd1485a0f906685115b50a80a162c4d051a73c6623665acd4c41c014ee02d94789d3ab710d03b2fa0b9f0043297b6e264112eda96b34c8f8c345e4bb5ff6d33e27f00fffa27d5d6a627c36971fe2b6c2d716c5d15920366293e74b9ab7b86862bf76447efc021b317b7aed1bb0eb1b67e24746c5e1da7cdf48f3f44cd1414d6fb881c1d90c8caa59dfd3f8ff128c7a498cc798c2d1338f85c0b48f3a5f2bf52b73067970129c788d686b482d4018058ec33fd62ff4bfd90234db1b6cd044e3e04b749d767b5cb03dcecf4177da1501bd92cafb8ec124ff6c6888f5414bc1d641f5630c60678bf63fde9a705ca5a3676b7e18e02663fe40a686fc0bc2428f7afc0c1f8f485a7df6872349d9588a23421bdc5bbb43a822ed8e1f3055271b02e392921f7467ce52467d602f00f4a298cf44ce5dbf03ca411d66182d768dbaaa10ceec2a84c8468c238263d9d8df8d76a8b028f9f3d13c812723c90a4a8bef00743e77a815509010a459b2fd5da1a939af5df1fe0500ec1b71bdf86c8166e754c544cdb2aa2adbbb8ed89ac91d8be2bcd851cbf4c37f5360cf1a58625b4518424fc2d0c943137dfefa34cf6553e37f8fc1059e50fd5ca368bd37028ed292d702dc1509972f19c73bfd77082a7af46a1973797f1a6f4fb429abf73bc44c42d112ad4cdd9d6e6a57fc5550f5a9aa7861fa33003b2079d6e56798e879a2927b3aaae5bca1c1ca18fe83487c6732d3f9ceb51db40fdf100cbb01ae49dd1e17d24dd7fd3b904f0358f0ad0d5bf105c291bcab35a45786baadaa347fd8cd7dafe1ca682c121f6705f24a476f956a01f106d7a72ad221c8e1aa063d55e09949eaff1d168385c4ae99ecd7a4d23dd9d38aecedb4d1c6e6b30f39b6eaddf09a73", 0x5c1, 0xffffffffffffffff) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000b00)="b9", 0x1, 0xffffffffffffffff) 00:27:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000040)={0x14, 0x14, 0x1, 0x0, 0x0, {0x1a}}, 0x14}}, 0x0) 00:27:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000001c40)={0xa, 0x0, 0x0, @private2}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f0000000000)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x74, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1408}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @initdev={0xac, 0x1e, 0xfe, 0x0}}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xf000}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x74}}, 0x0) 00:27:16 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000001c40)={0xa, 0x0, 0x0, @private2}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f0000000000)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x74, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1408}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @initdev={0xac, 0x1e, 0xfe, 0x0}}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xf000}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x74}}, 0x0) 00:27:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000001c40)={0xa, 0x0, 0x0, @private2}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f0000000000)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x74, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1408}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @initdev={0xac, 0x1e, 0xfe, 0x0}}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xf000}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x74}}, 0x0) 00:27:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000001c40)={0xa, 0x0, 0x0, @private2}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f0000000000)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x74, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1408}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @initdev={0xac, 0x1e, 0xfe, 0x0}}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xf000}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x74}}, 0x0) 00:27:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000001c40)={0xa, 0x0, 0x0, @private2}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f0000000000)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x74, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1408}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @initdev={0xac, 0x1e, 0xfe, 0x0}}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xf000}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x74}}, 0x0) [ 1645.973588][ C0] hrtimer: interrupt took 1547400 ns 00:27:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000001c40)={0xa, 0x0, 0x0, @private2}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f0000000000)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x74, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1408}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_PMTUDISC={0x5}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @initdev={0xac, 0x1e, 0xfe, 0x0}}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xf000}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x74}}, 0x0) 00:27:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r0, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/124, 0x7c}], 0x1, 0x59, 0x0) 00:27:33 executing program 0: unshare(0x11400) 00:27:35 executing program 1: syz_emit_ethernet(0x6f, &(0x7f0000000040)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"4cc8d2abaa47dd9bdf1ae535f354cd8a925c20e56d8642e1e065e0aa9361d4a83c0d0e6a9a53ad398f9053dd63943a46a1f95fc7f93f000000"}}}}}}, 0x0) 00:27:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', 0x0}) 00:27:37 executing program 1: syz_emit_ethernet(0x6f, &(0x7f0000000040)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"4cc8d2abaa47dd9bdf1ae535f354cd8a925c20e56d8642e1e065e0aa9361d4a83c0d0e6a9a53ad398f9053dd63943a46a1f95fc7f93f000000"}}}}}}, 0x0) 00:27:39 executing program 1: syz_emit_ethernet(0x6f, &(0x7f0000000040)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"4cc8d2abaa47dd9bdf1ae535f354cd8a925c20e56d8642e1e065e0aa9361d4a83c0d0e6a9a53ad398f9053dd63943a46a1f95fc7f93f000000"}}}}}}, 0x0) 00:27:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', 0x0}) 00:27:41 executing program 1: syz_emit_ethernet(0x6f, &(0x7f0000000040)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"4cc8d2abaa47dd9bdf1ae535f354cd8a925c20e56d8642e1e065e0aa9361d4a83c0d0e6a9a53ad398f9053dd63943a46a1f95fc7f93f000000"}}}}}}, 0x0) 00:27:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setreuid(0x0, r1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0xc0045878, 0x0) 00:27:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', 0x0}) 00:27:47 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xd3, 0x0) lseek(r0, 0x0, 0x0) [ 1669.549193][ T3947] warn_alloc: 3 callbacks suppressed [ 1669.551381][ T3947] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 1669.588593][ T3947] CPU: 1 PID: 3947 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 1669.589643][ T3947] Hardware name: riscv-virtio,qemu (DT) [ 1669.590395][ T3947] Call Trace: [ 1669.591120][ T3947] [] dump_backtrace+0x2e/0x3c [ 1669.592331][ T3947] [] show_stack+0x34/0x40 [ 1669.593338][ T3947] [] dump_stack_lvl+0xe0/0x14c [ 1669.594881][ T3947] [] dump_stack+0x1c/0x24 [ 1669.596048][ T3947] [] warn_alloc+0x168/0x22c [ 1669.597163][ T3947] [] __vmalloc_node_range+0xb6c/0xdb4 [ 1669.598246][ T3947] [] bpf_jit_alloc_exec+0x46/0x52 [ 1669.599266][ T3947] [] bpf_jit_binary_alloc+0x96/0x13c [ 1669.600309][ T3947] [] bpf_int_jit_compile+0x886/0xaa6 [ 1669.601580][ T3947] [] bpf_prog_select_runtime+0x1a2/0x22e [ 1669.602801][ T3947] [] bpf_migrate_filter+0x258/0x2be [ 1669.604317][ T3947] [] bpf_prepare_filter+0x10e/0x1b4 [ 1669.605856][ T3947] [] __get_filter+0x148/0x1a0 [ 1669.606903][ T3947] [] sk_attach_filter+0x22/0x11a [ 1669.608014][ T3947] [] sk_setsockopt+0x144e/0x270c [ 1669.609053][ T3947] [] sock_setsockopt+0x48/0x58 [ 1669.610124][ T3947] [] __sys_setsockopt+0x3f0/0x418 [ 1669.611160][ T3947] [] sys_setsockopt+0x3a/0x4c [ 1669.612236][ T3947] [] ret_from_syscall+0x0/0x2 [ 1669.772628][ T3947] Mem-Info: [ 1669.775700][ T3947] active_anon:64576 inactive_anon:69 isolated_anon:0 [ 1669.775700][ T3947] active_file:0 inactive_file:7376 isolated_file:0 [ 1669.775700][ T3947] unevictable:768 dirty:18 writeback:0 [ 1669.775700][ T3947] slab_reclaimable:5483 slab_unreclaimable:23658 [ 1669.775700][ T3947] mapped:8729 shmem:887 pagetables:339 [ 1669.775700][ T3947] sec_pagetables:0 bounce:0 [ 1669.775700][ T3947] kernel_misc_reclaimable:0 [ 1669.775700][ T3947] free:193454 free_pcp:420 free_cma:4096 [ 1669.778400][ T3947] Node 0 active_anon:258304kB inactive_anon:276kB active_file:0kB inactive_file:29504kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34916kB dirty:72kB writeback:0kB shmem:3548kB writeback_tmp:0kB kernel_stack:5408kB pagetables:1356kB sec_pagetables:0kB all_unreclaimable? no [ 1669.780981][ T3947] Node 0 DMA32 free:773816kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:258304kB inactive_anon:276kB active_file:0kB inactive_file:29504kB unevictable:3072kB writepending:72kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:1680kB local_pcp:832kB free_cma:16384kB [ 1669.821081][ T3947] lowmem_reserve[]: 0 0 0 [ 1669.823156][ T3947] Node 0 DMA32: 476*4kB (UME) 539*8kB (UME) 309*16kB (UME) 137*32kB (UME) 56*64kB (UME) 24*128kB (UME) 18*256kB (UME) 13*512kB (ME) 9*1024kB (ME) 3*2048kB (MC) 177*4096kB (UMC) = 773816kB [ 1669.831654][ T3947] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1669.895152][ T3947] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 1669.896465][ T3947] 8263 total pagecache pages [ 1669.897393][ T3947] 0 pages in swap cache [ 1669.898299][ T3947] Free swap = 0kB [ 1669.899124][ T3947] Total swap = 0kB [ 1669.899988][ T3947] 523776 pages RAM [ 1669.900760][ T3947] 0 pages HighMem/MovableOnly [ 1669.901650][ T3947] 184025 pages reserved [ 1669.902492][ T3947] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:27:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', 0x0}) 00:27:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3ce, &(0x7f00000004c0)="$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") [ 1678.277104][ T3963] loop1: detected capacity change from 0 to 512 [ 1679.362701][ T3963] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 00:27:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@ipv6_delrule={0x24, 0x21, 0x11, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_PRIORITY={0x8, 0x6, 0x1}]}, 0x24}}, 0x0) 00:28:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3ce, &(0x7f00000004c0)="$eJzs3M9rHFUcAPDvTH7UpjUbQVD0EvFgpJif1lbxYE5e9KR48bQk6Q9ME2lWsCVCBc8FQdCrR/8A8dKDgtW/wKtHkUKQJN5XZndmMybZtJtuHNl8PvDIe/M2+97MY2bfPN57AZxakxHxVkQMRcRsRNTy42ke4k47ZJ/b3d5cykISzeZ7fyWRRMTO9uZS8V1J/vdc/gVTaUT6RRLPH1Luxq3bH9VXV1du5umZxo2PZzZu3X7l+o361ZWrK2sLC/Pzly/OXnrtct/O9evNdz/84fe3d765M/5Mfbl2N6vv+TyvfB79MhmTnWuy3+v9LqxiT5TiyXCFFQEA4Ehp3vcfbvX/azEUe523Wtz9udLKAQAAAH3RbBZ/AQAAgMGVePcHAACAAVfMA9jZ3lwqQoXTEfiPbS1GxES7/Yv13e2c4c6a3pF963v7aTIi/p76/uUsxAmtwwYAAAA4zX5cbG/8d3D8L41nS587GxFjxd5+fTS5L31w/Cd90OciKdlajHiztLfjbqn9cxNDeerJ1lDhSHLl+urKbESMR8RUjJzJ0nNHlDH+xh/3uuWVx/+ykJVfjAXm9XgwfObf/7Ncb9Qf55zZs/V5xHPDh7V/0hnzLe+TeRyfXfvyWre8h7c/J6n5bcRLh97/ezuXJkfvzzrTeh7MFE+Fg9bu3X+hW/nav1rZ/T92dPtPJOX9ejd6L+OD++d/65Z33Of/aPJ+q4Kj+bFP643GzbmI0eSdg8fne6/zoCquR3G9svafevHw3/+i/5fkv/3jpf2he/HTL7uXuuW5/6uVtf9yT/d/75GLv353oVv5j3b/v9qqzFR+RP/v4R61gaquJwAAAAAAAAD9kbbm9iXpdCeeptPT7Xm+T8dYurq+0bhwZf2TteX2HMCJGEmLmV610nzQufYy8k56fl96ISKeioivamdb6eml9dXlqk8eAAAATolzXd7/M38eZ7EHAAAA8P80UXUFAAAAgBPn/R8AAAAG2uPs6y8iIjKokaqfTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACn2z8BAAD//yly2dE=") [ 1681.296566][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:28:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/rt6_stats\x00') pread64(r0, &(0x7f0000000040)=""/55, 0x37, 0x7) [ 1684.591080][ T3971] loop1: detected capacity change from 0 to 512 [ 1685.420899][ T3971] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 00:28:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/ip_mr_vif\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 00:28:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3ce, &(0x7f00000004c0)="$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") [ 1687.419663][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:28:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/ip_mr_vif\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) [ 1691.436448][ T3982] loop1: detected capacity change from 0 to 512 [ 1691.855369][ T3982] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 00:28:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/ip_mr_vif\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 00:28:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3ce, &(0x7f00000004c0)="$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") [ 1693.198878][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:28:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/ip_mr_vif\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) [ 1696.412555][ T3991] loop1: detected capacity change from 0 to 512 [ 1696.996082][ T3991] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1698.605106][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:28:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="004cfe69b85cc50ae525305f8ce665221f37a76996b0df6a27ee0e1d1d7bdc7f2b7ebe2d1349c52ed77832aba1e445662473dda99d3cbd83dd47ca8ba95a43031e3755fe5795c32db27c7465b661d30114885d0fd48bf25f4f1603d9e9fa038214d679cb5b97fa44a543ecdf110436692e17d3a5883fe6aa931dea4be0be99ba381a1ff0c4ca18560c8d36c7b61008a7cd22b49a90bbf91ea50da741528f140b2eda7f1dadac733b91482d7ca47cac7fdd126bbea3ae440d89e31b5b8ee19edf0955ea3bf9bf726a45398878fdf29186cf71313d4ac5b3f6360f585a6064104da0c227a7167af9c8bea67d021d3dee2b5a53826f2596373c831b812f266136d18a9c21d6e2bed8a9312a71f55f16391fd15607ee793563d518523bc3dad95e819c76be1079bde2272721ad966faf354cdb5ae2b56d76458655ed7305b853c9a3c1723581a7986140dbc37406672be78b117bdc7c11bc82e73eda21d4adeb84a153977adb53958913c7864e3504a6c5e5edd8d81f7e85f83456ae00315f46cebd94b4ebaacadacf0297f82995299f9156e3e25275603a60c74d0face3bd9984d053e91a02fe9ba09409540f56fc81605aa7cd84dff191f40eac278d6ccc8fb0528f03ada1ca9ccff351d9fb3a762bd739ed442bf5c3def68b6a8cdd32322c16eaadef154674e57cf3b6861c1060d4fb31b3e0ed69399faf59cef5be9cb9c75af17f5a6866c1fbf0a8aa102313606eabe1aa4d10896cdced7df1417847eb53d22c1504f70cfcc650f2fc6176eca74ec3fd8f393c4ce0b25988991266ff9c82ea1a7dac1fab574b0b9e3c5583b17c346c572b8098decf2ebbe754a4f4dd4847e753b3bad52797c032741389fc6c995038a08ad54d0f648e2a99721d05f230a97e289c90e39c27ed5b2f95210285ce9c727590ce1a8361966ef57826e57b4292aa1b2b42946adb5708e96d18df55fdca33209227b9d8fd61552e5f642b131a4b3bb5f377d4e2aacf2fbceb7c404083ed16e45e49decbcce328cb2d36b6742b2859979e8900"/751], 0x1, 0x542, &(0x7f0000000640)="$eJzs3c9rHOUbAPBnNkl/pd8mXxT8cQootFC7aZqqFQTr3WJBPddlsw0lu5mS3ZQmFGoPnvVQT548iyfPgvg/eFDw5EVqixSheovMZjbdNrvpNt10q/P5wCTvO+9s3nl25nl5Z2eWBFBYM9mPUsRLEfF5EjHV1TYeeePM5nb37l6r/nX3WjWJjY0P/kgiydd1tk/y35N55cWI+OHTiOOl7f0219aXKvV6bSWvz7Yal2eba+snLjUqi7XF2vL8mfnXT8/NnTp9Zmixlq9XDtz+4v3bN1d+PfHRZ/eOJnE2Dudt3XEMy0zM5O/JRJx9qG1u2J2NWDLqHWBXxvI8n4hsDJiKsTzrgf++6xGxARRUIv+hoDrzgOz6t7OMdkbydN15d/MCaHv845ufjcSB9rXRoT+TB66Msuvd6SH0n/Vx9vj537Ml9uhzCIBePrkRESfHx7ePf0k+/u3eyQG2ebgP4x88Pd9n85/Xes1/Slvzn+gx/5nskbu78ej8L90aQjd9ZfO/t3vOf7duWk2P5bX/ted8E8nFS/VaNrYdiYhjMbE/q+90P+eng29N9Wvrnv9lS9Z/Zy6Y78et8f0Pvmah0qo8Sczd7tyIeLnn/DfZOv5Jj+OfvR/nB+zjyHNv/Nyv7dHx762NryKO9jz+9+9oJTvfn5xtnw+znbNiu/mx9Rf69T/q+LPjf2jn+KeT7vu1zcfv49VvJn/s17bb839f8mG7vC9fd7XSaq3MRexL3tu+/tT913bqne2z+I+9svP41+v8PxgRHw8Y/3fzX/+y+/j3Vhb/wmMd/8cvfJl++06//gc7/qfbpWP5mkHGv0F38EneOwAAAAAAAHjWlCLicCSl8la5VCqXN5/veD4Olepps3X8Yrq6vBDt78pOx0Spc6d7qut5iLn8edhO/dRD9fmI+H9E3Bw72K6Xq2l9YdTBAwAAAAAAAAAAAAAAAAAAwDNiss/3/zO/jY1674A9519+Q3HJfygu+Q/FJf+huOQ/FJf8h+KS/1Bc8h+KS/5Dccl/AAAAAAAAAAAAAAAAAAAAAAAAAAAAGKrz585ly8bfd69Vs/rClbXVpfTKiYVac6ncWK2Wq+nK5fJimi7Wa+Vq2njU36un6eU3Y3n16myr1mzNNtfWLzTS1eXWhUuNymLtQm3iqUQFAAAAAAAAAAAAAAAAAAAA/y7NtfWlSr1eW1FQUFDYKox6ZAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA+/4JAAD//2c+F9A=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/24, 0x18) [ 1702.769808][ T3998] loop0: detected capacity change from 0 to 1024 00:28:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0xc1d, 0x2}) [ 1704.328941][ T3998] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 00:28:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/751], 0x1, 0x542, &(0x7f0000000640)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/24, 0x18) [ 1706.057456][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:28:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x4019, &(0x7f0000000580)=ANY=[@ANYBLOB="3ddccde952cf465c44a1dd4c2466fb4e165a4ff68b2d2bdda37536681b83606f71a92d4b5f23687f806fc15d8e0d7fd844973617cc528a5d302622681ad36b30353f21b2d75931fcb13f4b66e5e082bee1e7ba76ac"], 0x21, 0x4be, &(0x7f0000002ec0)="$eJzs3d9rXFkdAPDvvck0aZuaVAv+eLG21QqlM5lIChXEig8KWhD7B9SYTGPITCZ0JjUJBdt/QUULPogKPvki6HsQ8VVfRH2QfdmnhWW3dFkW9mGWezPTJulMk92mmZL7+cBh7rlnZr7ndOaeM/0mmRNAYZ2PiAcRcSIifhQRk93zSbfEje2S3e/J4/vzWUmi07n1TpK3Z/XY8ZgoPXvu8Yj44Xcifpw8H7e1sbk8V6/X7nbrlXZjtdLa2Ly61JhbrC3WVmamZ6/PVq9Vq9VDG+vP35/47IW/3fjGb7//h3/+8S/r61m3JrptO8dxmLaHXnoaJzMaEd97FcGGYKQ7nhPD7gifSBoRn46IC/n1Pxkj+asJABxnnc5kdCZ31gGA4y7Nc2BJWu7mAiYiTcvliNMRcS5OpfVmq33lTnNtZWE7VzYVpfTOUr023c0VTkUpyerV/PhZfWZP/WsRcTYifjl2Mq+X55v1hWF+8AGAAju9Z/1/b2x7/QcAjrnxYXcAADhy1n8AKB7rPwAUj/UfAIrH+g8AxWP9B4Disf4DQKH84ObNrHR633+9cG9jbbl57+pCrbVcbqzNl+ebyWp5sdlczL+zp7Hf89WbzdVrsbK2XmnXWu1Ka2PzdqO5ttK+nX+v9+1a6UhGBQC8yNkvbv0viYgHXz+Zl9ixl4O1Go63dNgdAIZmZNgdAIbGbl9QXP6PD/TZoneXgb8i9Ojw+wIcjcufl/+HopL/h+KS/4fikv+H4up0Env+A0DByPEDR/bz/87PPuYDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PU1kZckLXf3Ap+INC2XI85ExFSUkjtL9dp0RHwqIv47VhrL6tVhdxoAeEnpW0l3/6/Lk5cm9raeSD4Yy28j4qe/ufXr9bl2+241O//u0/PtR93zM8PoPwCwn9463VvHe548vj/fK0fZn7e/tb256PPxR+P3aeSNpYg49SSJ0R2Pyz6vjBxC/AcPI+Jz/eIneW5kqrvz6d74WewzhxE/PWj8dFf8NG/bvs3+LT5zCH2BotnK5p8b/a6/NM7nt/2v//F8hnp5O+e/xq6W3vU+ns81/ea/84N3Zd5l6x+T3x0Y/2HEF0b7zz+9+MmA+JcOOMY3m///xaC2zu8iLvddf5JdsSrtxmqltbF5dakxt1hbrK3MTM9en61eq1arlTxHXellqp/3zV/9Z+Cm09n4Tw2IP77P+L98wPG/8a9v//1LL4j/1Yv933/nXhA/85UDxv/Txb/+ZFBbFn9hwPj3e/2vHDD+1r///OEB7woAHIHWxubyXL1eu+ugcAcjUa+Ndd8Hr0N/HLxOB0OemIBX7tlFP+yeAAAAAAAAAAAAAAAAgxzFnxMNe4wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcXx8FAAD//4GN08Y=") [ 1708.470942][ T4009] loop1: detected capacity change from 0 to 512 [ 1708.656669][ T4009] EXT4-fs (loop1): invalid first ino: 0 [ 1709.872966][ T4010] loop0: detected capacity change from 0 to 1024 00:28:29 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:chfn_exec_t:s0\x00'}]}, 0x3c}}, 0x0) [ 1710.633029][ T4010] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 00:28:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/751], 0x1, 0x542, &(0x7f0000000640)="$eJzs3c9rHOUbAPBnNkl/pd8mXxT8cQootFC7aZqqFQTr3WJBPddlsw0lu5mS3ZQmFGoPnvVQT548iyfPgvg/eFDw5EVqixSheovMZjbdNrvpNt10q/P5wCTvO+9s3nl25nl5Z2eWBFBYM9mPUsRLEfF5EjHV1TYeeePM5nb37l6r/nX3WjWJjY0P/kgiydd1tk/y35N55cWI+OHTiOOl7f0219aXKvV6bSWvz7Yal2eba+snLjUqi7XF2vL8mfnXT8/NnTp9Zmixlq9XDtz+4v3bN1d+PfHRZ/eOJnE2Dudt3XEMy0zM5O/JRJx9qG1u2J2NWDLqHWBXxvI8n4hsDJiKsTzrgf++6xGxARRUIv+hoDrzgOz6t7OMdkbydN15d/MCaHv845ufjcSB9rXRoT+TB66Msuvd6SH0n/Vx9vj537Ml9uhzCIBePrkRESfHx7ePf0k+/u3eyQG2ebgP4x88Pd9n85/Xes1/Slvzn+gx/5nskbu78ej8L90aQjd9ZfO/t3vOf7duWk2P5bX/ted8E8nFS/VaNrYdiYhjMbE/q+90P+eng29N9Wvrnv9lS9Z/Zy6Y78et8f0Pvmah0qo8Sczd7tyIeLnn/DfZOv5Jj+OfvR/nB+zjyHNv/Nyv7dHx762NryKO9jz+9+9oJTvfn5xtnw+znbNiu/mx9Rf69T/q+LPjf2jn+KeT7vu1zcfv49VvJn/s17bb839f8mG7vC9fd7XSaq3MRexL3tu+/tT913bqne2z+I+9svP41+v8PxgRHw8Y/3fzX/+y+/j3Vhb/wmMd/8cvfJl++06//gc7/qfbpWP5mkHGv0F38EneOwAAAAAAAHjWlCLicCSl8la5VCqXN5/veD4Olepps3X8Yrq6vBDt78pOx0Spc6d7qut5iLn8edhO/dRD9fmI+H9E3Bw72K6Xq2l9YdTBAwAAAAAAAAAAAAAAAAAAwDNiss/3/zO/jY1674A9519+Q3HJfygu+Q/FJf+huOQ/FJf8h+KS/1Bc8h+KS/5Dccl/AAAAAAAAAAAAAAAAAAAAAAAAAAAAGKrz585ly8bfd69Vs/rClbXVpfTKiYVac6ncWK2Wq+nK5fJimi7Wa+Vq2njU36un6eU3Y3n16myr1mzNNtfWLzTS1eXWhUuNymLtQm3iqUQFAAAAAAAAAAAAAAAAAAAA/y7NtfWlSr1eW1FQUFDYKox6ZAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA+/4JAAD//2c+F9A=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/24, 0x18) [ 1711.930672][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:28:32 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000002780)) 00:28:34 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000009040)='net/tcp6\x00') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) write(r2, &(0x7f0000000080), 0x400300) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={r0, r0}) write(r1, &(0x7f0000000080), 0x400300) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000000)={0x200, r0}, 0x0) fcntl$dupfd(r1, 0x0, r1) sendfile(r1, r0, 0x0, 0x0) landlock_restrict_self(0xffffffffffffffff, 0x0) [ 1715.660075][ T4022] loop0: detected capacity change from 0 to 1024 [ 1716.270297][ T4022] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 00:28:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="004cfe69b85cc50ae525305f8ce665221f37a76996b0df6a27ee0e1d1d7bdc7f2b7ebe2d1349c52ed77832aba1e445662473dda99d3cbd83dd47ca8ba95a43031e3755fe5795c32db27c7465b661d30114885d0fd48bf25f4f1603d9e9fa038214d679cb5b97fa44a543ecdf110436692e17d3a5883fe6aa931dea4be0be99ba381a1ff0c4ca18560c8d36c7b61008a7cd22b49a90bbf91ea50da741528f140b2eda7f1dadac733b91482d7ca47cac7fdd126bbea3ae440d89e31b5b8ee19edf0955ea3bf9bf726a45398878fdf29186cf71313d4ac5b3f6360f585a6064104da0c227a7167af9c8bea67d021d3dee2b5a53826f2596373c831b812f266136d18a9c21d6e2bed8a9312a71f55f16391fd15607ee793563d518523bc3dad95e819c76be1079bde2272721ad966faf354cdb5ae2b56d76458655ed7305b853c9a3c1723581a7986140dbc37406672be78b117bdc7c11bc82e73eda21d4adeb84a153977adb53958913c7864e3504a6c5e5edd8d81f7e85f83456ae00315f46cebd94b4ebaacadacf0297f82995299f9156e3e25275603a60c74d0face3bd9984d053e91a02fe9ba09409540f56fc81605aa7cd84dff191f40eac278d6ccc8fb0528f03ada1ca9ccff351d9fb3a762bd739ed442bf5c3def68b6a8cdd32322c16eaadef154674e57cf3b6861c1060d4fb31b3e0ed69399faf59cef5be9cb9c75af17f5a6866c1fbf0a8aa102313606eabe1aa4d10896cdced7df1417847eb53d22c1504f70cfcc650f2fc6176eca74ec3fd8f393c4ce0b25988991266ff9c82ea1a7dac1fab574b0b9e3c5583b17c346c572b8098decf2ebbe754a4f4dd4847e753b3bad52797c032741389fc6c995038a08ad54d0f648e2a99721d05f230a97e289c90e39c27ed5b2f95210285ce9c727590ce1a8361966ef57826e57b4292aa1b2b42946adb5708e96d18df55fdca33209227b9d8fd61552e5f642b131a4b3bb5f377d4e2aacf2fbceb7c404083ed16e45e49decbcce328cb2d36b6742b2859979e8900"/751], 0x1, 0x542, &(0x7f0000000640)="$eJzs3c9rHOUbAPBnNkl/pd8mXxT8cQootFC7aZqqFQTr3WJBPddlsw0lu5mS3ZQmFGoPnvVQT548iyfPgvg/eFDw5EVqixSheovMZjbdNrvpNt10q/P5wCTvO+9s3nl25nl5Z2eWBFBYM9mPUsRLEfF5EjHV1TYeeePM5nb37l6r/nX3WjWJjY0P/kgiydd1tk/y35N55cWI+OHTiOOl7f0219aXKvV6bSWvz7Yal2eba+snLjUqi7XF2vL8mfnXT8/NnTp9Zmixlq9XDtz+4v3bN1d+PfHRZ/eOJnE2Dudt3XEMy0zM5O/JRJx9qG1u2J2NWDLqHWBXxvI8n4hsDJiKsTzrgf++6xGxARRUIv+hoDrzgOz6t7OMdkbydN15d/MCaHv845ufjcSB9rXRoT+TB66Msuvd6SH0n/Vx9vj537Ml9uhzCIBePrkRESfHx7ePf0k+/u3eyQG2ebgP4x88Pd9n85/Xes1/Slvzn+gx/5nskbu78ej8L90aQjd9ZfO/t3vOf7duWk2P5bX/ted8E8nFS/VaNrYdiYhjMbE/q+90P+eng29N9Wvrnv9lS9Z/Zy6Y78et8f0Pvmah0qo8Sczd7tyIeLnn/DfZOv5Jj+OfvR/nB+zjyHNv/Nyv7dHx762NryKO9jz+9+9oJTvfn5xtnw+znbNiu/mx9Rf69T/q+LPjf2jn+KeT7vu1zcfv49VvJn/s17bb839f8mG7vC9fd7XSaq3MRexL3tu+/tT913bqne2z+I+9svP41+v8PxgRHw8Y/3fzX/+y+/j3Vhb/wmMd/8cvfJl++06//gc7/qfbpWP5mkHGv0F38EneOwAAAAAAAHjWlCLicCSl8la5VCqXN5/veD4Olepps3X8Yrq6vBDt78pOx0Spc6d7qut5iLn8edhO/dRD9fmI+H9E3Bw72K6Xq2l9YdTBAwAAAAAAAAAAAAAAAAAAwDNiss/3/zO/jY1674A9519+Q3HJfygu+Q/FJf+huOQ/FJf8h+KS/1Bc8h+KS/5Dccl/AAAAAAAAAAAAAAAAAAAAAAAAAAAAGKrz585ly8bfd69Vs/rClbXVpfTKiYVac6ncWK2Wq+nK5fJimi7Wa+Vq2njU36un6eU3Y3n16myr1mzNNtfWLzTS1eXWhUuNymLtQm3iqUQFAAAAAAAAAAAAAAAAAAAA/y7NtfWlSr1eW1FQUFDYKox6ZAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA+/4JAAD//2c+F9A=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/24, 0x18) [ 1717.712564][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1721.228613][ T4034] loop0: detected capacity change from 0 to 1024 [ 1722.024882][ T4034] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 00:28:41 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000009040)='net/tcp6\x00') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) write(r2, &(0x7f0000000080), 0x400300) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={r0, r0}) write(r1, &(0x7f0000000080), 0x400300) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000000)={0x200, r0}, 0x0) fcntl$dupfd(r1, 0x0, r1) sendfile(r1, r0, 0x0, 0x0) landlock_restrict_self(0xffffffffffffffff, 0x0) [ 1723.832536][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:28:48 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000009040)='net/tcp6\x00') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) write(r2, &(0x7f0000000080), 0x400300) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={r0, r0}) write(r1, &(0x7f0000000080), 0x400300) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000000)={0x200, r0}, 0x0) fcntl$dupfd(r1, 0x0, r1) sendfile(r1, r0, 0x0, 0x0) landlock_restrict_self(0xffffffffffffffff, 0x0) 00:28:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000009040)='net/tcp6\x00') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) write(r2, &(0x7f0000000080), 0x400300) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={r0, r0}) write(r1, &(0x7f0000000080), 0x400300) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000000)={0x200, r0}, 0x0) fcntl$dupfd(r1, 0x0, r1) sendfile(r1, r0, 0x0, 0x0) landlock_restrict_self(0xffffffffffffffff, 0x0) ps_root_recvmsgcb: failed to send message to pid 3952: Connection refused ps_root_recvmsgcb: failed to send message to pid 3947: Connection refused ps_root_recvmsgcb: failed to send message to pid 3953: Connection refused ps_root_recvmsgcb: failed to send message to pid 3949: Connection refused 00:28:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000009040)='net/tcp6\x00') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) write(r2, &(0x7f0000000080), 0x400300) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={r0, r0}) write(r1, &(0x7f0000000080), 0x400300) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000000)={0x200, r0}, 0x0) fcntl$dupfd(r1, 0x0, r1) sendfile(r1, r0, 0x0, 0x0) landlock_restrict_self(0xffffffffffffffff, 0x0) 00:29:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000009040)='net/tcp6\x00') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) write(r2, &(0x7f0000000080), 0x400300) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={r0, r0}) write(r1, &(0x7f0000000080), 0x400300) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000000)={0x200, r0}, 0x0) fcntl$dupfd(r1, 0x0, r1) sendfile(r1, r0, 0x0, 0x0) landlock_restrict_self(0xffffffffffffffff, 0x0) 00:29:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000009040)='net/tcp6\x00') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) write(r2, &(0x7f0000000080), 0x400300) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={r0, r0}) write(r1, &(0x7f0000000080), 0x400300) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000000)={0x200, r0}, 0x0) fcntl$dupfd(r1, 0x0, r1) sendfile(r1, r0, 0x0, 0x0) landlock_restrict_self(0xffffffffffffffff, 0x0) 00:29:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000009040)='net/tcp6\x00') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) write(r2, &(0x7f0000000080), 0x400300) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={r0, r0}) write(r1, &(0x7f0000000080), 0x400300) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000000)={0x200, r0}, 0x0) fcntl$dupfd(r1, 0x0, r1) sendfile(r1, r0, 0x0, 0x0) landlock_restrict_self(0xffffffffffffffff, 0x0) 00:29:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1d, 0x0, 0x0) 00:29:18 executing program 0: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x20000000) 00:29:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x11}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty}}, 0xe8) sendmmsg$inet(r0, &(0x7f00000003c0)=[{{&(0x7f0000000800)={0x2, 0x4c20, @dev}, 0x10, 0x0}}], 0x1, 0x0) 00:29:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000009040)='net/tcp6\x00') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) write(r2, &(0x7f0000000080), 0x400300) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={r0, r0}) write(r1, &(0x7f0000000080), 0x400300) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000000)={0x200, r0}, 0x0) fcntl$dupfd(r1, 0x0, r1) sendfile(r1, r0, 0x0, 0x0) landlock_restrict_self(0xffffffffffffffff, 0x0) 00:29:24 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc0045009, 0x0) 00:29:26 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x5}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6a1b, 0x0, 0x0, 0x0, 0x0) 00:29:29 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000009040)='net/tcp6\x00') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) write(r2, &(0x7f0000000080), 0x400300) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={r0, r0}) write(r1, &(0x7f0000000080), 0x400300) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000000)={0x200, r0}, 0x0) fcntl$dupfd(r1, 0x0, r1) sendfile(r1, r0, 0x0, 0x0) landlock_restrict_self(0xffffffffffffffff, 0x0) 00:29:30 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x5}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6a1b, 0x0, 0x0, 0x0, 0x0) 00:29:32 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x5}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6a1b, 0x0, 0x0, 0x0, 0x0) 00:29:35 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x5}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6a1b, 0x0, 0x0, 0x0, 0x0) 00:29:38 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x100, 0x4}, 0x18) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/timer_list\x00', 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000100)=0x223, 0x80000000008004) 00:29:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}]}, 0x2c}}, 0x0) 00:29:43 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x100, 0x4}, 0x18) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/timer_list\x00', 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000100)=0x223, 0x80000000008004) 00:29:44 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) symlinkat(&(0x7f00000001c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file6\x00') execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000b80)='./file6\x00', 0xffffffffffffff9c, &(0x7f0000000bc0)='./file7\x00', 0x0) [ 1787.567487][ T4099] process 'syz-executor.0' launched './file2' with NULL argv: empty string added 00:29:50 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x100, 0x4}, 0x18) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/timer_list\x00', 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000100)=0x223, 0x80000000008004) 00:29:51 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) symlinkat(&(0x7f00000001c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file6\x00') execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000b80)='./file6\x00', 0xffffffffffffff9c, &(0x7f0000000bc0)='./file7\x00', 0x0) 00:29:57 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x100, 0x4}, 0x18) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/timer_list\x00', 0x0, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000100)=0x223, 0x80000000008004) [ 1799.448239][ T4107] warn_alloc: 3 callbacks suppressed [ 1799.448573][ T4107] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 1799.453130][ T4107] CPU: 1 PID: 4107 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 1799.455172][ T4107] Hardware name: riscv-virtio,qemu (DT) [ 1799.456334][ T4107] Call Trace: [ 1799.457398][ T4107] [] dump_backtrace+0x2e/0x3c [ 1799.458760][ T4107] [] show_stack+0x34/0x40 [ 1799.459976][ T4107] [] dump_stack_lvl+0xe0/0x14c [ 1799.461330][ T4107] [] dump_stack+0x1c/0x24 [ 1799.462792][ T4107] [] warn_alloc+0x168/0x22c [ 1799.464536][ T4107] [] __vmalloc_node_range+0xb6c/0xdb4 [ 1799.466474][ T4107] [] bpf_jit_alloc_exec+0x46/0x52 [ 1799.467968][ T4107] [] bpf_jit_binary_alloc+0x96/0x13c [ 1799.469428][ T4107] [] bpf_int_jit_compile+0x886/0xaa6 [ 1799.470870][ T4107] [] bpf_prog_select_runtime+0x1a2/0x22e [ 1799.473524][ T4107] [] bpf_migrate_filter+0x258/0x2be [ 1799.475892][ T4107] [] bpf_prepare_filter+0x10e/0x1b4 [ 1799.478526][ T4107] [] __get_filter+0x148/0x1a0 [ 1799.479958][ T4107] [] sk_attach_filter+0x22/0x11a [ 1799.481287][ T4107] [] sk_setsockopt+0x144e/0x270c [ 1799.482746][ T4107] [] sock_setsockopt+0x48/0x58 [ 1799.494143][ T4107] [] __sys_setsockopt+0x3f0/0x418 [ 1799.495721][ T4107] [] sys_setsockopt+0x3a/0x4c [ 1799.497103][ T4107] [] ret_from_syscall+0x0/0x2 [ 1799.741076][ T4107] Mem-Info: [ 1799.758868][ T4107] active_anon:60785 inactive_anon:71 isolated_anon:0 [ 1799.758868][ T4107] active_file:0 inactive_file:7442 isolated_file:0 [ 1799.758868][ T4107] unevictable:768 dirty:19 writeback:0 [ 1799.758868][ T4107] slab_reclaimable:5490 slab_unreclaimable:23923 [ 1799.758868][ T4107] mapped:8697 shmem:889 pagetables:372 [ 1799.758868][ T4107] sec_pagetables:0 bounce:0 [ 1799.758868][ T4107] kernel_misc_reclaimable:0 [ 1799.758868][ T4107] free:198410 free_pcp:525 free_cma:4096 ps_bpf_start_bpf: bpf_open: Unknown error 524 [ 1799.787736][ T4107] Node 0 active_anon:243140kB inactive_anon:284kB active_file:0kB inactive_file:29768kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34788kB dirty:76kB writeback:0kB shmem:3556kB writeback_tmp:0kB kernel_stack:5440kB pagetables:1488kB sec_pagetables:0kB all_unreclaimable? no [ 1799.811780][ T4107] Node 0 DMA32 free:793640kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:243140kB inactive_anon:284kB active_file:0kB inactive_file:29768kB unevictable:3072kB writepending:76kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:2132kB local_pcp:1584kB free_cma:16384kB ps_root_recvmsg: Unknown error 524 [ 1799.861145][ T4107] lowmem_reserve[]: 0 0 0 [ 1799.871912][ T4107] Node 0 DMA32: 1690*4kB (UME) 832*8kB (UME) 362*16kB (UME) 291*32kB (UME) 129*64kB (UM) 35*128kB (UME) 27*256kB (UME) 16*512kB (UME) 10*1024kB (ME) 5*2048kB (UMC) 175*4096kB (MC) = 793640kB [ 1799.887915][ T4107] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1799.896732][ T4107] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 1799.898746][ T4107] 8331 total pagecache pages [ 1799.900042][ T4107] 0 pages in swap cache [ 1799.901347][ T4107] Free swap = 0kB [ 1799.902893][ T4107] Total swap = 0kB [ 1799.906876][ T4107] 523776 pages RAM [ 1799.908143][ T4107] 0 pages HighMem/MovableOnly [ 1799.912888][ T4107] 184025 pages reserved [ 1799.915878][ T4107] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:30:00 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) symlinkat(&(0x7f00000001c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file6\x00') execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000b80)='./file6\x00', 0xffffffffffffff9c, &(0x7f0000000bc0)='./file7\x00', 0x0) 00:30:07 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) symlinkat(&(0x7f00000001c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file6\x00') execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000b80)='./file6\x00', 0xffffffffffffff9c, &(0x7f0000000bc0)='./file7\x00', 0x0) 00:30:08 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) symlinkat(&(0x7f00000001c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file6\x00') execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000b80)='./file6\x00', 0xffffffffffffff9c, &(0x7f0000000bc0)='./file7\x00', 0x0) 00:30:15 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) symlinkat(&(0x7f00000001c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file6\x00') execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000b80)='./file6\x00', 0xffffffffffffff9c, &(0x7f0000000bc0)='./file7\x00', 0x0) 00:30:17 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140), 0x182, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) fallocate(r0, 0x0, 0x4, 0x2) 00:30:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x3}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x82000) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000002c0)={'dummy0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') r3 = gettid() r4 = eventfd2(0x1, 0x800) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/block/mtdblock0', 0x121c0, 0xa0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe64e1, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)) ftruncate(r6, 0x4d0) writev(r6, &(0x7f0000001240)=[{&(0x7f00000000c0)="cc", 0x1}, {&(0x7f0000000140), 0xff01}], 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000340)={0xffffffffffffffff, r6}) kcmp$KCMP_EPOLL_TFD(r3, 0xffffffffffffffff, 0x7, r1, &(0x7f00000000c0)={0xffffffffffffffff, r4, 0x3ff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000180)=0x8) 00:30:23 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) symlinkat(&(0x7f00000001c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file6\x00') execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000b80)='./file6\x00', 0xffffffffffffff9c, &(0x7f0000000bc0)='./file7\x00', 0x0) 00:30:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x3}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x82000) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000002c0)={'dummy0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') r3 = gettid() r4 = eventfd2(0x1, 0x800) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/block/mtdblock0', 0x121c0, 0xa0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe64e1, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)) ftruncate(r6, 0x4d0) writev(r6, &(0x7f0000001240)=[{&(0x7f00000000c0)="cc", 0x1}, {&(0x7f0000000140), 0xff01}], 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000340)={0xffffffffffffffff, r6}) kcmp$KCMP_EPOLL_TFD(r3, 0xffffffffffffffff, 0x7, r1, &(0x7f00000000c0)={0xffffffffffffffff, r4, 0x3ff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000180)=0x8) 00:30:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x14) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x3}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x82000) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000002c0)={'dummy0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="20000000820000001cbfb242498cd0933c27053ffdcc2fccce8e45337b875ec29190c032be72f4282ab468f1b7ce001c7c2acd7cd428e3bd6230b4c16a696a525bfe696fc15cfc30e3836ba8983b8b145b98b5086265d770cf9c3cc1d2f5d227978c677645d200fe63f836e2975cd8efcec400f7c9b5732ab8a872121b8a79af8ec9bd36f034fa415dda3a2a23556431c682bc765a5eb51c96705b195f19609111a486df090300000000000000bd386046242d4c1bacb64c9c8e7621370300419fb0432d4cdf7bb83f3d6c98b400acb71d28f458bdaf0d66844b31cdb4e5b394b8f3318e0f54f74358bb6080ec01c07f89b760d2c3c9a9980ff2f55bfa08ab5201928aa28d8b87caa82af43d981710a91549222f3092106d669d22149e4e6ad5ce25676f5f3ab24b6846576fd3edfce54aefe74a049abf765de005afabc308fae0928e78ea6cd227df1341fb074091331c8d831fe1f365d4e10ed9227aa0690b7dbde2a9870ec1a8e6e6c4402de05cb101f7460b331ad7f14f46098b30cba4d83252b597ebb032caf4e06f1fddf9387930a6b3bb77d67b1266c2776edf814c33e9b7bfb5ec764c739bdd"]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') r3 = gettid() r4 = eventfd2(0x1, 0x800) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/block/mtdblock0', 0x121c0, 0xa0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe64e1, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)) ftruncate(r6, 0x4d0) writev(r6, &(0x7f0000001240)=[{&(0x7f00000000c0)="cc", 0x1}, {&(0x7f0000000140), 0xff01}], 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000340)={0xffffffffffffffff, r6}) kcmp$KCMP_EPOLL_TFD(r3, 0xffffffffffffffff, 0x7, r1, &(0x7f00000000c0)={0xffffffffffffffff, r4, 0x3ff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000180)=0x8) 00:30:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x3}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x82000) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000002c0)={'dummy0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') r3 = gettid() r4 = eventfd2(0x1, 0x800) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/block/mtdblock0', 0x121c0, 0xa0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe64e1, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)) ftruncate(r6, 0x4d0) writev(r6, &(0x7f0000001240)=[{&(0x7f00000000c0)="cc", 0x1}, {&(0x7f0000000140), 0xff01}], 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000340)={0xffffffffffffffff, r6}) kcmp$KCMP_EPOLL_TFD(r3, 0xffffffffffffffff, 0x7, r1, &(0x7f00000000c0)={0xffffffffffffffff, r4, 0x3ff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000180)=0x8) 00:30:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x14) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x3}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x82000) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000002c0)={'dummy0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="20000000820000001cbfb242498cd0933c27053ffdcc2fccce8e45337b875ec29190c032be72f4282ab468f1b7ce001c7c2acd7cd428e3bd6230b4c16a696a525bfe696fc15cfc30e3836ba8983b8b145b98b5086265d770cf9c3cc1d2f5d227978c677645d200fe63f836e2975cd8efcec400f7c9b5732ab8a872121b8a79af8ec9bd36f034fa415dda3a2a23556431c682bc765a5eb51c96705b195f19609111a486df090300000000000000bd386046242d4c1bacb64c9c8e7621370300419fb0432d4cdf7bb83f3d6c98b400acb71d28f458bdaf0d66844b31cdb4e5b394b8f3318e0f54f74358bb6080ec01c07f89b760d2c3c9a9980ff2f55bfa08ab5201928aa28d8b87caa82af43d981710a91549222f3092106d669d22149e4e6ad5ce25676f5f3ab24b6846576fd3edfce54aefe74a049abf765de005afabc308fae0928e78ea6cd227df1341fb074091331c8d831fe1f365d4e10ed9227aa0690b7dbde2a9870ec1a8e6e6c4402de05cb101f7460b331ad7f14f46098b30cba4d83252b597ebb032caf4e06f1fddf9387930a6b3bb77d67b1266c2776edf814c33e9b7bfb5ec764c739bdd"]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') r3 = gettid() r4 = eventfd2(0x1, 0x800) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/block/mtdblock0', 0x121c0, 0xa0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe64e1, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)) ftruncate(r6, 0x4d0) writev(r6, &(0x7f0000001240)=[{&(0x7f00000000c0)="cc", 0x1}, {&(0x7f0000000140), 0xff01}], 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000340)={0xffffffffffffffff, r6}) kcmp$KCMP_EPOLL_TFD(r3, 0xffffffffffffffff, 0x7, r1, &(0x7f00000000c0)={0xffffffffffffffff, r4, 0x3ff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000180)=0x8) 00:30:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x3}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x82000) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000002c0)={'dummy0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') r3 = gettid() r4 = eventfd2(0x1, 0x800) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/block/mtdblock0', 0x121c0, 0xa0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe64e1, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)) ftruncate(r6, 0x4d0) writev(r6, &(0x7f0000001240)=[{&(0x7f00000000c0)="cc", 0x1}, {&(0x7f0000000140), 0xff01}], 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000340)={0xffffffffffffffff, r6}) kcmp$KCMP_EPOLL_TFD(r3, 0xffffffffffffffff, 0x7, r1, &(0x7f00000000c0)={0xffffffffffffffff, r4, 0x3ff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000180)=0x8) 00:30:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x14) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x3}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x82000) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000002c0)={'dummy0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') r3 = gettid() r4 = eventfd2(0x1, 0x800) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/block/mtdblock0', 0x121c0, 0xa0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe64e1, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)) ftruncate(r6, 0x4d0) writev(r6, &(0x7f0000001240)=[{&(0x7f00000000c0)="cc", 0x1}, {&(0x7f0000000140), 0xff01}], 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000340)={0xffffffffffffffff, r6}) kcmp$KCMP_EPOLL_TFD(r3, 0xffffffffffffffff, 0x7, r1, &(0x7f00000000c0)={0xffffffffffffffff, r4, 0x3ff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000180)=0x8) 00:30:49 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0x8008af26, 0xe9002) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fa", 0x1, 0xfffffffffffffffd) keyctl$update(0x2, r1, &(0x7f00000000c0)="f0", 0x1) 00:30:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0x8008af26, 0xe9002) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fa", 0x1, 0xfffffffffffffffd) keyctl$update(0x2, r1, &(0x7f00000000c0)="f0", 0x1) 00:30:53 executing program 1: ioctl$TCXONC(0xffffffffffffffff, 0x540f, 0xea007) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FITRIM(r1, 0x4030582a, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x6, 0x7, 0x4, 0xfff9, 0x1}}) r2 = syz_io_uring_setup(0x76a9, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r6, &(0x7f0000000000)={0x1a, 0x0, 0x8, 0xfd, 0xff, 0x0, @broadcast}, 0x10) ppoll(&(0x7f0000000180)=[{0xffffffffffffffff, 0x464}, {r6, 0x44}, {0xffffffffffffffff, 0x4401}, {}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xe4c4ba9144090f05}], 0x7, &(0x7f0000000240), &(0x7f0000000280)={[0x1000]}, 0x8) 00:30:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0x8008af26, 0xe9002) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fa", 0x1, 0xfffffffffffffffd) keyctl$update(0x2, r1, &(0x7f00000000c0)="f0", 0x1) 00:30:58 executing program 1: ioctl$TCXONC(0xffffffffffffffff, 0x540f, 0xea007) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FITRIM(r1, 0x4030582a, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x6, 0x7, 0x4, 0xfff9, 0x1}}) r2 = syz_io_uring_setup(0x76a9, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r6, &(0x7f0000000000)={0x1a, 0x0, 0x8, 0xfd, 0xff, 0x0, @broadcast}, 0x10) ppoll(&(0x7f0000000180)=[{0xffffffffffffffff, 0x464}, {r6, 0x44}, {0xffffffffffffffff, 0x4401}, {}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xe4c4ba9144090f05}], 0x7, &(0x7f0000000240), &(0x7f0000000280)={[0x1000]}, 0x8) 00:30:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0x8008af26, 0xe9002) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fa", 0x1, 0xfffffffffffffffd) keyctl$update(0x2, r1, &(0x7f00000000c0)="f0", 0x1) ps_root_recvmsgcb: failed to send message to pid 4109: Connection refused ps_root_recvmsgcb: failed to send message to pid 4107: Connection refused ps_root_recvmsgcb: failed to send message to pid 4110: Connection refused ps_root_recvmsgcb: failed to send message to pid 4111: Connection refused 00:31:02 executing program 0: ioctl$TCXONC(0xffffffffffffffff, 0x540f, 0xea007) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FITRIM(r1, 0x4030582a, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x6, 0x7, 0x4, 0xfff9, 0x1}}) r2 = syz_io_uring_setup(0x76a9, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r6, &(0x7f0000000000)={0x1a, 0x0, 0x8, 0xfd, 0xff, 0x0, @broadcast}, 0x10) ppoll(&(0x7f0000000180)=[{0xffffffffffffffff, 0x464}, {r6, 0x44}, {0xffffffffffffffff, 0x4401}, {}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xe4c4ba9144090f05}], 0x7, &(0x7f0000000240), &(0x7f0000000280)={[0x1000]}, 0x8) 00:31:04 executing program 1: ioctl$TCXONC(0xffffffffffffffff, 0x540f, 0xea007) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FITRIM(r1, 0x4030582a, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x6, 0x7, 0x4, 0xfff9, 0x1}}) r2 = syz_io_uring_setup(0x76a9, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r6, &(0x7f0000000000)={0x1a, 0x0, 0x8, 0xfd, 0xff, 0x0, @broadcast}, 0x10) ppoll(&(0x7f0000000180)=[{0xffffffffffffffff, 0x464}, {r6, 0x44}, {0xffffffffffffffff, 0x4401}, {}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xe4c4ba9144090f05}], 0x7, &(0x7f0000000240), &(0x7f0000000280)={[0x1000]}, 0x8) 00:31:09 executing program 0: ioctl$TCXONC(0xffffffffffffffff, 0x540f, 0xea007) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FITRIM(r1, 0x4030582a, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x6, 0x7, 0x4, 0xfff9, 0x1}}) r2 = syz_io_uring_setup(0x76a9, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r6, &(0x7f0000000000)={0x1a, 0x0, 0x8, 0xfd, 0xff, 0x0, @broadcast}, 0x10) ppoll(&(0x7f0000000180)=[{0xffffffffffffffff, 0x464}, {r6, 0x44}, {0xffffffffffffffff, 0x4401}, {}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xe4c4ba9144090f05}], 0x7, &(0x7f0000000240), &(0x7f0000000280)={[0x1000]}, 0x8) 00:31:11 executing program 1: ioctl$TCXONC(0xffffffffffffffff, 0x540f, 0xea007) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FITRIM(r1, 0x4030582a, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x6, 0x7, 0x4, 0xfff9, 0x1}}) r2 = syz_io_uring_setup(0x76a9, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r6, &(0x7f0000000000)={0x1a, 0x0, 0x8, 0xfd, 0xff, 0x0, @broadcast}, 0x10) ppoll(&(0x7f0000000180)=[{0xffffffffffffffff, 0x464}, {r6, 0x44}, {0xffffffffffffffff, 0x4401}, {}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xe4c4ba9144090f05}], 0x7, &(0x7f0000000240), &(0x7f0000000280)={[0x1000]}, 0x8) 00:31:15 executing program 0: ioctl$TCXONC(0xffffffffffffffff, 0x540f, 0xea007) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FITRIM(r1, 0x4030582a, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x6, 0x7, 0x4, 0xfff9, 0x1}}) r2 = syz_io_uring_setup(0x76a9, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r6, &(0x7f0000000000)={0x1a, 0x0, 0x8, 0xfd, 0xff, 0x0, @broadcast}, 0x10) ppoll(&(0x7f0000000180)=[{0xffffffffffffffff, 0x464}, {r6, 0x44}, {0xffffffffffffffff, 0x4401}, {}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0xe4c4ba9144090f05}], 0x7, &(0x7f0000000240), &(0x7f0000000280)={[0x1000]}, 0x8) 00:31:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c0000001200010100000000000000000a"], 0x4c}}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000009600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1880.881320][ T4193] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 00:31:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c0000001200010100000000000000000a"], 0x4c}}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000009600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:31:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c0000001200010100000000000000000a"], 0x4c}}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000009600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1887.475354][ T4197] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1887.896956][ T4199] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 00:31:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c0000001200010100000000000000000a"], 0x4c}}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000009600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:31:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c0000001200010100000000000000000a"], 0x4c}}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000009600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1891.788496][ T4203] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1892.142380][ T4204] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 00:31:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c0000001200010100000000000000000a"], 0x4c}}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000009600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:31:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c0000001200010100000000000000000a"], 0x4c}}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000009600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1896.028647][ T4209] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1896.277533][ T4210] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 00:31:40 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000001600), 0x4) 00:31:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha1)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="6f372494f60a398cbadf5d5c107b33e9ee51481cd48598b731713b76ffb44c08dcd6291d4e8d03bf26e15ed03eefef6ab6d572c7d9f4164e99e99a25a481f9e1df14e22d6ca1bb868dfd4f470298229d46a881b39bc59edc28bbde82fe22425dbffbdaab42aa2156a5b8b57015cda6c37a9da3f28ef4e4aa27b2c037d3ced960", 0x80) 00:31:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x200) openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x6040}, 0x18) 00:31:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004200)={0x50, 0x0, r2}, 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r1, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close_range(r0, 0xffffffffffffffff, 0x0) 00:31:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x200) openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x6040}, 0x18) 00:31:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004200)={0x50, 0x0, r2}, 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r1, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close_range(r0, 0xffffffffffffffff, 0x0) 00:31:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x200) openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x6040}, 0x18) 00:31:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x200) openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x6040}, 0x18) 00:31:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004200)={0x50, 0x0, r2}, 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r1, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close_range(r0, 0xffffffffffffffff, 0x0) 00:31:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004200)={0x50, 0x0, r2}, 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r1, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close_range(r0, 0xffffffffffffffff, 0x0) 00:31:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004200)={0x50, 0x0, r2}, 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r1, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close_range(r0, 0xffffffffffffffff, 0x0) 00:32:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004200)={0x50, 0x0, r2}, 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r1, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close_range(r0, 0xffffffffffffffff, 0x0) [ 1926.713118][ T4249] warn_alloc: 3 callbacks suppressed [ 1926.736354][ T4249] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 1926.739888][ T4249] CPU: 0 PID: 4249 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 1926.741406][ T4249] Hardware name: riscv-virtio,qemu (DT) [ 1926.742485][ T4249] Call Trace: [ 1926.743558][ T4249] [] dump_backtrace+0x2e/0x3c [ 1926.745729][ T4249] [] show_stack+0x34/0x40 [ 1926.747193][ T4249] [] dump_stack_lvl+0xe0/0x14c [ 1926.748737][ T4249] [] dump_stack+0x1c/0x24 [ 1926.750271][ T4249] [] warn_alloc+0x168/0x22c [ 1926.751714][ T4249] [] __vmalloc_node_range+0xb6c/0xdb4 [ 1926.753367][ T4249] [] bpf_jit_alloc_exec+0x46/0x52 [ 1926.755475][ T4249] [] bpf_jit_binary_alloc+0x96/0x13c [ 1926.756966][ T4249] [] bpf_int_jit_compile+0x886/0xaa6 [ 1926.758984][ T4249] [] bpf_prog_select_runtime+0x1a2/0x22e [ 1926.760528][ T4249] [] bpf_migrate_filter+0x258/0x2be [ 1926.762382][ T4249] [] bpf_prepare_filter+0x10e/0x1b4 [ 1926.764668][ T4249] [] __get_filter+0x148/0x1a0 [ 1926.766788][ T4249] [] sk_attach_filter+0x22/0x11a [ 1926.768228][ T4249] [] sk_setsockopt+0x144e/0x270c [ 1926.769828][ T4249] [] sock_setsockopt+0x48/0x58 [ 1926.771366][ T4249] [] __sys_setsockopt+0x3f0/0x418 [ 1926.772797][ T4249] [] sys_setsockopt+0x3a/0x4c [ 1926.774824][ T4249] [] ret_from_syscall+0x0/0x2 [ 1926.900831][ T4249] Mem-Info: [ 1926.902335][ T4249] active_anon:56466 inactive_anon:73 isolated_anon:0 [ 1926.902335][ T4249] active_file:0 inactive_file:7510 isolated_file:0 [ 1926.902335][ T4249] unevictable:768 dirty:6 writeback:0 [ 1926.902335][ T4249] slab_reclaimable:5525 slab_unreclaimable:24076 [ 1926.902335][ T4249] mapped:8708 shmem:907 pagetables:330 [ 1926.902335][ T4249] sec_pagetables:0 bounce:0 [ 1926.902335][ T4249] kernel_misc_reclaimable:0 [ 1926.902335][ T4249] free:202047 free_pcp:804 free_cma:4096 [ 1926.906450][ T4249] Node 0 active_anon:225864kB inactive_anon:292kB active_file:0kB inactive_file:30040kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34832kB dirty:24kB writeback:0kB shmem:3628kB writeback_tmp:0kB kernel_stack:5248kB pagetables:1320kB sec_pagetables:0kB all_unreclaimable? no [ 1926.908233][ T4249] Node 0 DMA32 free:808188kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:225864kB inactive_anon:292kB active_file:0kB inactive_file:30040kB unevictable:3072kB writepending:24kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:3216kB local_pcp:272kB free_cma:16384kB [ 1926.947545][ T4249] lowmem_reserve[]: 0 0 0 [ 1926.950482][ T4249] Node 0 DMA32: 1387*4kB (UME) 860*8kB (UME) 383*16kB (UME) 226*32kB (UM) 149*64kB (UM) 50*128kB (UM) 36*256kB (UM) 25*512kB (UME) 13*1024kB (UME) 5*2048kB (UMC) 176*4096kB (UMC) = 808188kB [ 1927.018951][ T4249] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1927.020963][ T4249] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 1927.022608][ T4249] 8417 total pagecache pages [ 1927.066215][ T4249] 0 pages in swap cache [ 1927.068346][ T4249] Free swap = 0kB [ 1927.069561][ T4249] Total swap = 0kB [ 1927.070764][ T4249] 523776 pages RAM [ 1927.072003][ T4249] 0 pages HighMem/MovableOnly [ 1927.104638][ T4249] 184025 pages reserved [ 1927.106147][ T4249] 4096 pages cma reserved 00:32:06 executing program 1: setuid(0xee00) keyctl$clear(0x7, 0x0) ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:32:12 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) mq_getsetattr(r1, 0x0, 0x0) 00:32:13 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004200)={0x50, 0x0, r2}, 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r1, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close_range(r0, 0xffffffffffffffff, 0x0) 00:32:14 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@mark={{0x14}}, @mark={{0x14}}], 0x30}}], 0x1, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000500)={'syz_tun\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="02"]}) 00:32:18 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x4}, 0x10) 00:32:21 executing program 0: ioctl$TCXONC(0xffffffffffffffff, 0x540f, 0xea007) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x10) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000200)) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_timeval(r1, 0x1, 0x25, 0x0, 0x4) ppoll(&(0x7f0000000480)=[{r1, 0x5490}, {}, {0xffffffffffffffff, 0x4000}, {r1, 0x400}, {r1, 0x2040}, {0xffffffffffffffff, 0x4000}, {r1, 0x1000}], 0x7, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)={[0x10001]}, 0x8) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) accept4(r0, &(0x7f0000000380)=@isdn, &(0x7f0000000400)=0x80, 0x80000) 00:32:22 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x4}, 0x10) 00:32:24 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x4}, 0x10) 00:32:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r0) sendmsg$NFC_CMD_ACTIVATE_TARGET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001c000000080001"], 0x24}}, 0x0) 00:32:28 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x4}, 0x10) [ 1950.219249][ T4286] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 00:32:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r0) sendmsg$NFC_CMD_ACTIVATE_TARGET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001c000000080001"], 0x24}}, 0x0) 00:32:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_int(r0, 0x0, 0x1a, 0x0, &(0x7f0000000180)) [ 1952.885771][ T4290] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 00:32:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r0) sendmsg$NFC_CMD_ACTIVATE_TARGET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001c000000080001"], 0x24}}, 0x0) 00:32:34 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_NRSYNTHS(r0, 0x8004510a, &(0x7f0000000300)) [ 1955.332387][ T4294] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 00:32:35 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r0) sendmsg$NFC_CMD_ACTIVATE_TARGET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001c000000080001"], 0x24}}, 0x0) 00:32:37 executing program 1: mmap$IORING_OFF_SQES(&(0x7f0000fee000/0xf000)=nil, 0xf000, 0x1000009, 0x9011, 0xffffffffffffffff, 0x10000000) syz_io_uring_setup(0x76a9, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000001440)={[{@minixdf}, {@discard}, {@abort}, {@i_version}, {@errors_remount}, {@acl}, {@max_batch_time={'max_batch_time', 0x3d, 0x93}}, {@grpquota}, {@journal_dev={'journal_dev', 0x3d, 0x9}}, {@lazytime}]}, 0x1, 0x74e, &(0x7f0000000840)="$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") [ 1958.977358][ T4298] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 00:32:41 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) [ 1964.786297][ T4301] loop1: detected capacity change from 0 to 2048 [ 1964.888405][ T4301] EXT4-fs: Ignoring removed i_version option [ 1965.030326][ T4303] fs-verity: sha256 using implementation "sha256-generic" [ 1965.795671][ T4301] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 00:32:46 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) 00:32:47 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) [ 1967.913007][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:32:51 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) 00:32:55 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) 00:32:57 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) 00:33:01 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) 00:33:07 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) ps_root_recvmsgcb: failed to send message to pid 4249: Connection refused ps_root_recvmsgcb: failed to send message to pid 4253: Connection refused ps_root_recvmsgcb: failed to send message to pid 4251: Connection refused 00:33:11 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) ps_root_recvmsgcb: failed to send message to pid 4254: Connection refused 00:33:13 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) 00:33:16 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) 00:33:18 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) 00:33:21 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r5, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000001740)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', r4, 0x29, 0x8, 0x0, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x1, 0x200003, 0xe94}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xec, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x8, 0xf8, 0x800, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x0, 0x20, 0x3, 0x2}}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000000300)=""/232, 0xe8) r7 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r7, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@empty, 0x80, r4}) 00:33:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000600), 0x1, 0x563, &(0x7f0000000640)="$eJzs3U9sFFUYAPBvZmmBUmkxxgAXm3CAxLhQagQ9Ad6MMf49mtCULWlYKGlrQpse4O7BAwevJl68ekE9NdF48ODBE3jybEJMo9TEmNTM7my7trtt07RM6fx+yey+N2/hvW8nH/Pe7r4QQGkNZQ9pxImIuJpEDLS1HYi8caj5uqXF+bG/F+fHklhe/uCPJJKIeLI4P9Z6fZI/H8krhyLilysRz1fW9zs9O3djtF6vTeX1szM3b5+dnp17ZeLm6PXa9dqtkeHzr786MjJy4eKOxfrR+yffqX781qOvJl/79/57R39K4lL0523tceyUoRhaeU/aZe/rhZ3urCCVPJ5OcbL3ta5fT0S8GANRybM+MxATnxY6OGBXLVciloGSSuQ/lFRrHpCtf1tHsTOSp+vx5eYCKIt7KT+aLQean43EocbaqO/PpG1l1FzvDu5A/1kfd05f+T47Ypc+h9jI3XsRcbzT9U8aYxtsfIqTxZ/+L/40Is7lz9n589vsf2hN/VmK/1Jb/Fe22X/R8QNQTguXmzfy9fe/dGX+Ex3mP/0d7l3bUfT9rzX/W1o3/1uNv9Jl/vfuFvv49ccHP3dra5//ZUfWf2su+DQ8vhdxsmP8yUr8SYf4s3nP1S328fU3pw52ays6/uUvIk5H5/hbko2/nzw7PlGvnWs+duzjt+NvPujWf9HxZ9e/r0v8G13/7NztLfZxse/M593aNo8//b03+bBR6s3P3BmdmZkajuhN3l5/fpOFSOs1rb8ji//MqY3zv1P8h7O1wxbjfzL53T/bj393ZfFf2+b1/2yLfXz75Q8Pu7UVHT8AAAAAAADsJ2njtxxJWl0pp2m12tzD+0L0pfXJ6ZmXxyc/uXWt+ZuPwehJW990DzTrSVYfzn8P26qfX1MfiYhjEXG/crhRr45N1q8VHTwAAAAAAAAAAAAAAAAAAADsEUfW7P//q9Lc/w+UxIGiBwAURv5Decl/KC/5D+Ul/6G85D+Ul/yH8pL/UF7yH8pL/kN5yX8AAAAA2JeOvbTwKImIu28cbhyZ3rytp9CRAbstLXoAQGEqRQ8AKIyv/qG8rPGBZJP2Q90aFjb7kwAAAAAAAAAAAADATjl9wv5/KCv7/6G87P+H8rL/H8rLGh+w/x8AAAAAAAAAAAAA9r7+xpGk1XwvcH+kabUa8VxEDEZPMj5Rr52LiKMR8bDSczCrDxc9aAAAAAAAAAAAAAAAAAAAANhnpmfnbozW67UpBQUFhZVC0f8yAQAAAAAAAAAAAAAAAABA+axu+i16JAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABQnNX//3/3CkXHCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8m/4LAAD//2EREuQ=") 00:33:27 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x10, 0x11, 0x0, @private0, @ipv4={'\x00', '\xff\xff', @broadcast}, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}, 0x0) [ 2009.328954][ T4344] loop0: detected capacity change from 0 to 1024 [ 2009.947618][ T4344] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 00:33:29 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x10, 0x11, 0x0, @private0, @ipv4={'\x00', '\xff\xff', @broadcast}, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}, 0x0) 00:33:29 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, 0x0) [ 2010.782120][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:33:32 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x10, 0x11, 0x0, @private0, @ipv4={'\x00', '\xff\xff', @broadcast}, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}, 0x0) 00:33:32 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x278, 0x110, 0xffffffff, 0xffffffff, 0x110, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, 0x0, {[{{@ip={@dev, @broadcast, 0x0, 0x0, '\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@connbytes={{0x38}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "dcb6d0fec848186a5768e5d905000064e55f41414f00"}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) syz_emit_ethernet(0x6a, &(0x7f0000000100)={@link_local, @local, @val={@void}, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @broadcast}}}}}, 0x0) 00:33:34 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x10, 0x11, 0x0, @private0, @ipv4={'\x00', '\xff\xff', @broadcast}, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}, 0x0) [ 2015.233279][ T4358] xt_connbytes: Forcing CT accounting to be enabled 00:33:37 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x278, 0x110, 0xffffffff, 0xffffffff, 0x110, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, 0x0, {[{{@ip={@dev, @broadcast, 0x0, 0x0, '\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@connbytes={{0x38}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "dcb6d0fec848186a5768e5d905000064e55f41414f00"}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) syz_emit_ethernet(0x6a, &(0x7f0000000100)={@link_local, @local, @val={@void}, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @broadcast}}}}}, 0x0) 00:33:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000080)=0x9) fallocate(r0, 0x0, 0x0, 0x8800000) accept4(r0, &(0x7f0000000580)=@alg, &(0x7f0000000140)=0xfe36, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ftruncate(r1, 0x4d0) syz_genetlink_get_family_id$fou(&(0x7f00000002c0), r1) statx(r1, &(0x7f0000000280)='./file0/../file0\x00', 0x4000, 0x2, &(0x7f0000000180)) open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0x81000) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x4d0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="a70209008ae910cc949e255fa78a19b321af3fff33f00124e9c47967b59d55383e48c12e6fc66e27a955118cb9f74214bb26b689d957bee74c215c73979af06e5e37da8cb9d849f62d02330996b952d246cfba686a8eda9d262809da81c86104c203771323b1f04ec365a0781ab10ad7a30852b8d9de10fa46891e96156457dcf1ac3edef0d82ef5d13fd079ed7dd7f2c5d2a2c8e594dd06a4e289cc6358b3c895e20000", @ANYRES16=r2, @ANYBLOB="00082bbd7000fddbdf250100000014000900fe8000000000000000000000bb04000500060001004e2000000400050008000600ac1414bbf3edd8ab0ca291fb05ef83a9e49b"], 0x40}, 0x1, 0x0, 0x0, 0x8040}, 0x1) mount_setattr(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8100, &(0x7f0000000340)={0x6, 0x6, 0x100000}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x5) r3 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e25, @empty}, {0x2, 0x0, @dev}, {0x2, 0x3, @rand_addr=0xff000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2ae, 0x200000000800, 0x7}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x20000000) 00:33:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000080)=0x9) fallocate(r0, 0x0, 0x0, 0x8800000) accept4(r0, &(0x7f0000000580)=@alg, &(0x7f0000000140)=0xfe36, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ftruncate(r1, 0x4d0) syz_genetlink_get_family_id$fou(&(0x7f00000002c0), r1) statx(r1, &(0x7f0000000280)='./file0/../file0\x00', 0x4000, 0x2, &(0x7f0000000180)) open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0x81000) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x4d0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="a70209008ae910cc949e255fa78a19b321af3fff33f00124e9c47967b59d55383e48c12e6fc66e27a955118cb9f74214bb26b689d957bee74c215c73979af06e5e37da8cb9d849f62d02330996b952d246cfba686a8eda9d262809da81c86104c203771323b1f04ec365a0781ab10ad7a30852b8d9de10fa46891e96156457dcf1ac3edef0d82ef5d13fd079ed7dd7f2c5d2a2c8e594dd06a4e289cc6358b3c895e20000", @ANYRES16=r2, @ANYBLOB="00082bbd7000fddbdf250100000014000900fe8000000000000000000000bb04000500060001004e2000000400050008000600ac1414bbf3edd8ab0ca291fb05ef83a9e49b"], 0x40}, 0x1, 0x0, 0x0, 0x8040}, 0x1) mount_setattr(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8100, &(0x7f0000000340)={0x6, 0x6, 0x100000}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x5) r3 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e25, @empty}, {0x2, 0x0, @dev}, {0x2, 0x3, @rand_addr=0xff000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2ae, 0x200000000800, 0x7}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x20000000) 00:33:43 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x278, 0x110, 0xffffffff, 0xffffffff, 0x110, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, 0x0, {[{{@ip={@dev, @broadcast, 0x0, 0x0, '\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@connbytes={{0x38}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "dcb6d0fec848186a5768e5d905000064e55f41414f00"}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) syz_emit_ethernet(0x6a, &(0x7f0000000100)={@link_local, @local, @val={@void}, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @broadcast}}}}}, 0x0) 00:33:48 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x278, 0x110, 0xffffffff, 0xffffffff, 0x110, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, 0x0, {[{{@ip={@dev, @broadcast, 0x0, 0x0, '\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@connbytes={{0x38}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "dcb6d0fec848186a5768e5d905000064e55f41414f00"}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) syz_emit_ethernet(0x6a, &(0x7f0000000100)={@link_local, @local, @val={@void}, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @broadcast}}}}}, 0x0) 00:33:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000080)=0x9) fallocate(r0, 0x0, 0x0, 0x8800000) accept4(r0, &(0x7f0000000580)=@alg, &(0x7f0000000140)=0xfe36, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ftruncate(r1, 0x4d0) syz_genetlink_get_family_id$fou(&(0x7f00000002c0), r1) statx(r1, &(0x7f0000000280)='./file0/../file0\x00', 0x4000, 0x2, &(0x7f0000000180)) open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0x81000) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x4d0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="a70209008ae910cc949e255fa78a19b321af3fff33f00124e9c47967b59d55383e48c12e6fc66e27a955118cb9f74214bb26b689d957bee74c215c73979af06e5e37da8cb9d849f62d02330996b952d246cfba686a8eda9d262809da81c86104c203771323b1f04ec365a0781ab10ad7a30852b8d9de10fa46891e96156457dcf1ac3edef0d82ef5d13fd079ed7dd7f2c5d2a2c8e594dd06a4e289cc6358b3c895e20000", @ANYRES16=r2, @ANYBLOB="00082bbd7000fddbdf250100000014000900fe8000000000000000000000bb04000500060001004e2000000400050008000600ac1414bbf3edd8ab0ca291fb05ef83a9e49b"], 0x40}, 0x1, 0x0, 0x0, 0x8040}, 0x1) mount_setattr(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8100, &(0x7f0000000340)={0x6, 0x6, 0x100000}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x5) r3 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e25, @empty}, {0x2, 0x0, @dev}, {0x2, 0x3, @rand_addr=0xff000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2ae, 0x200000000800, 0x7}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x20000000) 00:33:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000080)=0x9) fallocate(r0, 0x0, 0x0, 0x8800000) accept4(r0, &(0x7f0000000580)=@alg, &(0x7f0000000140)=0xfe36, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ftruncate(r1, 0x4d0) syz_genetlink_get_family_id$fou(&(0x7f00000002c0), r1) statx(r1, &(0x7f0000000280)='./file0/../file0\x00', 0x4000, 0x2, &(0x7f0000000180)) open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0x81000) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x4d0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="a70209008ae910cc949e255fa78a19b321af3fff33f00124e9c47967b59d55383e48c12e6fc66e27a955118cb9f74214bb26b689d957bee74c215c73979af06e5e37da8cb9d849f62d02330996b952d246cfba686a8eda9d262809da81c86104c203771323b1f04ec365a0781ab10ad7a30852b8d9de10fa46891e96156457dcf1ac3edef0d82ef5d13fd079ed7dd7f2c5d2a2c8e594dd06a4e289cc6358b3c895e20000", @ANYRES16=r2, @ANYBLOB="00082bbd7000fddbdf250100000014000900fe8000000000000000000000bb04000500060001004e2000000400050008000600ac1414bbf3edd8ab0ca291fb05ef83a9e49b"], 0x40}, 0x1, 0x0, 0x0, 0x8040}, 0x1) mount_setattr(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8100, &(0x7f0000000340)={0x6, 0x6, 0x100000}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x5) r3 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e25, @empty}, {0x2, 0x0, @dev}, {0x2, 0x3, @rand_addr=0xff000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2ae, 0x200000000800, 0x7}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x20000000) 00:33:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000080)=0x9) fallocate(r0, 0x0, 0x0, 0x8800000) accept4(r0, &(0x7f0000000580)=@alg, &(0x7f0000000140)=0xfe36, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ftruncate(r1, 0x4d0) syz_genetlink_get_family_id$fou(&(0x7f00000002c0), r1) statx(r1, &(0x7f0000000280)='./file0/../file0\x00', 0x4000, 0x2, &(0x7f0000000180)) open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0x81000) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x4d0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="a70209008ae910cc949e255fa78a19b321af3fff33f00124e9c47967b59d55383e48c12e6fc66e27a955118cb9f74214bb26b689d957bee74c215c73979af06e5e37da8cb9d849f62d02330996b952d246cfba686a8eda9d262809da81c86104c203771323b1f04ec365a0781ab10ad7a30852b8d9de10fa46891e96156457dcf1ac3edef0d82ef5d13fd079ed7dd7f2c5d2a2c8e594dd06a4e289cc6358b3c895e20000", @ANYRES16=r2, @ANYBLOB="00082bbd7000fddbdf250100000014000900fe8000000000000000000000bb04000500060001004e2000000400050008000600ac1414bbf3edd8ab0ca291fb05ef83a9e49b"], 0x40}, 0x1, 0x0, 0x0, 0x8040}, 0x1) mount_setattr(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8100, &(0x7f0000000340)={0x6, 0x6, 0x100000}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x5) r3 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e25, @empty}, {0x2, 0x0, @dev}, {0x2, 0x3, @rand_addr=0xff000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2ae, 0x200000000800, 0x7}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x20000000) 00:34:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000080)=0x9) fallocate(r0, 0x0, 0x0, 0x8800000) accept4(r0, &(0x7f0000000580)=@alg, &(0x7f0000000140)=0xfe36, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ftruncate(r1, 0x4d0) syz_genetlink_get_family_id$fou(&(0x7f00000002c0), r1) statx(r1, &(0x7f0000000280)='./file0/../file0\x00', 0x4000, 0x2, &(0x7f0000000180)) open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0x81000) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x4d0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="a70209008ae910cc949e255fa78a19b321af3fff33f00124e9c47967b59d55383e48c12e6fc66e27a955118cb9f74214bb26b689d957bee74c215c73979af06e5e37da8cb9d849f62d02330996b952d246cfba686a8eda9d262809da81c86104c203771323b1f04ec365a0781ab10ad7a30852b8d9de10fa46891e96156457dcf1ac3edef0d82ef5d13fd079ed7dd7f2c5d2a2c8e594dd06a4e289cc6358b3c895e20000", @ANYRES16=r2, @ANYBLOB="00082bbd7000fddbdf250100000014000900fe8000000000000000000000bb04000500060001004e2000000400050008000600ac1414bbf3edd8ab0ca291fb05ef83a9e49b"], 0x40}, 0x1, 0x0, 0x0, 0x8040}, 0x1) mount_setattr(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8100, &(0x7f0000000340)={0x6, 0x6, 0x100000}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x5) r3 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e25, @empty}, {0x2, 0x0, @dev}, {0x2, 0x3, @rand_addr=0xff000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2ae, 0x200000000800, 0x7}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x20000000) 00:34:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) unlinkat(0xffffffffffffffff, 0x0, 0xcd74079892ee52ef) 00:34:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000056c0)={0x0, 0x0, &(0x7f00000064c0)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWSET={0x2c, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x54}}, 0x0) 00:34:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000080)=0x9) fallocate(r0, 0x0, 0x0, 0x8800000) accept4(r0, &(0x7f0000000580)=@alg, &(0x7f0000000140)=0xfe36, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) ftruncate(r1, 0x4d0) syz_genetlink_get_family_id$fou(&(0x7f00000002c0), r1) statx(r1, &(0x7f0000000280)='./file0/../file0\x00', 0x4000, 0x2, &(0x7f0000000180)) open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0x81000) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x4d0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="a70209008ae910cc949e255fa78a19b321af3fff33f00124e9c47967b59d55383e48c12e6fc66e27a955118cb9f74214bb26b689d957bee74c215c73979af06e5e37da8cb9d849f62d02330996b952d246cfba686a8eda9d262809da81c86104c203771323b1f04ec365a0781ab10ad7a30852b8d9de10fa46891e96156457dcf1ac3edef0d82ef5d13fd079ed7dd7f2c5d2a2c8e594dd06a4e289cc6358b3c895e20000", @ANYRES16=r2, @ANYBLOB="00082bbd7000fddbdf250100000014000900fe8000000000000000000000bb04000500060001004e2000000400050008000600ac1414bbf3edd8ab0ca291fb05ef83a9e49b"], 0x40}, 0x1, 0x0, 0x0, 0x8040}, 0x1) mount_setattr(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x8100, &(0x7f0000000340)={0x6, 0x6, 0x100000}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000280)=0x5) r3 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e25, @empty}, {0x2, 0x0, @dev}, {0x2, 0x3, @rand_addr=0xff000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2ae, 0x200000000800, 0x7}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x20000000) 00:34:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0xe0, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x94, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x3, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}]}, {0x48, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}]}, 0xe0}}, 0x0) 00:34:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0xe0, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x94, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x3, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}]}, {0x48, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}]}, 0xe0}}, 0x0) 00:34:13 executing program 0: r0 = syz_io_uring_setup(0x39dd, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3d}, 0x1c) syz_io_uring_setup(0x6956, &(0x7f0000000240), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) close(r0) [ 2055.089028][ T4405] warn_alloc: 3 callbacks suppressed [ 2055.089412][ T4405] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 2055.130285][ T4405] CPU: 1 PID: 4405 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 2055.132375][ T4405] Hardware name: riscv-virtio,qemu (DT) [ 2055.133598][ T4405] Call Trace: [ 2055.134964][ T4405] [] dump_backtrace+0x2e/0x3c [ 2055.136566][ T4405] [] show_stack+0x34/0x40 [ 2055.138081][ T4405] [] dump_stack_lvl+0xe0/0x14c [ 2055.139709][ T4405] [] dump_stack+0x1c/0x24 [ 2055.141306][ T4405] [] warn_alloc+0x168/0x22c [ 2055.142798][ T4405] [] __vmalloc_node_range+0xb6c/0xdb4 [ 2055.144976][ T4405] [] bpf_jit_alloc_exec+0x46/0x52 [ 2055.146532][ T4405] [] bpf_jit_binary_alloc+0x96/0x13c [ 2055.148103][ T4405] [] bpf_int_jit_compile+0x886/0xaa6 [ 2055.149642][ T4405] [] bpf_prog_select_runtime+0x1a2/0x22e [ 2055.151281][ T4405] [] bpf_migrate_filter+0x258/0x2be [ 2055.152968][ T4405] [] bpf_prepare_filter+0x10e/0x1b4 [ 2055.155030][ T4405] [] __get_filter+0x148/0x1a0 [ 2055.156680][ T4405] [] sk_attach_filter+0x22/0x11a [ 2055.158181][ T4405] [] sk_setsockopt+0x144e/0x270c [ 2055.159802][ T4405] [] sock_setsockopt+0x48/0x58 [ 2055.161455][ T4405] [] __sys_setsockopt+0x3f0/0x418 [ 2055.163034][ T4405] [] sys_setsockopt+0x3a/0x4c [ 2055.165041][ T4405] [] ret_from_syscall+0x0/0x2 [ 2055.258833][ T4405] Mem-Info: [ 2055.260350][ T4405] active_anon:55154 inactive_anon:75 isolated_anon:0 [ 2055.260350][ T4405] active_file:0 inactive_file:7577 isolated_file:0 [ 2055.260350][ T4405] unevictable:768 dirty:22 writeback:0 [ 2055.260350][ T4405] slab_reclaimable:5535 slab_unreclaimable:24183 [ 2055.260350][ T4405] mapped:8713 shmem:910 pagetables:329 [ 2055.260350][ T4405] sec_pagetables:0 bounce:0 [ 2055.260350][ T4405] kernel_misc_reclaimable:0 [ 2055.260350][ T4405] free:203120 free_pcp:501 free_cma:4096 [ 2055.267624][ T4405] Node 0 active_anon:220616kB inactive_anon:300kB active_file:0kB inactive_file:30308kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34852kB dirty:88kB writeback:0kB shmem:3640kB writeback_tmp:0kB kernel_stack:5312kB pagetables:1316kB sec_pagetables:0kB all_unreclaimable? no [ 2055.270819][ T4405] Node 0 DMA32 free:812480kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:220616kB inactive_anon:300kB active_file:0kB inactive_file:30308kB unevictable:3072kB writepending:88kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:2004kB local_pcp:764kB free_cma:16384kB [ 2055.295059][ T4405] lowmem_reserve[]: 0 0 0 [ 2055.347557][ T4405] Node 0 DMA32: 978*4kB (UME) 895*8kB (UME) 424*16kB (UME) 224*32kB (UME) 168*64kB (UME) 64*128kB (UME) 36*256kB (UM) 27*512kB (UME) 14*1024kB (UME) 5*2048kB (UMC) 176*4096kB (UMC) = 812480kB [ 2055.383180][ T4405] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2055.436512][ T4405] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 2055.438134][ T4405] 8490 total pagecache pages [ 2055.439306][ T4405] 0 pages in swap cache [ 2055.440419][ T4405] Free swap = 0kB [ 2055.441511][ T4405] Total swap = 0kB [ 2055.442615][ T4405] 523776 pages RAM [ 2055.480181][ T4405] 0 pages HighMem/MovableOnly [ 2055.481796][ T4405] 184025 pages reserved [ 2055.482960][ T4405] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:34:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0xe0, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x94, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x3, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}]}, {0x48, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}]}, 0xe0}}, 0x0) 00:34:19 executing program 0: r0 = syz_io_uring_setup(0x39dd, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3d}, 0x1c) syz_io_uring_setup(0x6956, &(0x7f0000000240), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) close(r0) 00:34:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)={0xe0, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x94, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x3, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}]}, {0x48, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}]}, 0xe0}}, 0x0) 00:34:24 executing program 1: r0 = syz_io_uring_setup(0x39dd, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3d}, 0x1c) syz_io_uring_setup(0x6956, &(0x7f0000000240), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) close(r0) 00:34:24 executing program 0: r0 = syz_io_uring_setup(0x39dd, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3d}, 0x1c) syz_io_uring_setup(0x6956, &(0x7f0000000240), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) close(r0) 00:34:28 executing program 1: r0 = syz_io_uring_setup(0x39dd, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3d}, 0x1c) syz_io_uring_setup(0x6956, &(0x7f0000000240), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) close(r0) 00:34:30 executing program 0: r0 = syz_io_uring_setup(0x39dd, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3d}, 0x1c) syz_io_uring_setup(0x6956, &(0x7f0000000240), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) close(r0) 00:34:34 executing program 1: r0 = syz_io_uring_setup(0x39dd, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3d}, 0x1c) syz_io_uring_setup(0x6956, &(0x7f0000000240), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) close(r0) 00:34:38 executing program 0: r0 = syz_io_uring_setup(0x39dd, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3d}, 0x1c) syz_io_uring_setup(0x6956, &(0x7f0000000240), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) close(r0) 00:34:43 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x310, 0x1a0, 0xffffffff, 0xffffffff, 0x1a0, 0xffffffff, 0x278, 0xffffffff, 0xffffffff, 0x278, 0xffffffff, 0x3, 0x0, {[{{@ip={@rand_addr, @dev, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth1_to_batadv\x00'}, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "27c88b9cb75bd6d2317777e9132d1d7027e1cb1349abaea78cce964365b50584901aed1c15bdf1c7c25350f1d09c3867572232d17767d5109b39063ae0b7061da06c0acd1707c66450be888f06db6814197ea64c5aa83ca43f4bbb056a8adf3fe33d587266b81f3cd16e4ad30d5003d7fee75c17cf51d9c97f2d9739fe0d7dd5", 0x12, 0x3}}, @common=@ttl={{0x28}}]}, @unspec=@CT0={0x48}}, {{@ip={@local, @remote, 0x0, 0x0, 'tunl0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x370) 00:34:44 executing program 0: r0 = syz_io_uring_setup(0x39dd, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3d}, 0x1c) syz_io_uring_setup(0x6956, &(0x7f0000000240), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) close(r0) [ 2086.580382][ T4442] xt_CT: You must specify a L4 protocol and not use inversions on it 00:34:47 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x310, 0x1a0, 0xffffffff, 0xffffffff, 0x1a0, 0xffffffff, 0x278, 0xffffffff, 0xffffffff, 0x278, 0xffffffff, 0x3, 0x0, {[{{@ip={@rand_addr, @dev, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth1_to_batadv\x00'}, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "27c88b9cb75bd6d2317777e9132d1d7027e1cb1349abaea78cce964365b50584901aed1c15bdf1c7c25350f1d09c3867572232d17767d5109b39063ae0b7061da06c0acd1707c66450be888f06db6814197ea64c5aa83ca43f4bbb056a8adf3fe33d587266b81f3cd16e4ad30d5003d7fee75c17cf51d9c97f2d9739fe0d7dd5", 0x12, 0x3}}, @common=@ttl={{0x28}}]}, @unspec=@CT0={0x48}}, {{@ip={@local, @remote, 0x0, 0x0, 'tunl0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x370) 00:34:48 executing program 0: r0 = syz_io_uring_setup(0x39dd, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3d}, 0x1c) syz_io_uring_setup(0x6956, &(0x7f0000000240), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) close(r0) [ 2089.911868][ T4446] xt_CT: You must specify a L4 protocol and not use inversions on it 00:34:50 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x310, 0x1a0, 0xffffffff, 0xffffffff, 0x1a0, 0xffffffff, 0x278, 0xffffffff, 0xffffffff, 0x278, 0xffffffff, 0x3, 0x0, {[{{@ip={@rand_addr, @dev, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth1_to_batadv\x00'}, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "27c88b9cb75bd6d2317777e9132d1d7027e1cb1349abaea78cce964365b50584901aed1c15bdf1c7c25350f1d09c3867572232d17767d5109b39063ae0b7061da06c0acd1707c66450be888f06db6814197ea64c5aa83ca43f4bbb056a8adf3fe33d587266b81f3cd16e4ad30d5003d7fee75c17cf51d9c97f2d9739fe0d7dd5", 0x12, 0x3}}, @common=@ttl={{0x28}}]}, @unspec=@CT0={0x48}}, {{@ip={@local, @remote, 0x0, 0x0, 'tunl0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x370) [ 2092.859687][ T4450] xt_CT: You must specify a L4 protocol and not use inversions on it 00:34:53 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x310, 0x1a0, 0xffffffff, 0xffffffff, 0x1a0, 0xffffffff, 0x278, 0xffffffff, 0xffffffff, 0x278, 0xffffffff, 0x3, 0x0, {[{{@ip={@rand_addr, @dev, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth1_to_batadv\x00'}, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "27c88b9cb75bd6d2317777e9132d1d7027e1cb1349abaea78cce964365b50584901aed1c15bdf1c7c25350f1d09c3867572232d17767d5109b39063ae0b7061da06c0acd1707c66450be888f06db6814197ea64c5aa83ca43f4bbb056a8adf3fe33d587266b81f3cd16e4ad30d5003d7fee75c17cf51d9c97f2d9739fe0d7dd5", 0x12, 0x3}}, @common=@ttl={{0x28}}]}, @unspec=@CT0={0x48}}, {{@ip={@local, @remote, 0x0, 0x0, 'tunl0\x00', 'veth1_macvtap\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x370) [ 2097.229834][ T4454] xt_CT: You must specify a L4 protocol and not use inversions on it 00:34:57 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000200)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080), 0x0) 00:34:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1f8, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x160, 0xffffffff, 0xffffffff, 0x160, 0xffffffff, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0xffffffff, 'bond_slave_1\x00', 'lo\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="4f46cc0cae1b"}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x258) 00:35:00 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000200)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080), 0x0) [ 2102.010619][ T4458] ipt_CLUSTERIP: ipt_CLUSTERIP is deprecated and it will removed soon, use xt_cluster instead 00:35:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1f8, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x160, 0xffffffff, 0xffffffff, 0x160, 0xffffffff, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0xffffffff, 'bond_slave_1\x00', 'lo\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="4f46cc0cae1b"}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x258) 00:35:03 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000200)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080), 0x0) 00:35:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1f8, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x160, 0xffffffff, 0xffffffff, 0x160, 0xffffffff, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0xffffffff, 'bond_slave_1\x00', 'lo\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="4f46cc0cae1b"}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x258) 00:35:06 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000200)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080), 0x0) 00:35:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1f8, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x160, 0xffffffff, 0xffffffff, 0x160, 0xffffffff, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0xffffffff, 'bond_slave_1\x00', 'lo\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="4f46cc0cae1b"}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x258) 00:35:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000440)='./file1\x00', 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="00a08bfb4f159d254f53c1e9ee1ca9212de226af464dc74bc6a4af4bdec69282c27385782649c84f942acfff8d200125074c0edb3d960300b1c870a729821a2c4f75f4360900000000000000f6000000a41968bf05b83f1962c63f6073dc70204f8c0381e61718236996a62e4d9bda58ce7864936403961bd16ae49409417b73b4ca4a0714f225ab6550b6360de0bc20aeaff95ceef81fb0218d37d70e1b077855b7c7c6d9799fd578e145398d3ccd0f4c28afda7a5182533093b8a1e81be78c08b6d6d27f423e2a9c41c7bd1547fb4d1f197bcfc4278f4441e500104832", @ANYRESDEC, @ANYRES16=0x0, @ANYRES64=0x0], 0x1, 0x3ef, &(0x7f00000009c0)="$eJzs3M9rHFUcAPDvTH71p4naWKuCCwUNiJumTdWCB3MRD9706GXJL4rbpnRXMGlBK+JREL16KOJF8OQfoEe9etJLD3qRQhDxD1iZzcx2TXeTNNntRvfzgQnvzY+878zLm5d9M28DGFqliPgwIsYjYiUiJvP1Sb7Ea1tLtt/ff91czJYkGo23/kya27N8tB2TOZ79SCNm0oj044inO5RbW994t1KtLl/P87P1K9dma+sbL16+UlldXl2++tLFl+fnLl24eK535/rs8en1z6+9cenTjU8mVxe/PpvFeyLf1n4evVKKUuuabNfD0zoUTgw6APYljYiRiBhttv/JGGmmtkzGB+8MNDgAoC8ajcbItjwA8L+X6PMBYMgUn/uLZ3v9eA7G4bW5EBFHOtX/aOtJ0Fgfn++VImL+x6PfZUv06TksAAAAwDD7YSEiXuk0/pPGM237nYyIR/L5AVMR8WhEPBYRjx+w/NK2/P3jP+ndAxbBDjYXIl7tOP6bFrtMjeS5k826H0tWLleXz+V/DzMxNpHl53Yo48Y3v//abVv7+F+2ZOUXY4F5HHdHJ/59zFKlXjnIOXPP5q2Ip0Y71X/SGv9NIuLUAcr47bPat9227V7/9FPjdsRzHdv/vZlLyY7zs2abt4PZ4qbQwe3vp3/qVr76H6ys/R/buf6nkvb5erXuv+tOl/VffXmz3u2Y/d7/x5O3mwGO5+ver9Tr1+cixpM3719/fpeLMESK61Fcr6z+Z8527v+Le352Qacj4omIOB0RT0bEmQco8/SZn29026b9D1ZW/0sP1P73nigmFpSff/2jbuXvrf3PN4OZydf4/293e62pQccJAAAAAAAAQG+kzbndSVpupdO0XN76Du9TcSytrtXqL6ysvXd1aWsO+FSMpcWrXpNt74PO5e8FF/nz2/IX8neGv5g42syXF9eqS4M+eQAYUse79P+ZPyYGHR0A0DdHBh0AAPDQ6f8BYPjo/wFg+Oj/AWD47L//v/NLTwMBAB4an/8BYKjs53v9JVqJW4cjDAmJXicGfWcCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4b/snAAD//2kh2M8=") truncate(&(0x7f0000000000)='./file1\x00', 0x0) [ 2112.416511][ T4472] loop0: detected capacity change from 0 to 512 [ 2113.301030][ T4472] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 00:35:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, &(0x7f0000000180)=0x700) 00:35:14 executing program 0: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) [ 2115.358395][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:35:16 executing program 1: r0 = add_key$keyring(&(0x7f0000001700), &(0x7f0000001740)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="e8", 0x1, r0) ps_root_recvmsgcb: failed to send message to pid 4405: Connection refused 00:35:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000003c0)=0x4, 0x4) sendmmsg$inet6(r0, &(0x7f0000002140)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev, 0x1}, 0x1c, 0x0}}], 0x1, 0x4008800) sendmmsg$inet6(r0, &(0x7f0000002000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @empty}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000040)="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", 0x101}], 0x1}}], 0x2, 0x0) ps_root_recvmsgcb: failed to send message to pid 4407: Connection refused ps_root_recvmsgcb: failed to send message to pid 4408: Connection refused ps_root_recvmsgcb: failed to send message to pid 4411: Connection refused [ 2120.138710][ T4483] trusted_key: encrypted_key: insufficient parameters specified 00:35:20 executing program 1: r0 = add_key$keyring(&(0x7f0000001700), &(0x7f0000001740)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="e8", 0x1, r0) 00:35:21 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000003c0)=0x4, 0x4) sendmmsg$inet6(r0, &(0x7f0000002140)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev, 0x1}, 0x1c, 0x0}}], 0x1, 0x4008800) sendmmsg$inet6(r0, &(0x7f0000002000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @empty}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000040)="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", 0x101}], 0x1}}], 0x2, 0x0) [ 2122.766601][ T4486] trusted_key: encrypted_key: insufficient parameters specified 00:35:23 executing program 1: r0 = add_key$keyring(&(0x7f0000001700), &(0x7f0000001740)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="e8", 0x1, r0) 00:35:25 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000003c0)=0x4, 0x4) sendmmsg$inet6(r0, &(0x7f0000002140)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev, 0x1}, 0x1c, 0x0}}], 0x1, 0x4008800) sendmmsg$inet6(r0, &(0x7f0000002000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @empty}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000040)="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", 0x101}], 0x1}}], 0x2, 0x0) [ 2126.710705][ T4490] trusted_key: encrypted_key: insufficient parameters specified 00:35:26 executing program 1: r0 = add_key$keyring(&(0x7f0000001700), &(0x7f0000001740)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="e8", 0x1, r0) 00:35:27 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000003c0)=0x4, 0x4) sendmmsg$inet6(r0, &(0x7f0000002140)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev, 0x1}, 0x1c, 0x0}}], 0x1, 0x4008800) sendmmsg$inet6(r0, &(0x7f0000002000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @empty}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000040)="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", 0x101}], 0x1}}], 0x2, 0x0) [ 2129.027655][ T4494] trusted_key: encrypted_key: insufficient parameters specified 00:35:30 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000003c0)=0x4, 0x4) sendmmsg$inet6(r0, &(0x7f0000002140)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev, 0x1}, 0x1c, 0x0}}], 0x1, 0x4008800) sendmmsg$inet6(r0, &(0x7f0000002000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @empty}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000040)="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", 0x101}], 0x1}}], 0x2, 0x0) 00:35:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r0, 0xffffffffffffffff, 0x0, 0x7}, 0x10) 00:35:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000003c0)=0x4, 0x4) sendmmsg$inet6(r0, &(0x7f0000002140)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev, 0x1}, 0x1c, 0x0}}], 0x1, 0x4008800) sendmmsg$inet6(r0, &(0x7f0000002000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @empty}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000040)="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", 0x101}], 0x1}}], 0x2, 0x0) [ 2134.547306][ T4500] warn_alloc: 3 callbacks suppressed [ 2134.547650][ T4500] syz-executor.0: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 2134.596449][ T4500] CPU: 0 PID: 4500 Comm: syz-executor.0 Tainted: G W 6.2.0-rc1-syzkaller #0 [ 2134.599271][ T4500] Hardware name: riscv-virtio,qemu (DT) [ 2134.600634][ T4500] Call Trace: [ 2134.601811][ T4500] [] dump_backtrace+0x2e/0x3c [ 2134.603782][ T4500] [] show_stack+0x34/0x40 [ 2134.605498][ T4500] [] dump_stack_lvl+0xe0/0x14c [ 2134.607323][ T4500] [] dump_stack+0x1c/0x24 [ 2134.609007][ T4500] [] warn_alloc+0x168/0x22c [ 2134.610605][ T4500] [] __vmalloc_node_range+0xb6c/0xdb4 [ 2134.612383][ T4500] [] bpf_jit_alloc_exec+0x46/0x52 [ 2134.614589][ T4500] [] bpf_jit_binary_alloc+0x96/0x13c [ 2134.616266][ T4500] [] bpf_int_jit_compile+0x886/0xaa6 [ 2134.618011][ T4500] [] bpf_prog_select_runtime+0x1a2/0x22e [ 2134.619809][ T4500] [] bpf_prog_load+0xcb4/0x12b0 [ 2134.621637][ T4500] [] __sys_bpf+0x622/0x31d2 [ 2134.623482][ T4500] [] sys_bpf+0x28/0x36 [ 2134.625317][ T4500] [] ret_from_syscall+0x0/0x2 [ 2134.768269][ T4500] Mem-Info: [ 2134.769886][ T4500] active_anon:52270 inactive_anon:77 isolated_anon:0 [ 2134.769886][ T4500] active_file:0 inactive_file:7622 isolated_file:0 [ 2134.769886][ T4500] unevictable:768 dirty:15 writeback:0 [ 2134.769886][ T4500] slab_reclaimable:5527 slab_unreclaimable:23836 [ 2134.769886][ T4500] mapped:8713 shmem:912 pagetables:343 [ 2134.769886][ T4500] sec_pagetables:0 bounce:0 [ 2134.769886][ T4500] kernel_misc_reclaimable:0 [ 2134.769886][ T4500] free:205651 free_pcp:988 free_cma:4096 [ 2134.808137][ T4500] Node 0 active_anon:209080kB inactive_anon:308kB active_file:0kB inactive_file:30488kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34852kB dirty:60kB writeback:0kB shmem:3648kB writeback_tmp:0kB kernel_stack:5280kB pagetables:1372kB sec_pagetables:0kB all_unreclaimable? no [ 2134.817460][ T4500] Node 0 DMA32 free:822380kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:209080kB inactive_anon:308kB active_file:0kB inactive_file:30488kB unevictable:3072kB writepending:60kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:4108kB local_pcp:1764kB free_cma:16384kB [ 2134.821179][ T4500] lowmem_reserve[]: 0 0 0 [ 2134.824782][ T4500] Node 0 DMA32: 1239*4kB (UME) 1302*8kB (UME) 596*16kB (UME) 265*32kB (UME) 168*64kB (UME) 68*128kB (UME) 40*256kB (UM) 27*512kB (UME) 14*1024kB (UME) 5*2048kB (UMC) 176*4096kB (UMC) = 822380kB [ 2134.867876][ T4500] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2134.869499][ T4500] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 2134.871118][ T4500] 8536 total pagecache pages [ 2134.872445][ T4500] 0 pages in swap cache [ 2134.876377][ T4500] Free swap = 0kB [ 2134.877671][ T4500] Total swap = 0kB [ 2134.878850][ T4500] 523776 pages RAM [ 2134.880014][ T4500] 0 pages HighMem/MovableOnly [ 2134.881163][ T4500] 184025 pages reserved [ 2134.882354][ T4500] 4096 pages cma reserved 00:35:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r0, 0xffffffffffffffff, 0x0, 0x7}, 0x10) 00:35:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000003c0)=0x4, 0x4) sendmmsg$inet6(r0, &(0x7f0000002140)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev, 0x1}, 0x1c, 0x0}}], 0x1, 0x4008800) sendmmsg$inet6(r0, &(0x7f0000002000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @empty}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000040)="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", 0x101}], 0x1}}], 0x2, 0x0) 00:35:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r0, 0xffffffffffffffff, 0x0, 0x7}, 0x10) 00:35:39 executing program 1: r0 = io_uring_setup(0x6229, &(0x7f0000000000)) sync_file_range(r0, 0x0, 0xfffffffffffffc00, 0x0) 00:35:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r0, 0xffffffffffffffff, 0x0, 0x7}, 0x10) 00:35:42 executing program 1: r0 = io_uring_setup(0x6229, &(0x7f0000000000)) sync_file_range(r0, 0x0, 0xfffffffffffffc00, 0x0) 00:35:45 executing program 1: r0 = io_uring_setup(0x6229, &(0x7f0000000000)) sync_file_range(r0, 0x0, 0xfffffffffffffc00, 0x0) 00:35:45 executing program 0: r0 = syz_io_uring_setup(0x1f67, &(0x7f0000000200), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000080)) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x3, 0x0, 0x2) 00:35:48 executing program 0: r0 = syz_io_uring_setup(0x1f67, &(0x7f0000000200), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000080)) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x3, 0x0, 0x2) 00:35:49 executing program 1: r0 = io_uring_setup(0x6229, &(0x7f0000000000)) sync_file_range(r0, 0x0, 0xfffffffffffffc00, 0x0) 00:35:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000100)={0x14, r1, 0x301, 0x0, 0x0, {0x38}}, 0x14}}, 0x0) 00:35:53 executing program 0: r0 = syz_io_uring_setup(0x1f67, &(0x7f0000000200), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000080)) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x3, 0x0, 0x2) 00:35:56 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0), &(0x7f0000000000)=0x8) 00:35:58 executing program 0: r0 = syz_io_uring_setup(0x1f67, &(0x7f0000000200), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000080)) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x3, 0x0, 0x2) 00:36:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0), &(0x7f0000000000)=0x8) 00:36:01 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000140)={0x0, 0x0, 0x800}, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000990000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) syz_io_uring_submit(r1, r2, &(0x7f0000000240), 0x0) sendto$inet(r3, &(0x7f0000000200)='u', 0x34000, 0x0, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r3, 0x0, &(0x7f0000000a80)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x6528, 0x0, 0x0, 0x0, 0x0) 00:36:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0), &(0x7f0000000000)=0x8) 00:36:06 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000140)={0x0, 0x0, 0x800}, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000990000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) syz_io_uring_submit(r1, r2, &(0x7f0000000240), 0x0) sendto$inet(r3, &(0x7f0000000200)='u', 0x34000, 0x0, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r3, 0x0, &(0x7f0000000a80)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x6528, 0x0, 0x0, 0x0, 0x0) 00:36:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0), &(0x7f0000000000)=0x8) 00:36:10 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000140)={0x0, 0x0, 0x800}, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000990000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) syz_io_uring_submit(r1, r2, &(0x7f0000000240), 0x0) sendto$inet(r3, &(0x7f0000000200)='u', 0x34000, 0x0, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r3, 0x0, &(0x7f0000000a80)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x6528, 0x0, 0x0, 0x0, 0x0) 00:36:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000004700)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x800f}}], 0x30}], 0x1, 0x0) 00:36:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELCHAIN={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x801, 0x0, 0x0, {0xa}, [@NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x9c}}, 0x0) 00:36:14 executing program 0: r0 = syz_io_uring_setup(0x884, &(0x7f0000000140)={0x0, 0x0, 0x800}, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000990000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) syz_io_uring_submit(r1, r2, &(0x7f0000000240), 0x0) sendto$inet(r3, &(0x7f0000000200)='u', 0x34000, 0x0, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r3, 0x0, &(0x7f0000000a80)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x6528, 0x0, 0x0, 0x0, 0x0) 00:36:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELCHAIN={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x801, 0x0, 0x0, {0xa}, [@NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x9c}}, 0x0) 00:36:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c07, 0xffffffffffffffff) [ 2182.467854][ T4555] warn_alloc: 3 callbacks suppressed [ 2182.468224][ T4555] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 2182.537633][ T4555] CPU: 1 PID: 4555 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 2182.539627][ T4555] Hardware name: riscv-virtio,qemu (DT) [ 2182.540882][ T4555] Call Trace: [ 2182.541939][ T4555] [] dump_backtrace+0x2e/0x3c [ 2182.543572][ T4555] [] show_stack+0x34/0x40 [ 2182.545172][ T4555] [] dump_stack_lvl+0xe0/0x14c [ 2182.547432][ T4555] [] dump_stack+0x1c/0x24 [ 2182.549160][ T4555] [] warn_alloc+0x168/0x22c [ 2182.550802][ T4555] [] __vmalloc_node_range+0xb6c/0xdb4 [ 2182.552614][ T4555] [] bpf_jit_alloc_exec+0x46/0x52 [ 2182.554825][ T4555] [] bpf_jit_binary_alloc+0x96/0x13c [ 2182.556469][ T4555] [] bpf_int_jit_compile+0x886/0xaa6 [ 2182.558193][ T4555] [] bpf_prog_select_runtime+0x1a2/0x22e [ 2182.559850][ T4555] [] bpf_migrate_filter+0x258/0x2be [ 2182.561864][ T4555] [] bpf_prepare_filter+0x10e/0x1b4 [ 2182.563659][ T4555] [] __get_filter+0x148/0x1a0 [ 2182.565406][ T4555] [] sk_attach_filter+0x22/0x11a [ 2182.566999][ T4555] [] sk_setsockopt+0x144e/0x270c [ 2182.568628][ T4555] [] sock_setsockopt+0x48/0x58 [ 2182.570292][ T4555] [] __sys_setsockopt+0x3f0/0x418 [ 2182.571875][ T4555] [] sys_setsockopt+0x3a/0x4c [ 2182.573523][ T4555] [] ret_from_syscall+0x0/0x2 [ 2182.780986][ T4555] Mem-Info: [ 2182.782947][ T4555] active_anon:50692 inactive_anon:78 isolated_anon:0 [ 2182.782947][ T4555] active_file:0 inactive_file:7649 isolated_file:0 [ 2182.782947][ T4555] unevictable:768 dirty:3 writeback:0 [ 2182.782947][ T4555] slab_reclaimable:5527 slab_unreclaimable:24057 [ 2182.782947][ T4555] mapped:8713 shmem:913 pagetables:338 [ 2182.782947][ T4555] sec_pagetables:0 bounce:0 [ 2182.782947][ T4555] kernel_misc_reclaimable:0 [ 2182.782947][ T4555] free:206872 free_pcp:964 free_cma:4096 [ 2182.818987][ T4555] Node 0 active_anon:202768kB inactive_anon:312kB active_file:0kB inactive_file:30596kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34852kB dirty:12kB writeback:0kB shmem:3652kB writeback_tmp:0kB kernel_stack:5248kB pagetables:1352kB sec_pagetables:0kB all_unreclaimable? no [ 2182.822969][ T4555] Node 0 DMA32 free:827488kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:202768kB inactive_anon:312kB active_file:0kB inactive_file:30596kB unevictable:3072kB writepending:12kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:3856kB local_pcp:2540kB free_cma:16384kB [ 2182.871160][ T4555] lowmem_reserve[]: 0 0 0 [ 2182.896046][ T4555] Node 0 DMA32: 1304*4kB (UME) 1390*8kB (UME) 707*16kB (UME) 327*32kB (UME) 168*64kB (UME) 67*128kB (UME) 38*256kB (UM) 27*512kB (UME) 13*1024kB (ME) 4*2048kB (MC) 177*4096kB (UMC) = 827488kB [ 2182.975461][ T4555] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2182.979444][ T4555] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 2182.981938][ T4555] 8562 total pagecache pages [ 2183.000626][ T4555] 0 pages in swap cache [ 2183.002523][ T4555] Free swap = 0kB [ 2183.022833][ T4555] Total swap = 0kB [ 2183.041484][ T4555] 523776 pages RAM [ 2183.043020][ T4555] 0 pages HighMem/MovableOnly [ 2183.047743][ T4555] 184025 pages reserved [ 2183.049031][ T4555] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:36:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELCHAIN={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x801, 0x0, 0x0, {0xa}, [@NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x9c}}, 0x0) ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:36:24 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001ac0), 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000000), 0x4) ioctl$SNDCTL_SEQ_GETINCOUNT(r0, 0xc0045401, &(0x7f0000000040)) ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:36:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELCHAIN={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x801, 0x0, 0x0, {0xa}, [@NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x9c}}, 0x0) 00:36:28 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001ac0), 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000000), 0x4) ioctl$SNDCTL_SEQ_GETINCOUNT(r0, 0xc0045401, &(0x7f0000000040)) 00:36:31 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x4, 0x9, 0x9}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x1000000}, 0x38) 00:36:31 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001ac0), 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000000), 0x4) ioctl$SNDCTL_SEQ_GETINCOUNT(r0, 0xc0045401, &(0x7f0000000040)) 00:36:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty}, {0x0, @link_local}, 0x1c, {0x2, 0x0, @multicast2}, 'ip_vti0\x00'}) 00:36:34 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001ac0), 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000000), 0x4) ioctl$SNDCTL_SEQ_GETINCOUNT(r0, 0xc0045401, &(0x7f0000000040)) 00:36:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) sendfile(r2, r1, 0x0, 0x2fff2) 00:36:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x3c, r1, 0x1, 0x0, 0x0, {0x22}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) [ 2198.832238][ T27] audit: type=1804 audit(2198.220:16): pid=4579 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/163/file1" dev="vda" ino=641 res=1 errno=0 00:36:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x81009431, &(0x7f0000000180)={@desc={0x1, 0x0, @desc1}, 0x40, 0x0, '\x00', @b}) 00:36:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) sendfile(r2, r1, 0x0, 0x2fff2) [ 2202.631054][ T27] audit: type=1804 audit(2202.020:17): pid=4584 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/164/file1" dev="vda" ino=644 res=1 errno=0 00:36:42 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x1) 00:36:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) sendfile(r2, r1, 0x0, 0x2fff2) 00:36:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={0x24, r1, 0x1, 0x0, 0x0, {0x7}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x24}}, 0x0) [ 2207.468017][ T27] audit: type=1804 audit(2206.860:18): pid=4588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/165/file1" dev="vda" ino=639 res=1 errno=0 00:36:47 executing program 0: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2) 00:36:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) sendfile(r2, r1, 0x0, 0x2fff2) 00:36:51 executing program 0: io_setup(0x5, &(0x7f0000000440)=0x0) io_pgetevents(r0, 0x4, 0x4, &(0x7f0000000480)=[{}, {}, {}, {}], &(0x7f0000000540)={0x0, 0x3938700}, 0x0) [ 2212.926856][ T27] audit: type=1804 audit(2212.310:19): pid=4594 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/166/file1" dev="vda" ino=639 res=1 errno=0 00:36:54 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/21, 0x15}], 0x1) 00:36:56 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setreuid(0x0, r2) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, 0x0, 0x0) 00:36:57 executing program 0: io_setup(0x3, &(0x7f0000000200)=0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) io_submit(r0, 0x1, &(0x7f0000000b40)=[&(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 00:36:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x6, 0x8, 0x500, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10}, 0x48) 00:37:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000048c0)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @remote, 0x6}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000200)="ba", 0x1}], 0x1}}], 0x2, 0x8001) 00:37:03 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x0, 0x0, {}, {}, {}, 0x300, @can={{}, 0x0, 0x0, 0x0, 0x0, "d7f8000000009a0a"}}, 0x48}}, 0x0) 00:37:04 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_GETISPACE(r0, 0x8004500b, 0x0) 00:37:07 executing program 1: r0 = timerfd_create(0x0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x1412, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x8}]}, 0x18}}, 0x0) 00:37:08 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_GETISPACE(r0, 0x8004500b, 0x0) [ 2229.663172][ T4612] netlink: 'syz-executor.1': attribute type 8 has an invalid length. 00:37:10 executing program 1: r0 = timerfd_create(0x0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x1412, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x8}]}, 0x18}}, 0x0) 00:37:11 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_GETISPACE(r0, 0x8004500b, 0x0) [ 2232.679552][ T4616] netlink: 'syz-executor.1': attribute type 8 has an invalid length. 00:37:12 executing program 1: r0 = timerfd_create(0x0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x1412, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x8}]}, 0x18}}, 0x0) 00:37:14 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000240)=0x7f) ioctl$SNDCTL_DSP_GETISPACE(r0, 0x8004500b, 0x0) [ 2234.831061][ T4620] netlink: 'syz-executor.1': attribute type 8 has an invalid length. 00:37:14 executing program 1: r0 = timerfd_create(0x0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x1412, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x8}]}, 0x18}}, 0x0) [ 2237.140793][ T4624] netlink: 'syz-executor.1': attribute type 8 has an invalid length. 00:37:18 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_DIRENT(r0, &(0x7f0000002240)={0x10, 0x3}, 0x10) 00:37:19 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) r1 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) dup3(r2, r1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5, '\x00', 0x0}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x167) 00:37:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1636e1, 0xba2e828da8a1beed) setreuid(0xee00, 0x0) r1 = getuid() r2 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r2, 0x5460, 0xec000) setreuid(0xee00, r1) pwritev(r0, &(0x7f0000003200)=[{&(0x7f0000000000)="95", 0x1}], 0x1, 0x0, 0x0) 00:37:22 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) r1 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) dup3(r2, r1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5, '\x00', 0x0}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x167) ps_root_recvmsgcb: failed to send message to pid 4555: Connection refused ps_root_recvmsgcb: failed to send message to pid 4558: Connection refused ps_root_recvmsgcb: failed to send message to pid 4559: Connection refused 00:37:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1636e1, 0xba2e828da8a1beed) setreuid(0xee00, 0x0) r1 = getuid() r2 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r2, 0x5460, 0xec000) setreuid(0xee00, r1) pwritev(r0, &(0x7f0000003200)=[{&(0x7f0000000000)="95", 0x1}], 0x1, 0x0, 0x0) ps_root_recvmsgcb: failed to send message to pid 4560: Connection refused 00:37:28 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) r1 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) dup3(r2, r1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5, '\x00', 0x0}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x167) 00:37:30 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) r1 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) dup3(r2, r1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5, '\x00', 0x0}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x167) 00:37:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1636e1, 0xba2e828da8a1beed) setreuid(0xee00, 0x0) r1 = getuid() r2 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r2, 0x5460, 0xec000) setreuid(0xee00, r1) pwritev(r0, &(0x7f0000003200)=[{&(0x7f0000000000)="95", 0x1}], 0x1, 0x0, 0x0) 00:37:34 executing program 1: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0x15) 00:37:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1636e1, 0xba2e828da8a1beed) setreuid(0xee00, 0x0) r1 = getuid() r2 = memfd_secret(0x0) ioctl$NS_GET_PARENT(r2, 0x5460, 0xec000) setreuid(0xee00, r1) pwritev(r0, &(0x7f0000003200)=[{&(0x7f0000000000)="95", 0x1}], 0x1, 0x0, 0x0) 00:37:37 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000140)={0x0, 0xffffffff}) 00:37:40 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000140)={0x0, 0xffffffff}) 00:37:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00022f8d4efb9db3a1d6fb2140e7df455d"], 0x1, 0x74e, &(0x7f0000000840)="$eJzs3c9rHOUfB/DPzOZX23y/SaVUK4IBDxXUTVNbf53SKgpVRFQ8N6TbUrptShLBxB5Sjx5EUPCo/hcFL714FjxUvepJoUi1l4qyMrO7ydLsJjFsdtB5vWA2zzPPJs/zzpA8MzvLPgGU1lT2kEYciYizScREa38SEcN5aShitvm8e3euzf9x59p8Eo3GW78m+XOyfdHxPZkDrcpYRHx7OokHKpv7XVpZvTRXr9cWW/Xp5ctXp5dWVp+6eHnuQu1C7crxEydnnj353DMnnu9b1sNnnnz98Acv3vqq8eYrL31zci2J2RhvtXXm6JepmFr/nXQaioiX+91ZQSqtPJ05k6ECB8Q/knYcw8MxEZXYOHgT8fV3hQ4OANgTjUpEAwAomcT8DwAl034d4N6da/PtrdhXJAbr9qnIb1Ruzj8Us/nXsfw+6P7fk+i8rZVExGQf+p+KiBt337mVbbFH9yG3snY9Ih7qlj/J80/md3E3569ExLE+9D91X/3flH+2D/0XnR+Acrp5qjmRbZ7/0vXzn+gy/411mbt2o+j5r/f530b+So/zvzd22McXHz3yYK+2zvO/bMv6b58LDsLt6xEPD/U+/8nyJz3yn91hHzd+fn+uV1vR+RtfRhztev2z8Y62ZOv3J06fv1ivHWs+du3jk+kzH/bqv+j82fHf3yP/dsf/6g77+OvQj6d7tW2fP/1lJHk7L4209rw3t7y8OBMxkry2ef/xrcfSfk77Z2T5H39s67//bvmza8K1Heb//NXfPtt9/r2V5T+3y+P/8Q77+HPhp7FebUXnBwAAAAAAAAAAAAAAAAAAAAAAAIBBSCNiPJK0ul5O02q1uYb3odif1heWlp84v/DulXORr5U9GcNp+5MuJ5r1JKvPtD4Pv10/fl/96Yg4GBGfju7L69X5hfq5osMDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQMuB+9b/vzvaXP8fAPiPGyt6AADAwJn/AaB8zP8AUD7mfwAoH/M/AJSP+R8Aysf8DwAAAAAAAAAAAAAAAAAAAAAAA3Xw0Zs/JBGx9sK+fMuMtNqGCx0ZsNfSogcAFKZS9ACAwgwVPQCgMK7xgWSb9p4fEb7mCgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgPI4esT6/1BW1v+H8rJ6J5SX9f+hvFzjA9b/BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA7Y3nW5JWW2uBj0eaVqsR/4uIyRhOzl+s145FxP8j4vvR4dGsPlP0oAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgz5ZWVi/N1eu1RQUFBYX1QtH/mQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGDwNhb9LnokAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFGlpZfXSXL1eW9zDQtEZAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPrp7wAAAP//3MYrEg==") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x8000}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4142, 0x0) 00:37:42 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000140)={0x0, 0xffffffff}) [ 2265.280436][ T4653] loop0: detected capacity change from 0 to 2048 00:37:45 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000140)={0x0, 0xffffffff}) [ 2266.327327][ T4653] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 00:37:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00022f8d4efb9db3a1d6fb2140e7df455d"], 0x1, 0x74e, &(0x7f0000000840)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x8000}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4142, 0x0) [ 2268.912913][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:37:49 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) r1 = dup(r0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f00000001c0)={{0x8, 0x0, 0x0, 0x0, 'syz1\x00'}}) 00:37:52 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0xf, 0x0, &(0x7f0000000380)) [ 2275.120718][ T4666] loop0: detected capacity change from 0 to 2048 [ 2275.997445][ T4666] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 00:37:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001240)={'sit0\x00', 0x0}) [ 2277.129863][ T27] audit: type=1800 audit(2276.520:20): pid=4666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=15 res=0 errno=0 00:37:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00022f8d4efb9db3a1d6fb2140e7df455d"], 0x1, 0x74e, &(0x7f0000000840)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x8000}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4142, 0x0) [ 2278.352129][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:37:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001240)={'sit0\x00', 0x0}) [ 2284.128887][ T4677] loop0: detected capacity change from 0 to 2048 00:38:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001240)={'sit0\x00', 0x0}) [ 2285.208121][ T4677] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 2286.106495][ T27] audit: type=1800 audit(2285.490:21): pid=4677 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=15 res=0 errno=0 00:38:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00022f8d4efb9db3a1d6fb2140e7df455d"], 0x1, 0x74e, &(0x7f0000000840)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x8000}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4142, 0x0) [ 2287.249474][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:38:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001240)={'sit0\x00', 0x0}) 00:38:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)={0x18, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x4, 0x2}]}, 0x18}}, 0x0) [ 2291.259646][ T4688] loop0: detected capacity change from 0 to 2048 [ 2291.894128][ T4688] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 00:38:11 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x1401, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x7}]}, 0x18}}, 0x0) [ 2293.111625][ T27] audit: type=1800 audit(2292.500:22): pid=4688 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=15 res=0 errno=0 [ 2294.020184][ T4694] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 00:38:14 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x1401, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x7}]}, 0x18}}, 0x0) [ 2295.472322][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:38:16 executing program 0: r0 = socket$inet(0x2, 0x3, 0x7) sendmsg$inet_sctp(r0, &(0x7f0000000340)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) [ 2297.993278][ T4699] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 00:38:18 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x1401, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x7}]}, 0x18}}, 0x0) 00:38:18 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000140)=0x8001) [ 2300.516138][ T4704] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 00:38:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000000)=""/19, &(0x7f0000000040)=0x13) 00:38:21 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x1401, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x7}]}, 0x18}}, 0x0) [ 2303.287535][ T4708] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 00:38:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newtaction={0x84, 0x30, 0x1, 0x0, 0x0, {}, [{0x70, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0x10}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x84}}, 0x0) 00:38:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x2a, &(0x7f0000001580), 0x4) 00:38:25 executing program 0: r0 = memfd_create(&(0x7f0000000000)=']V-#h{\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8}) 00:38:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x2a, &(0x7f0000001580), 0x4) 00:38:28 executing program 0: r0 = memfd_create(&(0x7f0000000000)=']V-#h{\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8}) 00:38:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x2a, &(0x7f0000001580), 0x4) [ 2310.651464][ T4718] warn_alloc: 3 callbacks suppressed [ 2310.651735][ T4718] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 2310.657176][ T4718] CPU: 1 PID: 4718 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 2310.658488][ T4718] Hardware name: riscv-virtio,qemu (DT) [ 2310.659219][ T4718] Call Trace: [ 2310.659955][ T4718] [] dump_backtrace+0x2e/0x3c [ 2310.661102][ T4718] [] show_stack+0x34/0x40 [ 2310.662254][ T4718] [] dump_stack_lvl+0xe0/0x14c [ 2310.663418][ T4718] [] dump_stack+0x1c/0x24 [ 2310.664777][ T4718] [] warn_alloc+0x168/0x22c [ 2310.665839][ T4718] [] __vmalloc_node_range+0xb6c/0xdb4 [ 2310.666940][ T4718] [] bpf_jit_alloc_exec+0x46/0x52 [ 2310.667899][ T4718] [] bpf_jit_binary_alloc+0x96/0x13c [ 2310.668916][ T4718] [] bpf_int_jit_compile+0x886/0xaa6 [ 2310.670044][ T4718] [] bpf_prog_select_runtime+0x1a2/0x22e [ 2310.670950][ T4718] [] bpf_migrate_filter+0x258/0x2be [ 2310.672362][ T4718] [] bpf_prepare_filter+0x10e/0x1b4 [ 2310.674101][ T4718] [] __get_filter+0x148/0x1a0 [ 2310.675603][ T4718] [] sk_attach_filter+0x22/0x11a [ 2310.676896][ T4718] [] sk_setsockopt+0x144e/0x270c [ 2310.678286][ T4718] [] sock_setsockopt+0x48/0x58 [ 2310.679341][ T4718] [] __sys_setsockopt+0x3f0/0x418 [ 2310.680521][ T4718] [] sys_setsockopt+0x3a/0x4c [ 2310.681772][ T4718] [] ret_from_syscall+0x0/0x2 [ 2310.770162][ T4718] Mem-Info: [ 2310.772156][ T4718] active_anon:47855 inactive_anon:81 isolated_anon:0 [ 2310.772156][ T4718] active_file:0 inactive_file:7723 isolated_file:0 [ 2310.772156][ T4718] unevictable:768 dirty:5 writeback:0 [ 2310.772156][ T4718] slab_reclaimable:5559 slab_unreclaimable:23909 [ 2310.772156][ T4718] mapped:8729 shmem:916 pagetables:338 [ 2310.772156][ T4718] sec_pagetables:0 bounce:0 [ 2310.772156][ T4718] kernel_misc_reclaimable:0 [ 2310.772156][ T4718] free:209280 free_pcp:1086 free_cma:4096 [ 2310.790392][ T4718] Node 0 active_anon:191420kB inactive_anon:324kB active_file:0kB inactive_file:30892kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34916kB dirty:20kB writeback:0kB shmem:3664kB writeback_tmp:0kB kernel_stack:5248kB pagetables:1352kB sec_pagetables:0kB all_unreclaimable? no [ 2310.798156][ T4718] Node 0 DMA32 free:837120kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:191420kB inactive_anon:324kB active_file:0kB inactive_file:30892kB unevictable:3072kB writepending:20kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:4344kB local_pcp:1712kB free_cma:16384kB [ 2310.801706][ T4718] lowmem_reserve[]: 0 0 0 [ 2310.804454][ T4718] Node 0 DMA32: 932*4kB (ME) 1444*8kB (UME) 901*16kB (UME) 444*32kB (UME) 194*64kB (UME) 78*128kB (UM) 39*256kB (UM) 28*512kB (UME) 13*1024kB (ME) 4*2048kB (MC) 177*4096kB (UMC) = 837120kB [ 2310.817114][ T4718] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2310.828839][ T4718] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 2310.847481][ T4718] 8639 total pagecache pages [ 2310.850548][ T4718] 0 pages in swap cache [ 2310.851406][ T4718] Free swap = 0kB [ 2310.852467][ T4718] Total swap = 0kB [ 2310.853259][ T4718] 523776 pages RAM [ 2310.871831][ T4718] 0 pages HighMem/MovableOnly [ 2310.872575][ T4718] 184025 pages reserved [ 2310.874583][ T4718] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:38:32 executing program 0: r0 = memfd_create(&(0x7f0000000000)=']V-#h{\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8}) ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:38:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x2a, &(0x7f0000001580), 0x4) 00:38:35 executing program 0: r0 = memfd_create(&(0x7f0000000000)=']V-#h{\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8}) 00:38:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) 00:38:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f00000020c0), 0x0, &(0x7f0000002100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x1) 00:38:39 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x8, 0x1, '..\'\x00'}]}, 0x1c}}, 0x0) 00:38:41 executing program 0: syz_emit_ethernet(0x86, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x7800, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x0, 0x4e20, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "07cd5fd1cb44e03fc8a46888b4d111966756443e985f249e3c04417bf95ed1b9", "cd44521cded2409c06fb34d63850995f", {"95a074fc9eb3697270e8d01c8b22d6d8", "597f412a9b6390fda83679011424c459"}}}}}}}, 0x0) 00:38:41 executing program 1: sigaltstack(&(0x7f00000024c0)={0x0, 0x80000002}, 0x0) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 00:38:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@ipv6_newaddr={0x34, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_RT_PRIORITY={0x8}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x34}}, 0x0) 00:38:43 executing program 0: syz_emit_ethernet(0x86, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x7800, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x0, 0x4e20, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "07cd5fd1cb44e03fc8a46888b4d111966756443e985f249e3c04417bf95ed1b9", "cd44521cded2409c06fb34d63850995f", {"95a074fc9eb3697270e8d01c8b22d6d8", "597f412a9b6390fda83679011424c459"}}}}}}}, 0x0) 00:38:45 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180), 0x8001, 0x0) write$sequencer(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000ff0c"], 0x14) 00:38:46 executing program 0: syz_emit_ethernet(0x86, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x7800, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x0, 0x4e20, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "07cd5fd1cb44e03fc8a46888b4d111966756443e985f249e3c04417bf95ed1b9", "cd44521cded2409c06fb34d63850995f", {"95a074fc9eb3697270e8d01c8b22d6d8", "597f412a9b6390fda83679011424c459"}}}}}}}, 0x0) 00:38:49 executing program 0: syz_emit_ethernet(0x86, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x7800, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x0, 0x4e20, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "07cd5fd1cb44e03fc8a46888b4d111966756443e985f249e3c04417bf95ed1b9", "cd44521cded2409c06fb34d63850995f", {"95a074fc9eb3697270e8d01c8b22d6d8", "597f412a9b6390fda83679011424c459"}}}}}}}, 0x0) 00:38:49 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180), 0x8001, 0x0) write$sequencer(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000ff0c"], 0x14) 00:38:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, 0x0, &(0x7f0000000140)) 00:38:52 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180), 0x8001, 0x0) write$sequencer(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000ff0c"], 0x14) 00:38:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x7, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000000c0)='>', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/134, 0x86}], 0x1) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) 00:38:55 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180), 0x8001, 0x0) write$sequencer(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000ff0c"], 0x14) 00:38:59 executing program 1: syz_io_uring_setup(0x76a8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040), 0x0) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 00:39:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x7, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000000c0)='>', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/134, 0x86}], 0x1) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) [ 2342.601045][ T4769] mmap: syz-executor.1 (4769) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. 00:39:03 executing program 1: syz_io_uring_setup(0x76a8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040), 0x0) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 00:39:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x7, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000000c0)='>', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/134, 0x86}], 0x1) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) 00:39:07 executing program 1: syz_io_uring_setup(0x76a8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040), 0x0) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 00:39:11 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x7, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000000c0)='>', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/134, 0x86}], 0x1) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) 00:39:11 executing program 1: syz_io_uring_setup(0x76a8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040), 0x0) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 00:39:18 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x1, 0x0, 0xc1c2}) 00:39:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x5997, 0x9, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, &(0x7f0000000080), 0x0}, 0x20) 00:39:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x12, 0x9, 0x4, 0x8010040}, 0x48) 00:39:21 executing program 0: setgid(0xee01) 00:39:22 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000), 0x4) 00:39:23 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='setgroups\x00') openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0xff09) 00:39:24 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000), 0x4) 00:39:26 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='setgroups\x00') openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0xff09) 00:39:26 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000), 0x4) 00:39:30 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000), 0x4) 00:39:32 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='setgroups\x00') openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0xff09) 00:39:33 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='setgroups\x00') openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0xff09) ps_root_recvmsgcb: failed to send message to pid 4718: Connection refused ps_root_recvmsgcb: failed to send message to pid 4722: Connection refused ps_root_recvmsgcb: failed to send message to pid 4721: Connection refused 00:39:36 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='setgroups\x00') openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0xff09) ps_root_recvmsgcb: failed to send message to pid 4724: Connection refused 00:39:37 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='setgroups\x00') openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0xff09) 00:39:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@mcast1}, 0x14) 00:39:40 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='setgroups\x00') openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0xff09) 00:39:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@mcast1}, 0x14) 00:39:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@mcast1}, 0x14) 00:39:46 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_DIRENT(r0, &(0x7f0000002240)={0x10, 0x8000000000000001}, 0x10) 00:39:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@mcast1}, 0x14) 00:39:50 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_DIRENT(r0, &(0x7f0000002240)={0x10, 0x8000000000000001}, 0x10) 00:39:53 executing program 0: r0 = memfd_secret(0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000003040)={&(0x7f0000000200)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r0}]}]}, 0x2c}}, 0x0) 00:39:54 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_DIRENT(r0, &(0x7f0000002240)={0x10, 0x8000000000000001}, 0x10) 00:39:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x14) 00:39:59 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_DIRENT(r0, &(0x7f0000002240)={0x10, 0x8000000000000001}, 0x10) 00:39:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x14) 00:40:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x14) 00:40:03 executing program 1: syz_io_uring_setup(0x12a1, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) r4 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) r6 = openat(r5, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3, 0x12, r6, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x0) ioctl$TCXONC(r3, 0x540f, 0x0) truncate(&(0x7f0000000200)='./file1\x00', 0x0) syz_io_uring_submit(r2, r0, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x0) [ 2407.130196][ T27] audit: type=1800 audit(2406.510:23): pid=4856 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=643 res=0 errno=0 00:40:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x14) 00:40:10 executing program 1: syz_io_uring_setup(0x12a1, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) r4 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) r6 = openat(r5, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3, 0x12, r6, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x0) ioctl$TCXONC(r3, 0x540f, 0x0) truncate(&(0x7f0000000200)='./file1\x00', 0x0) syz_io_uring_submit(r2, r0, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x0) 00:40:11 executing program 0: syz_io_uring_setup(0x12a1, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) r4 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) r6 = openat(r5, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3, 0x12, r6, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x0) ioctl$TCXONC(r3, 0x540f, 0x0) truncate(&(0x7f0000000200)='./file1\x00', 0x0) syz_io_uring_submit(r2, r0, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x0) [ 2413.203010][ T27] audit: type=1800 audit(2412.590:24): pid=4862 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="vda" ino=643 res=0 errno=0 [ 2413.428089][ T27] audit: type=1800 audit(2412.820:25): pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=644 res=0 errno=0 00:40:15 executing program 1: syz_io_uring_setup(0x12a1, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) r4 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) r6 = openat(r5, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3, 0x12, r6, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x0) ioctl$TCXONC(r3, 0x540f, 0x0) truncate(&(0x7f0000000200)='./file1\x00', 0x0) syz_io_uring_submit(r2, r0, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x0) 00:40:15 executing program 0: syz_io_uring_setup(0x12a1, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) r4 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) r6 = openat(r5, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3, 0x12, r6, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x0) ioctl$TCXONC(r3, 0x540f, 0x0) truncate(&(0x7f0000000200)='./file1\x00', 0x0) syz_io_uring_submit(r2, r0, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x0) [ 2418.644681][ T27] audit: type=1800 audit(2418.030:26): pid=4866 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=643 res=0 errno=0 [ 2418.917485][ T27] audit: type=1800 audit(2418.300:27): pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="vda" ino=644 res=0 errno=0 00:40:20 executing program 1: syz_io_uring_setup(0x12a1, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) r4 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) r6 = openat(r5, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3, 0x12, r6, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x0) ioctl$TCXONC(r3, 0x540f, 0x0) truncate(&(0x7f0000000200)='./file1\x00', 0x0) syz_io_uring_submit(r2, r0, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x0) 00:40:21 executing program 0: syz_io_uring_setup(0x12a1, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) r4 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) r6 = openat(r5, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3, 0x12, r6, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x0) ioctl$TCXONC(r3, 0x540f, 0x0) truncate(&(0x7f0000000200)='./file1\x00', 0x0) syz_io_uring_submit(r2, r0, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x0) [ 2423.050567][ T27] audit: type=1800 audit(2422.440:28): pid=4870 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=643 res=0 errno=0 [ 2423.682325][ T27] audit: type=1800 audit(2423.070:29): pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="vda" ino=644 res=0 errno=0 00:40:25 executing program 1: syz_io_uring_setup(0x12a1, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) r4 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) r6 = openat(r5, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3, 0x12, r6, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x0) ioctl$TCXONC(r3, 0x540f, 0x0) truncate(&(0x7f0000000200)='./file1\x00', 0x0) syz_io_uring_submit(r2, r0, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x0) 00:40:26 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/raw\x00') preadv(r0, 0x0, 0x0, 0x0, 0x0) [ 2428.012895][ T27] audit: type=1800 audit(2427.400:30): pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=643 res=0 errno=0 00:40:28 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000), 0xebc, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000140)={0x1}) 00:40:29 executing program 1: syz_io_uring_setup(0x12a1, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) r4 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) r6 = openat(r5, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3, 0x12, r6, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x0) ioctl$TCXONC(r3, 0x540f, 0x0) truncate(&(0x7f0000000200)='./file1\x00', 0x0) syz_io_uring_submit(r2, r0, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x0) 00:40:31 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setreuid(0x0, r2) ioctl$BLKRRPART(r0, 0x125f, 0x0) [ 2433.272132][ T27] audit: type=1800 audit(2432.650:31): pid=4879 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=635 res=0 errno=0 00:40:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') read$FUSE(r0, &(0x7f0000004200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setreuid(0x0, r1) shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x0) 00:40:39 executing program 1: syz_io_uring_setup(0x12a1, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) r4 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) r6 = openat(r5, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3, 0x12, r6, 0x0) syz_io_uring_submit(r7, 0x0, 0x0, 0x0) ioctl$TCXONC(r3, 0x540f, 0x0) truncate(&(0x7f0000000200)='./file1\x00', 0x0) syz_io_uring_submit(r2, r0, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x0) 00:40:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe66e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) fallocate(r0, 0x10, 0x0, 0x9) [ 2443.986414][ T27] audit: type=1800 audit(2443.370:32): pid=4890 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=636 res=0 errno=0 00:40:46 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x18, &(0x7f0000000040)={r2}, 0x8) 00:40:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x17200000) [ 2453.151437][ T4897] loop1: detected capacity change from 0 to 512 00:40:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_LP_INTERVAL={0x8, 0x13, 0x48f4}, @IFLA_BOND_AD_USER_PORT_KEY={0x6}]}}}]}, 0x44}}, 0x0) [ 2453.972412][ T4899] warn_alloc: 3 callbacks suppressed [ 2453.972784][ T4899] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 2454.032234][ T4899] CPU: 0 PID: 4899 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 2454.034505][ T4899] Hardware name: riscv-virtio,qemu (DT) [ 2454.036398][ T4899] Call Trace: [ 2454.037591][ T4899] [] dump_backtrace+0x2e/0x3c [ 2454.039258][ T4899] [] show_stack+0x34/0x40 [ 2454.040677][ T4899] [] dump_stack_lvl+0xe0/0x14c [ 2454.042277][ T4899] [] dump_stack+0x1c/0x24 [ 2454.044435][ T4899] [] warn_alloc+0x168/0x22c [ 2454.045962][ T4899] [] __vmalloc_node_range+0xb6c/0xdb4 [ 2454.047548][ T4899] [] bpf_jit_alloc_exec+0x46/0x52 [ 2454.049000][ T4899] [] bpf_jit_binary_alloc+0x96/0x13c [ 2454.050426][ T4899] [] bpf_int_jit_compile+0x886/0xaa6 [ 2454.051956][ T4899] [] bpf_prog_select_runtime+0x1a2/0x22e [ 2454.053641][ T4899] [] bpf_migrate_filter+0x258/0x2be [ 2454.055397][ T4899] [] bpf_prepare_filter+0x10e/0x1b4 [ 2454.057091][ T4899] [] __get_filter+0x148/0x1a0 [ 2454.058761][ T4899] [] sk_attach_filter+0x22/0x11a [ 2454.060204][ T4899] [] sk_setsockopt+0x144e/0x270c [ 2454.061786][ T4899] [] sock_setsockopt+0x48/0x58 [ 2454.063373][ T4899] [] __sys_setsockopt+0x3f0/0x418 [ 2454.065429][ T4899] [] sys_setsockopt+0x3a/0x4c [ 2454.066857][ T4899] [] ret_from_syscall+0x0/0x2 [ 2454.225230][ T4899] Mem-Info: [ 2454.226694][ T4899] active_anon:44124 inactive_anon:148 isolated_anon:0 [ 2454.226694][ T4899] active_file:0 inactive_file:7804 isolated_file:0 [ 2454.226694][ T4899] unevictable:768 dirty:16 writeback:0 [ 2454.226694][ T4899] slab_reclaimable:5573 slab_unreclaimable:24210 [ 2454.226694][ T4899] mapped:8731 shmem:985 pagetables:345 [ 2454.226694][ T4899] sec_pagetables:0 bounce:0 [ 2454.226694][ T4899] kernel_misc_reclaimable:0 [ 2454.226694][ T4899] free:212634 free_pcp:574 free_cma:4096 [ 2454.230707][ T4899] Node 0 active_anon:176496kB inactive_anon:592kB active_file:0kB inactive_file:31216kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34924kB dirty:64kB writeback:0kB shmem:3940kB writeback_tmp:0kB kernel_stack:5360kB pagetables:1380kB sec_pagetables:0kB all_unreclaimable? no [ 2454.287544][ T4899] Node 0 DMA32 free:850536kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:176496kB inactive_anon:592kB active_file:0kB inactive_file:31216kB unevictable:3072kB writepending:64kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:2336kB local_pcp:1408kB free_cma:16384kB [ 2454.291293][ T4899] lowmem_reserve[]: 0 0 0 [ 2454.370863][ T4899] Node 0 DMA32: 828*4kB (ME) 1039*8kB (UME) 874*16kB (UME) 563*32kB (UME) 302*64kB (UME) 103*128kB (UM) 45*256kB (UM) 30*512kB (UME) 14*1024kB (ME) 4*2048kB (MC) 177*4096kB (UMC) = 850536kB [ 2454.462436][ T4899] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2454.498674][ T4899] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 2454.502068][ T4899] 8790 total pagecache pages [ 2454.517758][ T4899] 0 pages in swap cache [ 2454.519967][ T4899] Free swap = 0kB [ 2454.521685][ T4899] Total swap = 0kB [ 2454.547763][ T4899] 523776 pages RAM [ 2454.549735][ T4899] 0 pages HighMem/MovableOnly [ 2454.551664][ T4899] 184025 pages reserved [ 2454.595942][ T4899] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 [ 2455.448357][ T4897] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 [ 2456.759449][ T27] audit: type=1804 audit(2456.120:33): pid=4897 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/230/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 2457.386814][ T4897] EXT4-fs warning (device loop1): ext4_block_to_path:105: block 387973120 > max in inode 15 [ 2457.939707][ T4906] (unnamed net_device) (uninitialized): option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) 00:40:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x17200000) 00:40:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_LP_INTERVAL={0x8, 0x13, 0x48f4}, @IFLA_BOND_AD_USER_PORT_KEY={0x6}]}}}]}, 0x44}}, 0x0) [ 2458.903026][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2460.578873][ T4911] (unnamed net_device) (uninitialized): option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) 00:41:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_LP_INTERVAL={0x8, 0x13, 0x48f4}, @IFLA_BOND_AD_USER_PORT_KEY={0x6}]}}}]}, 0x44}}, 0x0) [ 2462.438156][ T4912] loop1: detected capacity change from 0 to 512 [ 2463.188682][ T4912] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 2464.162711][ T4916] (unnamed net_device) (uninitialized): option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 2464.294347][ T27] audit: type=1804 audit(2463.670:34): pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/231/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 2464.846039][ T4912] EXT4-fs warning (device loop1): ext4_block_to_path:105: block 387973120 > max in inode 15 00:41:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_LP_INTERVAL={0x8, 0x13, 0x48f4}, @IFLA_BOND_AD_USER_PORT_KEY={0x6}]}}}]}, 0x44}}, 0x0) 00:41:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3db, &(0x7f00000004c0)="$eJzs3M9rHFUcAPDvTH61TetGbaxVwYWCBsRN06ZqwYO5iAdvevSy5BfFbVO6K5i04A/EoyB69VDEi+DJP0CPevXmVS9SCCL+ASuzmUnXdDftdrNuzH4+MOG9ebO878zLm5e8mbcBjKxyRHwYEZMRsRYRpXx/km/x2s6WHff3X7eWsy2JZvOtP5NWeZaPts9kprMfacRcGpF+EvF0h3rrm1vvVmu11Rt5fr5x9fp8fXPrxStXq+ur66vXXrr08uLC5YuXzh/cuT47Pbv5xfU3Ln+29Wlpffmbc1m8J/Oy9vM4KOUo716TvQ7wtA6Fk8MOgIeSRsRYRIy3+n8pxlqpHaX44J2hBgcADESz2RzbkwcAjrzEmA8AI6b4v794tjeI52AcXttLEXGsU/uP7z4Jmhjg871yRCz+dPz7bIsBPYcFAAAAGGU/LkXEK53mf9J4pu24UxHxSL4+YCYiHo2IxyLi8T7rL+/J3zv/k97pswr2sb0U8WrH+d+0OGRmLM+darX9RLJ2pbZ6Pv99mIuJqSy/sE8dN7/9/dduZe3zf9mW1V/MBeZx3Bmf+vdnVqqNaj/nzF3bH0U8Nd6p/ZPd+d8kIk73Ucdvn9e/61Z2//ZnkJq3I57r2P/vrlxK9l2fNd+6HcwXN4UObv8w+3O3+rX/cGX9/8T+7T+TtK/Xq/dex9df3Wp0K3vY+/9k8nYrwMl83/vVRuPGQsRk8ua9+y/0HvNRVVyP4npl7T93rvP4X9zzsws6GxFPRMSZiHgyIs72UOeZs7/c7Fam/w9X1v4rPfX/3hOV51//uFv9D9b/F1vBzOV7/P13fw/aQMOOEwAAAAAAAICDkbbWdidpZTedppXKznd4n44TaW2j3nhhbeO9ays7a8BnYiItXvUqtb0PupC/F1zkL+zJX8zfGf5y6ngrX1neqK0M++QBYERNdxn/M39MDTs6AGBgjg07AADgP2f8B4DRY/wHgNFj/AeA0WP8B4DRY/wHgJHSz/f6S0hIHNXEsO9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/2//BAAA//8Q3dmN") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x17200000) [ 2467.049914][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2467.879025][ T4920] (unnamed net_device) (uninitialized): option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) 00:41:09 executing program 0: syz_emit_ethernet(0x86, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x8000, 0x4e22, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "07cd5fd1cb44e03fc8a46888b4d109b34b3e443e985f249e3c04417bf95ed1b9", "cd23551cded2519406fb34d63850995f", {"a8a0641a9eb3697270e8d01c8b22d6d8", "597f412a9b6390fda83679011424c459"}}}}}}}, 0x0) [ 2471.391677][ T4922] loop1: detected capacity change from 0 to 512 [ 2472.273027][ T4922] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 00:41:12 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89e1, &(0x7f0000000100)={'syztnl1\x00', 0x0}) [ 2473.401620][ T27] audit: type=1804 audit(2472.770:35): pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/232/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 2474.092302][ T4922] EXT4-fs warning (device loop1): ext4_block_to_path:105: block 387973120 > max in inode 15 00:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwritev(r1, &(0x7f0000000a80)=[{&(0x7f0000000980)='+', 0x1}], 0x1, 0x100bfaa, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x17200000) [ 2475.411723][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:41:15 executing program 0: add_key(&(0x7f0000000000)='big_key\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmp(&(0x7f0000002100), 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r2, 0x40084149, &(0x7f0000000000)) [ 2478.230946][ T4932] loop1: detected capacity change from 0 to 512 [ 2478.657762][ T4932] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 00:41:18 executing program 0: capset(&(0x7f0000000440)={0x20080522}, &(0x7f0000000480)) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ip6erspan0\x00'}) [ 2479.475910][ T27] audit: type=1804 audit(2478.860:36): pid=4932 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/233/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 2479.808358][ T4932] EXT4-fs warning (device loop1): ext4_block_to_path:105: block 387973120 > max in inode 15 [ 2481.488185][ T2888] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:41:22 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) close(r0) 00:41:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000080)) 00:41:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000080)) 00:41:25 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) close(r0) 00:41:26 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) close(r0) 00:41:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000080)) 00:41:29 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) close(r0) 00:41:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000080)) 00:41:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x20}}, 0x0) 00:41:33 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_buf(r0, 0x29, 0x2d, &(0x7f0000000180)="8704b1c1c19124d1d3cc95a46544ae26855e9f45d388828862d0c06840fbedb15d2b9004d30090f66170370f2a3757a4bdc151906ede1251068250f6193be960fa931530fb56847ed35821f51c5e74ccedeaa4d7d23208af8a655337f27abb6dc30bab93233b4107294334ea74d4c3b2d3d54024a9abf6b4eb1e2e9bcc1f5e89c07a33eca49acbe0", 0x88) [ 2495.402904][ T4959] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:41:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000100)={0x1d, r2, 0x200000}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000440)={&(0x7f0000000340), 0x18, &(0x7f0000000400)={0x0}}, 0x0) 00:41:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x10}]}}, &(0x7f0000000200)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 00:41:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0x1, 0x74e, &(0x7f0000000840)="$eJzs3c9rHOUfB/DPzOZX23y/SaVUK4IBDxXUTVNbf53SKgpVRFQ8N6TbUrptShLBxB5Sjx5EUPCo/hcFL714FjxUvepJoUi1l4qyMrO7ydLsJjFsdtB5vWA2zzPPJs/zzpA8MzvLPgGU1lT2kEYciYizScREa38SEcN5aShitvm8e3euzf9x59p8Eo3GW78m+XOyfdHxPZkDrcpYRHx7OokHKpv7XVpZvTRXr9cWW/Xp5ctXp5dWVp+6eHnuQu1C7crxEydnnj353DMnnu9b1sNnnnz98Acv3vqq8eYrL31zci2J2RhvtXXm6JepmFr/nXQaioiX+91ZQSqtPJ05k6ECB8Q/knYcw8MxEZXYOHgT8fV3hQ4OANgTjUpEAwAomcT8DwAl034d4N6da/PtrdhXJAbr9qnIb1Ruzj8Us/nXsfw+6P7fk+i8rZVExGQf+p+KiBt337mVbbFH9yG3snY9Ih7qlj/J80/md3E3569ExLE+9D91X/3flH+2D/0XnR+Acrp5qjmRbZ7/0vXzn+gy/411mbt2o+j5r/f530b+So/zvzd22McXHz3yYK+2zvO/bMv6b58LDsLt6xEPD/U+/8nyJz3yn91hHzd+fn+uV1vR+RtfRhztev2z8Y62ZOv3J06fv1ivHWs+du3jk+kzH/bqv+j82fHf3yP/dsf/6g77+OvQj6d7tW2fP/1lJHk7L4209rw3t7y8OBMxkry2ef/xrcfSfk77Z2T5H39s67//bvmza8K1Heb//NXfPtt9/r2V5T+3y+P/8Q77+HPhp7FebUXnBwAAAAAAAAAAAAAAAAAAAAAAAIBBSCNiPJK0ul5O02q1uYb3odif1heWlp84v/DulXORr5U9GcNp+5MuJ5r1JKvPtD4Pv10/fl/96Yg4GBGfju7L69X5hfq5osMDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQMuB+9b/vzvaXP8fAPiPGyt6AADAwJn/AaB8zP8AUD7mfwAoH/M/AJSP+R8Aysf8DwAAAAAAAAAAAAAAAAAAAAAAA3Xw0Zs/JBGx9sK+fMuMtNqGCx0ZsNfSogcAFKZS9ACAwgwVPQCgMK7xgWSb9p4fEb7mCgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgPI4esT6/1BW1v+H8rJ6J5SX9f+hvFzjA9b/BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA7Y3nW5JWW2uBj0eaVqsR/4uIyRhOzl+s145FxP8j4vvR4dGsPlP0oAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgz5ZWVi/N1eu1RQUFBYX1QtH/mQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGDwNhb9LnokAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFGlpZfXSXL1eW9zDQtEZAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPrp7wAAAP//3MYrEg==") r0 = syz_open_procfs(0x0, &(0x7f00000012c0)='mountinfo\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 00:41:39 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setreuid(0x0, r1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x0) 00:41:42 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setreuid(0x0, r1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x0) [ 2504.668170][ T4968] loop0: detected capacity change from 0 to 2048 00:41:44 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setreuid(0x0, r1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x0) [ 2505.082678][ T4968] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 00:41:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x88, 0x11, 0x0, 0x7) [ 2506.839213][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:41:48 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x1c) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setreuid(0x0, r1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x0) 00:41:49 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind(r0, &(0x7f0000000080)=@ethernet={0x0, @broadcast}, 0x80) 00:41:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f0000000280)={0xa, 0x4e24, 0x0, @remote}, 0x1b, 0x0}}, {{&(0x7f00000005c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000002940)=[@rthdr={{0x28, 0x29, 0x39, {0x0, 0x2, 0x0, 0x0, 0x0, [@private2]}}}], 0x28}}], 0x2, 0x0) 00:41:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) 00:41:54 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$dsp(r0, &(0x7f0000001100)=""/107, 0x6b) close_range(r0, 0xffffffffffffffff, 0x0) ps_root_recvmsgcb: failed to send message to pid 4901: Connection refused ps_root_recvmsgcb: failed to send message to pid 4900: Connection refused ps_root_recvmsgcb: failed to send message to pid 4899: Connection refused 00:41:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000600)=[{&(0x7f0000000300)=""/240, 0xf0}], 0x1, 0x28000, 0x0) ps_root_recvmsgcb: failed to send message to pid 4903: Connection refused 00:41:58 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$dsp(r0, &(0x7f0000001100)=""/107, 0x6b) close_range(r0, 0xffffffffffffffff, 0x0) 00:41:59 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x300) 00:42:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000007f80)=ANY=[@ANYBLOB="736563758369747900000000000000000000000000000000000000000000000002"], 0x48) 00:42:02 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$dsp(r0, &(0x7f0000001100)=""/107, 0x6b) close_range(r0, 0xffffffffffffffff, 0x0) 00:42:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f00000007c0), 0x1, 0x72f, &(0x7f0000000800)="$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") 00:42:07 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$dsp(r0, &(0x7f0000001100)=""/107, 0x6b) close_range(r0, 0xffffffffffffffff, 0x0) [ 2529.690522][ T5003] loop0: detected capacity change from 0 to 2048 [ 2530.307588][ T5003] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 00:42:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) [ 2531.870104][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:42:11 executing program 1: rseq(&(0x7f0000000000), 0x20, 0x0, 0x0) syz_io_uring_complete(0x0) 00:42:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=@ipv6_newnexthop={0x1c, 0x68, 0x901, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) [ 2534.876534][ T5015] loop0: detected capacity change from 0 to 512 [ 2535.089382][ T5015] ext4: Unknown parameter 'nouser_xattr' [ 2535.894797][ T27] audit: type=1800 audit(2535.280:37): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="vda" ino=636 res=0 errno=0 [ 2536.100655][ T27] audit: type=1804 audit(2535.470:38): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/260/file1" dev="vda" ino=636 res=1 errno=0 [ 2536.204954][ T27] audit: type=1804 audit(2535.590:39): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/260/file1" dev="vda" ino=636 res=1 errno=0 00:42:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:42:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=@ipv6_newnexthop={0x1c, 0x68, 0x901, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) [ 2539.689114][ T5022] loop0: detected capacity change from 0 to 512 [ 2539.822967][ T5022] ext4: Unknown parameter 'nouser_xattr' [ 2540.349277][ T27] audit: type=1800 audit(2539.700:40): pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="vda" ino=644 res=0 errno=0 00:42:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=@ipv6_newnexthop={0x1c, 0x68, 0x901, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) [ 2540.642232][ T27] audit: type=1804 audit(2540.030:41): pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/261/file1" dev="vda" ino=644 res=1 errno=0 [ 2540.748582][ T27] audit: type=1804 audit(2540.140:42): pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/261/file1" dev="vda" ino=644 res=1 errno=0 00:42:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$eJzs3M9rHFUcAPDvTH61TetGbaxVwYWCBsRN06ZqwYO5iAdvevSy5BfFbVO6K5i04A/EoyB69VDEi+DJP0CPevXmVS9SCCL+ASuzmUnXdDftdrNuzH4+MOG9ebO878zLm5e8mbcBjKxyRHwYEZMRsRYRpXx/km/x2s6WHff3X7eWsy2JZvOtP5NWeZaPts9kprMfacRcGpF+EvF0h3rrm1vvVmu11Rt5fr5x9fp8fXPrxStXq+ur66vXXrr08uLC5YuXzh/cuT47Pbv5xfU3Ln+29Wlpffmbc1m8J/Oy9vM4KOUo716TvQ7wtA6Fk8MOgIeSRsRYRIy3+n8pxlqpHaX44J2hBgcADESz2RzbkwcAjrzEmA8AI6b4v794tjeI52AcXttLEXGsU/uP7z4Jmhjg871yRCz+dPz7bIsBPYcFAAAAGGU/LkXEK53mf9J4pu24UxHxSL4+YCYiHo2IxyLi8T7rL+/J3zv/k97pswr2sb0U8WrH+d+0OGRmLM+darX9RLJ2pbZ6Pv99mIuJqSy/sE8dN7/9/dduZe3zf9mW1V/MBeZx3Bmf+vdnVqqNaj/nzF3bH0U8Nd6p/ZPd+d8kIk73Ucdvn9e/61Z2//ZnkJq3I57r2P/vrlxK9l2fNd+6HcwXN4UObv8w+3O3+rX/cGX9/8T+7T+TtK/Xq/dex9df3Wp0K3vY+/9k8nYrwMl83/vVRuPGQsRk8ua9+y/0HvNRVVyP4npl7T93rvP4X9zzsws6GxFPRMSZiHgyIs72UOeZs7/c7Fam/w9X1v4rPfX/3hOV51//uFv9D9b/F1vBzOV7/P13fw/aQMOOEwAAAAAAAICDkbbWdidpZTedppXKznd4n44TaW2j3nhhbeO9ays7a8BnYiItXvUqtb0PupC/F1zkL+zJX8zfGf5y6ngrX1neqK0M++QBYERNdxn/M39MDTs6AGBgjg07AADgP2f8B4DRY/wHgNFj/AeA0WP8B4DRY/wHgJHSz/f6S0hIHNXEsO9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/2//BAAA//8Q3dmN") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:42:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=@ipv6_newnexthop={0x1c, 0x68, 0x901, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) [ 2543.750818][ T5029] loop0: detected capacity change from 0 to 512 [ 2543.840525][ T5029] ext4: Unknown parameter 'nouser_xattr' [ 2544.562775][ T27] audit: type=1800 audit(2543.950:43): pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="vda" ino=644 res=0 errno=0 [ 2544.890824][ T27] audit: type=1804 audit(2544.280:44): pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/262/file1" dev="vda" ino=644 res=1 errno=0 [ 2544.990691][ T27] audit: type=1804 audit(2544.340:45): pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/262/file1" dev="vda" ino=644 res=1 errno=0 00:42:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:42:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) [ 2549.046614][ T5036] loop1: detected capacity change from 0 to 512 [ 2549.119540][ T5036] ext4: Unknown parameter 'nouser_xattr' [ 2549.152106][ T5037] loop0: detected capacity change from 0 to 512 [ 2549.292815][ T5037] ext4: Unknown parameter 'nouser_xattr' [ 2549.840940][ T27] audit: type=1800 audit(2549.230:46): pid=5036 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=645 res=0 errno=0 [ 2549.945644][ T27] audit: type=1800 audit(2549.330:47): pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="vda" ino=646 res=0 errno=0 [ 2550.011678][ T27] audit: type=1804 audit(2549.360:48): pid=5036 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/254/file1" dev="vda" ino=645 res=1 errno=0 [ 2550.192120][ T27] audit: type=1804 audit(2549.580:50): pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/263/file1" dev="vda" ino=646 res=1 errno=0 [ 2550.252822][ T27] audit: type=1804 audit(2549.560:49): pid=5036 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/254/file1" dev="vda" ino=645 res=1 errno=0 [ 2550.422954][ T27] audit: type=1804 audit(2549.810:51): pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/263/file1" dev="vda" ino=646 res=1 errno=0 00:42:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$eJzs3M9rHFUcAPDvTH61TetGbaxVwYWCBsRN06ZqwYO5iAdvevSy5BfFbVO6K5i04A/EoyB69VDEi+DJP0CPevXmVS9SCCL+ASuzmUnXdDftdrNuzH4+MOG9ebO878zLm5e8mbcBjKxyRHwYEZMRsRYRpXx/km/x2s6WHff3X7eWsy2JZvOtP5NWeZaPts9kprMfacRcGpF+EvF0h3rrm1vvVmu11Rt5fr5x9fp8fXPrxStXq+ur66vXXrr08uLC5YuXzh/cuT47Pbv5xfU3Ln+29Wlpffmbc1m8J/Oy9vM4KOUo716TvQ7wtA6Fk8MOgIeSRsRYRIy3+n8pxlqpHaX44J2hBgcADESz2RzbkwcAjrzEmA8AI6b4v794tjeI52AcXttLEXGsU/uP7z4Jmhjg871yRCz+dPz7bIsBPYcFAAAAGGU/LkXEK53mf9J4pu24UxHxSL4+YCYiHo2IxyLi8T7rL+/J3zv/k97pswr2sb0U8WrH+d+0OGRmLM+darX9RLJ2pbZ6Pv99mIuJqSy/sE8dN7/9/dduZe3zf9mW1V/MBeZx3Bmf+vdnVqqNaj/nzF3bH0U8Nd6p/ZPd+d8kIk73Ucdvn9e/61Z2//ZnkJq3I57r2P/vrlxK9l2fNd+6HcwXN4UObv8w+3O3+rX/cGX9/8T+7T+TtK/Xq/dex9df3Wp0K3vY+/9k8nYrwMl83/vVRuPGQsRk8ua9+y/0HvNRVVyP4npl7T93rvP4X9zzsws6GxFPRMSZiHgyIs72UOeZs7/c7Fam/w9X1v4rPfX/3hOV51//uFv9D9b/F1vBzOV7/P13fw/aQMOOEwAAAAAAAICDkbbWdidpZTedppXKznd4n44TaW2j3nhhbeO9ays7a8BnYiItXvUqtb0PupC/F1zkL+zJX8zfGf5y6ngrX1neqK0M++QBYERNdxn/M39MDTs6AGBgjg07AADgP2f8B4DRY/wHgNFj/AeA0WP8B4DRY/wHgJHSz/f6S0hIHNXEsO9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/2//BAAA//8Q3dmN") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:42:31 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xc7, {0x0}}, 0x18) [ 2553.977286][ T5044] loop1: detected capacity change from 0 to 512 [ 2554.072579][ T5044] ext4: Unknown parameter 'nouser_xattr' 00:42:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xc7, {0x0}}, 0x18) [ 2554.658554][ T27] audit: type=1800 audit(2554.050:52): pid=5044 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=644 res=0 errno=0 [ 2554.761302][ T27] audit: type=1804 audit(2554.150:53): pid=5044 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/255/file1" dev="vda" ino=644 res=1 errno=0 [ 2554.835704][ T27] audit: type=1804 audit(2554.220:54): pid=5044 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/255/file1" dev="vda" ino=644 res=1 errno=0 00:42:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:42:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xc7, {0x0}}, 0x18) [ 2558.013177][ T5051] loop1: detected capacity change from 0 to 512 [ 2558.197251][ T5051] ext4: Unknown parameter 'nouser_xattr' 00:42:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xc7, {0x0}}, 0x18) [ 2558.862273][ T27] audit: type=1800 audit(2558.250:55): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=639 res=0 errno=0 [ 2559.025832][ T27] audit: type=1804 audit(2558.410:56): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/256/file1" dev="vda" ino=639 res=1 errno=0 [ 2559.126783][ T27] audit: type=1804 audit(2558.510:57): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/256/file1" dev="vda" ino=639 res=1 errno=0 00:42:42 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f00000000c0), 0x200, 0x40002) ppoll(&(0x7f00000003c0)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) 00:42:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f00000001c0)={@loopback, @multicast1}, 0x8) 00:42:43 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f00000000c0), 0x200, 0x40002) ppoll(&(0x7f00000003c0)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) 00:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f00000001c0)={@loopback, @multicast1}, 0x8) 00:42:45 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f00000000c0), 0x200, 0x40002) ppoll(&(0x7f00000003c0)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) 00:42:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f00000001c0)={@loopback, @multicast1}, 0x8) 00:42:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f00000001c0)={@loopback, @multicast1}, 0x8) 00:42:49 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f00000000c0), 0x200, 0x40002) ppoll(&(0x7f00000003c0)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) 00:42:51 executing program 0: r0 = syz_open_dev$sndmidi(&(0x7f00000000c0), 0x200, 0x40002) ppoll(&(0x7f00000003c0)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) 00:42:52 executing program 1: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) fchmod(r0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) fchmod(r2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), r2) syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') fchown(r2, 0x0, 0x0) 00:42:56 executing program 0: r0 = syz_open_dev$sndmidi(&(0x7f00000000c0), 0x200, 0x40002) ppoll(&(0x7f00000003c0)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) 00:42:56 executing program 1: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) fchmod(r0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) fchmod(r2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), r2) syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') fchown(r2, 0x0, 0x0) [ 2580.122027][ T5082] warn_alloc: 3 callbacks suppressed [ 2580.122293][ T5082] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 2580.152615][ T5082] CPU: 0 PID: 5082 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 2580.155939][ T5082] Hardware name: riscv-virtio,qemu (DT) [ 2580.157327][ T5082] Call Trace: [ 2580.158437][ T5082] [] dump_backtrace+0x2e/0x3c [ 2580.160031][ T5082] [] show_stack+0x34/0x40 [ 2580.161698][ T5082] [] dump_stack_lvl+0xe0/0x14c [ 2580.163330][ T5082] [] dump_stack+0x1c/0x24 [ 2580.164612][ T5082] [] warn_alloc+0x168/0x22c [ 2580.165863][ T5082] [] __vmalloc_node_range+0xb6c/0xdb4 [ 2580.166978][ T5082] [] bpf_jit_alloc_exec+0x46/0x52 [ 2580.168312][ T5082] [] bpf_jit_binary_alloc+0x96/0x13c [ 2580.169438][ T5082] [] bpf_int_jit_compile+0x886/0xaa6 [ 2580.170598][ T5082] [] bpf_prog_select_runtime+0x1a2/0x22e [ 2580.171734][ T5082] [] bpf_migrate_filter+0x258/0x2be [ 2580.173185][ T5082] [] bpf_prepare_filter+0x10e/0x1b4 [ 2580.175356][ T5082] [] __get_filter+0x148/0x1a0 [ 2580.177032][ T5082] [] sk_attach_filter+0x22/0x11a [ 2580.178302][ T5082] [] sk_setsockopt+0x144e/0x270c [ 2580.179768][ T5082] [] sock_setsockopt+0x48/0x58 [ 2580.181481][ T5082] [] __sys_setsockopt+0x3f0/0x418 [ 2580.183022][ T5082] [] sys_setsockopt+0x3a/0x4c [ 2580.184357][ T5082] [] ret_from_syscall+0x0/0x2 [ 2580.299221][ T5082] Mem-Info: [ 2580.300243][ T5082] active_anon:41908 inactive_anon:88 isolated_anon:0 [ 2580.300243][ T5082] active_file:0 inactive_file:7873 isolated_file:0 [ 2580.300243][ T5082] unevictable:768 dirty:5 writeback:0 [ 2580.300243][ T5082] slab_reclaimable:5589 slab_unreclaimable:24234 [ 2580.300243][ T5082] mapped:8731 shmem:925 pagetables:354 [ 2580.300243][ T5082] sec_pagetables:0 bounce:0 [ 2580.300243][ T5082] kernel_misc_reclaimable:0 [ 2580.300243][ T5082] free:214279 free_pcp:786 free_cma:4096 [ 2580.302966][ T5082] Node 0 active_anon:167632kB inactive_anon:352kB active_file:0kB inactive_file:31492kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34924kB dirty:20kB writeback:0kB shmem:3700kB writeback_tmp:0kB kernel_stack:5280kB pagetables:1416kB sec_pagetables:0kB all_unreclaimable? no [ 2580.312557][ T5082] Node 0 DMA32 free:857116kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:167632kB inactive_anon:352kB active_file:0kB inactive_file:31492kB unevictable:3072kB writepending:20kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:3144kB local_pcp:2396kB free_cma:16384kB [ 2580.349522][ T5082] lowmem_reserve[]: 0 0 0 [ 2580.351964][ T5082] Node 0 DMA32: 687*4kB (UME) 792*8kB (UME) 720*16kB (UME) 481*32kB (ME) 330*64kB (UME) 150*128kB (UM) 58*256kB (UM) 36*512kB (UME) 14*1024kB (ME) 4*2048kB (MC) 177*4096kB (UMC) = 857116kB [ 2580.415038][ T5082] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2580.416797][ T5082] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 2580.418307][ T5082] 8798 total pagecache pages [ 2580.419413][ T5082] 0 pages in swap cache [ 2580.420481][ T5082] Free swap = 0kB [ 2580.421559][ T5082] Total swap = 0kB [ 2580.422620][ T5082] 523776 pages RAM [ 2580.448436][ T5082] 0 pages HighMem/MovableOnly [ 2580.449911][ T5082] 184025 pages reserved [ 2580.451012][ T5082] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:42:59 executing program 0: r0 = syz_open_dev$sndmidi(&(0x7f00000000c0), 0x200, 0x40002) ppoll(&(0x7f00000003c0)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) 00:43:01 executing program 1: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) fchmod(r0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) fchmod(r2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), r2) syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') fchown(r2, 0x0, 0x0) ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:43:06 executing program 0: r0 = syz_io_uring_setup(0x7b51, &(0x7f00000000c0), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) syz_io_uring_setup(0xb33, &(0x7f0000000280), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x17, &(0x7f00000002c0)=[{0xf000000, 0x0, 0x0, 0x0, 0x0}], 0x1) 00:43:07 executing program 1: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) fchmod(r0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) fchmod(r2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), r2) syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') fchown(r2, 0x0, 0x0) 00:43:10 executing program 0: r0 = syz_io_uring_setup(0x7b51, &(0x7f00000000c0), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) syz_io_uring_setup(0xb33, &(0x7f0000000280), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x17, &(0x7f00000002c0)=[{0xf000000, 0x0, 0x0, 0x0, 0x0}], 0x1) 00:43:11 executing program 1: r0 = syz_io_uring_setup(0x7b51, &(0x7f00000000c0), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0xfe) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x7, 0x0, &(0x7f0000000000)=[0xffffffffffffffff]}, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000003d80)={0x0, 0x0, &(0x7f0000003d40)=[0xffffffffffffffff]}, 0x1) 00:43:15 executing program 1: r0 = syz_io_uring_setup(0x7b51, &(0x7f00000000c0), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0xfe) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x7, 0x0, &(0x7f0000000000)=[0xffffffffffffffff]}, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000003d80)={0x0, 0x0, &(0x7f0000003d40)=[0xffffffffffffffff]}, 0x1) 00:43:16 executing program 0: r0 = syz_io_uring_setup(0x7b51, &(0x7f00000000c0), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) syz_io_uring_setup(0xb33, &(0x7f0000000280), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x17, &(0x7f00000002c0)=[{0xf000000, 0x0, 0x0, 0x0, 0x0}], 0x1) 00:43:18 executing program 0: r0 = syz_io_uring_setup(0x7b51, &(0x7f00000000c0), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) syz_io_uring_setup(0xb33, &(0x7f0000000280), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x17, &(0x7f00000002c0)=[{0xf000000, 0x0, 0x0, 0x0, 0x0}], 0x1) 00:43:19 executing program 1: r0 = syz_io_uring_setup(0x7b51, &(0x7f00000000c0), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0xfe) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x7, 0x0, &(0x7f0000000000)=[0xffffffffffffffff]}, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000003d80)={0x0, 0x0, &(0x7f0000003d40)=[0xffffffffffffffff]}, 0x1) 00:43:23 executing program 0: r0 = syz_io_uring_setup(0x7b51, &(0x7f00000000c0), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0xfe) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x7, 0x0, &(0x7f0000000000)=[0xffffffffffffffff]}, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000003d80)={0x0, 0x0, &(0x7f0000003d40)=[0xffffffffffffffff]}, 0x1) 00:43:23 executing program 1: r0 = syz_io_uring_setup(0x7b51, &(0x7f00000000c0), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0xfe) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x7, 0x0, &(0x7f0000000000)=[0xffffffffffffffff]}, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000003d80)={0x0, 0x0, &(0x7f0000003d40)=[0xffffffffffffffff]}, 0x1) 00:43:25 executing program 0: r0 = syz_io_uring_setup(0x7b51, &(0x7f00000000c0), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0xfe) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x7, 0x0, &(0x7f0000000000)=[0xffffffffffffffff]}, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000003d80)={0x0, 0x0, &(0x7f0000003d40)=[0xffffffffffffffff]}, 0x1) 00:43:27 executing program 1: r0 = syz_io_uring_setup(0x500f, &(0x7f0000000100), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) mmap$IORING_OFF_SQES(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x10000000) 00:43:28 executing program 0: r0 = syz_io_uring_setup(0x7b51, &(0x7f00000000c0), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0xfe) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x7, 0x0, &(0x7f0000000000)=[0xffffffffffffffff]}, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000003d80)={0x0, 0x0, &(0x7f0000003d40)=[0xffffffffffffffff]}, 0x1) 00:43:30 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0x5460, 0xec000) syz_clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000180)=""/211, 0xd3, 0x0, 0x0}, 0x58) 00:43:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000340)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @empty}}}}) 00:43:35 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000280)=@raw={'raw\x00', 0x8, 0x3, 0x210, 0x0, 0xffffffff, 0xffffffff, 0xe0, 0xffffffff, 0x178, 0xffffffff, 0xffffffff, 0x178, 0xffffffff, 0x3, 0x0, {[{{@ip={@dev, @remote, 0x0, 0x0, '\x00', 'ipvlan1\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28}, {0x24a0032fd7fde472}}, @inet=@rpfilter={{0x28}}]}, @unspec=@TRACE={0x20}}, {{@ip={@remote, @rand_addr, 0x0, 0x0, 'gre0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x270) 00:43:37 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0xc05c5340, &(0x7f0000000040)={0x0, @time}) 00:43:38 executing program 1: capget(0x0, &(0x7f0000000640)) 00:43:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x826}) read$FUSE(r0, 0x0, 0x0) 00:43:40 executing program 1: getgroups(0x2, &(0x7f0000000200)=[0xee00, 0xee01]) setresgid(r0, r0, 0x0) setfsgid(0x0) 00:43:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x7, 0xd, 0x9}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) 00:43:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x826}) read$FUSE(r0, 0x0, 0x0) 00:43:45 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x7, 0xd, 0x9}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) 00:43:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x826}) read$FUSE(r0, 0x0, 0x0) 00:43:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x7, 0xd, 0x9}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) 00:43:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x826}) read$FUSE(r0, 0x0, 0x0) 00:43:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x7, 0xd, 0x9}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) 00:43:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x7, 0xd, 0x9}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) 00:43:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lazytime,min_batch_time=0x0000000000000101,errors\x00\x00emount-ro,journal_ioprio=0x0000000000000000,\x00'], 0x1, 0x3d0, &(0x7f00000004c0)="$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") 00:43:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x7, 0xd, 0x9}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) [ 2641.177878][ T5154] loop1: detected capacity change from 0 to 512 [ 2641.421855][ T5154] ext4: Bad value for 'errors' 00:44:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lazytime,min_batch_time=0x0000000000000101,errors\x00\x00emount-ro,journal_ioprio=0x0000000000000000,\x00'], 0x1, 0x3d0, &(0x7f00000004c0)="$eJzs3M9rHFUcAPDvTDaJTau7ar1oDwseDIibX5V4EK2CN8FDBc9Lk9bopinJCm3xoODBP8B/wEPp0augh548CHrw5lUQJFBEBC8VV2Yzm4yb3ZhNsmyb/Xxg4H1nZnnvu7O77+W9RwIYW9WI+CQipiLig4go5+eT/IhLO0d2359/fHwlO5JotS7/nrSvZ3EUXpM5mwezaUT6WRLP9ah369btD+uNxupmHs8112/Mbd26/dLaev3a6rXV6xfnl5cW5xfml5ZPLNdL35R+/vGft9776tfvb2y+eeedrL3n8mvFPE5KNaq770m32klXNmKPFcpJaYQNYSBpRExERKn9/S/HROw9vHJ8Wx5p4wCAoWi1Xu+KAYDTL9HnA8CY6fzd31nbG8Y62MPs/hs7i1f78y/troRMdq1vnaRqRDTuXPguO2JI65AAAEX3svHPK73GP2lcKNx3JiJm8r1d5yLi8Yh4orBf7KiqXfH+8U+6fcwqDpSN/17tOf5NO7dUJvIoy7kSk8nVtcbqfJ7/bExOZ/HCAXW8vPz+3/2uFcd/2ZHV3xkL5u3YLk3/9zUr9Wb9ODkX3f804tlSr/yT3fFv0s776NYebD/od+3/8x+u1pcRL/R8/ns795KD9yfOtT8Pc51PxX5rl3/5oV/9o84/e/4zB+dfSYr7NbcGr2Pz7uc3+1076ud/Knm3XZ7Kz92sN5ubCxFTydv7zy/uvbYTd+7P8p99vvf3/3zsvRNPRsRTEfF0RPv8MwPkf++nyt2j5z9cWf4rAz3/wQt/fb3+Wr/6D/f8L7ZLs/mZw/z+HbaBx3nvAAAA4FGRtudzk7S2W07TWm1nnvd8zKSNja3mi1c3Prq+sjPvW4nJtDPTVS7Mhy7kc4SdeLErXsrnUL6YPtOOa1c2GiujTh4AxtTZPv1/5rfpUbcOABiaYW1uBwAeXvp/ABg/+n8AGD/6fwAYP/p/ABg/+n8AGCvH+b9+CgoKp7Uw6l8mAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDR+jcAAP//kaDj2Q==") 00:44:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x7, 0xd, 0x9}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) [ 2646.837274][ T5163] loop1: detected capacity change from 0 to 512 [ 2647.059440][ T5163] ext4: Bad value for 'errors' 00:44:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x2d, 0xcb591bad50326fe1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 00:44:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lazytime,min_batch_time=0x0000000000000101,errors\x00\x00emount-ro,journal_ioprio=0x0000000000000000,\x00'], 0x1, 0x3d0, &(0x7f00000004c0)="$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") 00:44:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x2d, 0xcb591bad50326fe1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) [ 2653.666676][ T5172] loop1: detected capacity change from 0 to 512 [ 2653.999874][ T5172] ext4: Bad value for 'errors' 00:44:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='lazytime,min_batch_time=0x0000000000000101,errors\x00\x00emount-ro,journal_ioprio=0x0000000000000000,\x00'], 0x1, 0x3d0, &(0x7f00000004c0)="$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") ps_root_recvmsgcb: failed to send message to pid 5082: Connection refused ps_root_recvmsgcb: failed to send message to pid 5083: Connection refused ps_root_recvmsgcb: failed to send message to pid 5084: Connection refused ps_root_recvmsgcb: failed to send message to pid 5085: Connection refused 00:44:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x2d, 0xcb591bad50326fe1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) [ 2660.549113][ T5180] loop1: detected capacity change from 0 to 512 [ 2660.941538][ T5180] ext4: Bad value for 'errors' 00:44:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x2d, 0xcb591bad50326fe1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 00:44:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x224b, 0x4) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000002d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2020, 0x0) 00:44:26 executing program 0: syz_emit_ethernet(0x9e, &(0x7f0000000000)={@local, @random, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "f08a01", 0x68, 0x6, 0x0, @dev, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@sack={0x5, 0x12, [0x0, 0x0, 0x0, 0x0]}, @timestamp={0x8, 0xa}, @mptcp=@remove_addr={0x1, 0x1f, 0x0, 0x0, "52270dca98e278b6f919ad031ab265f331fb80d1747f31233b2ac374"}, @mptcp=@capable={0x1, 0xc}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 00:44:27 executing program 1: r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) r1 = dup(r0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000005940)={{&(0x7f0000ff8000/0x8000)=nil, 0x8000}, 0x1}) r2 = userfaultfd(0x80801) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000100)) r3 = dup(r2) ioctl$UFFDIO_REGISTER(r3, 0xc018aa06, &(0x7f0000005940)={{&(0x7f0000ff8000/0x8000)=nil, 0x8000}, 0x1}) 00:44:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') write$P9_RSYMLINK(r0, 0x0, 0x0) 00:44:30 executing program 1: r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) r1 = dup(r0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000005940)={{&(0x7f0000ff8000/0x8000)=nil, 0x8000}, 0x1}) r2 = userfaultfd(0x80801) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000100)) r3 = dup(r2) ioctl$UFFDIO_REGISTER(r3, 0xc018aa06, &(0x7f0000005940)={{&(0x7f0000ff8000/0x8000)=nil, 0x8000}, 0x1}) 00:44:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') write$P9_RSYMLINK(r0, 0x0, 0x0) 00:44:33 executing program 1: r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) r1 = dup(r0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000005940)={{&(0x7f0000ff8000/0x8000)=nil, 0x8000}, 0x1}) r2 = userfaultfd(0x80801) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000100)) r3 = dup(r2) ioctl$UFFDIO_REGISTER(r3, 0xc018aa06, &(0x7f0000005940)={{&(0x7f0000ff8000/0x8000)=nil, 0x8000}, 0x1}) 00:44:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') write$P9_RSYMLINK(r0, 0x0, 0x0) 00:44:35 executing program 1: r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) r1 = dup(r0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000005940)={{&(0x7f0000ff8000/0x8000)=nil, 0x8000}, 0x1}) r2 = userfaultfd(0x80801) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000100)) r3 = dup(r2) ioctl$UFFDIO_REGISTER(r3, 0xc018aa06, &(0x7f0000005940)={{&(0x7f0000ff8000/0x8000)=nil, 0x8000}, 0x1}) 00:44:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') write$P9_RSYMLINK(r0, 0x0, 0x0) 00:44:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @empty}}, 0x4}, 0x90) 00:44:38 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000002100), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r1, 0x80984120, &(0x7f0000000700)) 00:44:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @empty}}, 0x4}, 0x90) 00:44:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x54, r1, 0x1, 0x0, 0x0, {0x4a}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x54}}, 0x0) 00:44:43 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, 0x0) 00:44:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @empty}}, 0x4}, 0x90) 00:44:46 executing program 1: personality(0x0) 00:44:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001340)="8a", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @empty}}, 0x4}, 0x90) 00:44:49 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc4c85513, &(0x7f00000014c0)={{0xb, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 00:44:53 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) 00:44:55 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000000)={@private=0xa010100, @private, 0x0, "30a3411f4ea9c5d476da6153cde2d78cb3190d036c3e8112e85b4a82d88f2751"}, 0x3c) 00:44:57 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000000)={@private=0xa010100, @private, 0x0, "30a3411f4ea9c5d476da6153cde2d78cb3190d036c3e8112e85b4a82d88f2751"}, 0x3c) 00:45:00 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000000)={@private=0xa010100, @private, 0x0, "30a3411f4ea9c5d476da6153cde2d78cb3190d036c3e8112e85b4a82d88f2751"}, 0x3c) 00:45:00 executing program 1: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000040)={'vlan0\x00', @ifru_settings={0x0, 0x0, @te1=0x0}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0x10) socketpair(0xb, 0x5, 0xeda, &(0x7f0000000340)) fallocate(r1, 0x3, 0x0, 0x8800000) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000015c0)=ANY=[@ANYBLOB="1945aacb", @ANYRES16=0x0, @ANYBLOB="04002a000800010070636900110002003030307a303a30303a31302e300000000008008e00010000000c008f000df40000000000000c00900003000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010200000c008f00a1080000000000000c0090000463690000000200303030303a30303a31302e3000000000081b1fc0ce71bd6e4566008e00010000000c008f003a030000000000000c009000020000000000000008000100709e636900110002c0303030303a30303a31302e300000000008008e00010000000c008f00000000000000000600000000ff0f00"/259, @ANYRES16=r1], 0xffffffffffffff8d}, 0x1, 0x0, 0x0, 0x2004009a}, 0x40) r2 = socket$rds(0x15, 0x5, 0x0) bind(r2, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000002c0)=0x1102, 0x4) socketpair(0x11, 0x6, 0x4, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000300)={0x0, 'vcan0\x00', {0x1}, 0x1000}) ioctl$BTRFS_IOC_SNAP_DESTROY(r2, 0x5000940f, &(0x7f0000000380)={{r1}, "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"}) r4 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x4f6500, 0x2) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f00000000c0)={'macvlan0\x00', 0xab}) r5 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f00000026c0)={'syzkaller1\x00', 0x1}) 00:45:05 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000000)={@private=0xa010100, @private, 0x0, "30a3411f4ea9c5d476da6153cde2d78cb3190d036c3e8112e85b4a82d88f2751"}, 0x3c) 00:45:09 executing program 1: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000040)={'vlan0\x00', @ifru_settings={0x0, 0x0, @te1=0x0}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0x10) socketpair(0xb, 0x5, 0xeda, &(0x7f0000000340)) fallocate(r1, 0x3, 0x0, 0x8800000) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000015c0)=ANY=[@ANYBLOB="1945aacb", @ANYRES16=0x0, @ANYBLOB="04002a000800010070636900110002003030307a303a30303a31302e300000000008008e00010000000c008f000df40000000000000c00900003000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010200000c008f00a1080000000000000c0090000463690000000200303030303a30303a31302e3000000000081b1fc0ce71bd6e4566008e00010000000c008f003a030000000000000c009000020000000000000008000100709e636900110002c0303030303a30303a31302e300000000008008e00010000000c008f00000000000000000600000000ff0f00"/259, @ANYRES16=r1], 0xffffffffffffff8d}, 0x1, 0x0, 0x0, 0x2004009a}, 0x40) r2 = socket$rds(0x15, 0x5, 0x0) bind(r2, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000002c0)=0x1102, 0x4) socketpair(0x11, 0x6, 0x4, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000300)={0x0, 'vcan0\x00', {0x1}, 0x1000}) ioctl$BTRFS_IOC_SNAP_DESTROY(r2, 0x5000940f, &(0x7f0000000380)={{r1}, "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"}) r4 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x4f6500, 0x2) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f00000000c0)={'macvlan0\x00', 0xab}) r5 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f00000026c0)={'syzkaller1\x00', 0x1}) 00:45:10 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140)={0x0, 0x0, 0x400}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net\x00') symlinkat(&(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file1\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net\x00') symlinkat(&(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file1\x00') r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x33000, 0x20) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r5, &(0x7f0000000080)=ANY=[@ANYBLOB='#!\n'], 0xf) close(r5) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'pimreg0\x00', 0x0}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r6}) getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000680)={@local, 0x0}, &(0x7f00000006c0)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x8923, &(0x7f0000001740)={'syztnl1\x00', &(0x7f0000002340)={'syztnl0\x00', r8, 0x2f, 0x8, 0x94, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x40, 0xffff, 0xe92}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="ec000000", @ANYRES16=0x0, @ANYBLOB="000426bd7000fddbdf2511000000200001020073797a2b616c6c6572ff0f0000000001020001000000004caa6b03ef12bb760e0ac486f7c721e99e05247a0b20", @ANYRES32=0x0, @ANYBLOB="3800018008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000000000b08000300020000001400020076657468315f746f5f7c65616d000000580001800800030001000000080003000000000014000200626f6e645f736c6176655f30000000001400020076657468305f746f5f62726964676500080003000100000014000200697036746e6c30000000000000000000280001801400020000000000000080000000000000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="d036e28562185d853e77054c5316a1b651f33e5a59967cb4abf38cf460f0a912ab112e80c9a2a570757b9bed44debdd091de6beafe89e053f4ee7fdcd62b9d17cc1f23f184b5c8402f1cba966c7d655c2b862b492192aaf317a1c6ac764733449726d8ebf33b3ad578adee97533ee8becfaa634dc1905c61cfb540b044d9c6c3bdb459010f"], 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r3, &(0x7f0000000300)=""/232, 0xe8) r9 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r9, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) r10 = socket(0x1c, 0x1, 0x7) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r10, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f0000000240)={0x1, 0x1, 0xce, &(0x7f0000000400)=""/206}) 00:45:19 executing program 1: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000040)={'vlan0\x00', @ifru_settings={0x0, 0x0, @te1=0x0}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0x10) socketpair(0xb, 0x5, 0xeda, &(0x7f0000000340)) fallocate(r1, 0x3, 0x0, 0x8800000) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000015c0)=ANY=[@ANYBLOB="1945aacb", @ANYRES16=0x0, @ANYBLOB="04002a000800010070636900110002003030307a303a30303a31302e300000000008008e00010000000c008f000df40000000000000c00900003000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010200000c008f00a1080000000000000c0090000463690000000200303030303a30303a31302e3000000000081b1fc0ce71bd6e4566008e00010000000c008f003a030000000000000c009000020000000000000008000100709e636900110002c0303030303a30303a31302e300000000008008e00010000000c008f00000000000000000600000000ff0f00"/259, @ANYRES16=r1], 0xffffffffffffff8d}, 0x1, 0x0, 0x0, 0x2004009a}, 0x40) r2 = socket$rds(0x15, 0x5, 0x0) bind(r2, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000002c0)=0x1102, 0x4) socketpair(0x11, 0x6, 0x4, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000300)={0x0, 'vcan0\x00', {0x1}, 0x1000}) ioctl$BTRFS_IOC_SNAP_DESTROY(r2, 0x5000940f, &(0x7f0000000380)={{r1}, "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"}) r4 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x4f6500, 0x2) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f00000000c0)={'macvlan0\x00', 0xab}) r5 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f00000026c0)={'syzkaller1\x00', 0x1}) 00:45:20 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140)={0x0, 0x0, 0x400}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net\x00') symlinkat(&(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file1\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net\x00') symlinkat(&(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file1\x00') r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x33000, 0x20) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r5, &(0x7f0000000080)=ANY=[@ANYBLOB='#!\n'], 0xf) close(r5) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'pimreg0\x00', 0x0}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r6}) getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000680)={@local, 0x0}, &(0x7f00000006c0)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x8923, &(0x7f0000001740)={'syztnl1\x00', &(0x7f0000002340)={'syztnl0\x00', r8, 0x2f, 0x8, 0x94, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x40, 0xffff, 0xe92}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="ec000000", @ANYRES16=0x0, @ANYBLOB="000426bd7000fddbdf2511000000200001020073797a2b616c6c6572ff0f0000000001020001000000004caa6b03ef12bb760e0ac486f7c721e99e05247a0b20", @ANYRES32=0x0, @ANYBLOB="3800018008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000000000b08000300020000001400020076657468315f746f5f7c65616d000000580001800800030001000000080003000000000014000200626f6e645f736c6176655f30000000001400020076657468305f746f5f62726964676500080003000100000014000200697036746e6c30000000000000000000280001801400020000000000000080000000000000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="d036e28562185d853e77054c5316a1b651f33e5a59967cb4abf38cf460f0a912ab112e80c9a2a570757b9bed44debdd091de6beafe89e053f4ee7fdcd62b9d17cc1f23f184b5c8402f1cba966c7d655c2b862b492192aaf317a1c6ac764733449726d8ebf33b3ad578adee97533ee8becfaa634dc1905c61cfb540b044d9c6c3bdb459010f"], 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r3, &(0x7f0000000300)=""/232, 0xe8) r9 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r9, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) r10 = socket(0x1c, 0x1, 0x7) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r10, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f0000000240)={0x1, 0x1, 0xce, &(0x7f0000000400)=""/206}) [ 2721.840448][ T5262] warn_alloc: 3 callbacks suppressed [ 2721.840812][ T5262] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 2721.890469][ T5262] CPU: 1 PID: 5262 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 2721.893631][ T5262] Hardware name: riscv-virtio,qemu (DT) [ 2721.895635][ T5262] Call Trace: [ 2721.896805][ T5262] [] dump_backtrace+0x2e/0x3c [ 2721.899926][ T5262] [] show_stack+0x34/0x40 [ 2721.901386][ T5262] [] dump_stack_lvl+0xe0/0x14c [ 2721.902930][ T5262] [] dump_stack+0x1c/0x24 [ 2721.905222][ T5262] [] warn_alloc+0x168/0x22c [ 2721.906884][ T5262] [] __vmalloc_node_range+0xb6c/0xdb4 [ 2721.908625][ T5262] [] bpf_jit_alloc_exec+0x46/0x52 [ 2721.910222][ T5262] [] bpf_jit_binary_alloc+0x96/0x13c [ 2721.911837][ T5262] [] bpf_int_jit_compile+0x886/0xaa6 [ 2721.913351][ T5262] [] bpf_prog_select_runtime+0x1a2/0x22e [ 2721.915432][ T5262] [] bpf_migrate_filter+0x258/0x2be [ 2721.916986][ T5262] [] bpf_prepare_filter+0x10e/0x1b4 [ 2721.918668][ T5262] [] __get_filter+0x148/0x1a0 [ 2721.920352][ T5262] [] sk_attach_filter+0x22/0x11a [ 2721.921927][ T5262] [] sk_setsockopt+0x144e/0x270c [ 2721.923516][ T5262] [] sock_setsockopt+0x48/0x58 [ 2721.925171][ T5262] [] __sys_setsockopt+0x3f0/0x418 [ 2721.926801][ T5262] [] sys_setsockopt+0x3a/0x4c [ 2721.928342][ T5262] [] ret_from_syscall+0x0/0x2 [ 2722.065395][ T5262] Mem-Info: [ 2722.066877][ T5262] active_anon:39532 inactive_anon:91 isolated_anon:0 [ 2722.066877][ T5262] active_file:0 inactive_file:7957 isolated_file:0 [ 2722.066877][ T5262] unevictable:768 dirty:19 writeback:0 [ 2722.066877][ T5262] slab_reclaimable:5605 slab_unreclaimable:24162 [ 2722.066877][ T5262] mapped:8720 shmem:927 pagetables:333 [ 2722.066877][ T5262] sec_pagetables:0 bounce:0 [ 2722.066877][ T5262] kernel_misc_reclaimable:0 [ 2722.066877][ T5262] free:218032 free_pcp:949 free_cma:4096 [ 2722.070879][ T5262] Node 0 active_anon:158128kB inactive_anon:364kB active_file:0kB inactive_file:31828kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34880kB dirty:76kB writeback:0kB shmem:3708kB writeback_tmp:0kB kernel_stack:5432kB pagetables:1332kB sec_pagetables:0kB all_unreclaimable? no [ 2722.112681][ T5262] Node 0 DMA32 free:872128kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:158128kB inactive_anon:364kB active_file:0kB inactive_file:31828kB unevictable:3072kB writepending:76kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:3776kB local_pcp:1412kB free_cma:16384kB [ 2722.118648][ T5262] lowmem_reserve[]: 0 0 0 [ 2722.121196][ T5262] Node 0 DMA32: 1198*4kB (UME) 749*8kB (UME) 620*16kB (UME) 509*32kB (UME) 315*64kB (UM) 173*128kB (UM) 83*256kB (UM) 45*512kB (UME) 15*1024kB (ME) 4*2048kB (MC) 177*4096kB (UMC) = 872128kB [ 2722.182469][ T5262] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2722.232698][ T5262] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 2722.235732][ T5262] 8884 total pagecache pages [ 2722.236929][ T5262] 0 pages in swap cache [ 2722.238050][ T5262] Free swap = 0kB [ 2722.239142][ T5262] Total swap = 0kB [ 2722.240249][ T5262] 523776 pages RAM [ 2722.241408][ T5262] 0 pages HighMem/MovableOnly [ 2722.242587][ T5262] 184025 pages reserved [ 2722.287367][ T5262] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:45:33 executing program 1: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000040)={'vlan0\x00', @ifru_settings={0x0, 0x0, @te1=0x0}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) write$P9_RREADLINK(r1, &(0x7f0000000000)=ANY=[], 0x10) socketpair(0xb, 0x5, 0xeda, &(0x7f0000000340)) fallocate(r1, 0x3, 0x0, 0x8800000) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000015c0)=ANY=[@ANYBLOB="1945aacb", @ANYRES16=0x0, @ANYBLOB="04002a000800010070636900110002003030307a303a30303a31302e300000000008008e00010000000c008f000df40000000000000c00900003000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010200000c008f00a1080000000000000c0090000463690000000200303030303a30303a31302e3000000000081b1fc0ce71bd6e4566008e00010000000c008f003a030000000000000c009000020000000000000008000100709e636900110002c0303030303a30303a31302e300000000008008e00010000000c008f00000000000000000600000000ff0f00"/259, @ANYRES16=r1], 0xffffffffffffff8d}, 0x1, 0x0, 0x0, 0x2004009a}, 0x40) r2 = socket$rds(0x15, 0x5, 0x0) bind(r2, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000002c0)=0x1102, 0x4) socketpair(0x11, 0x6, 0x4, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000300)={0x0, 'vcan0\x00', {0x1}, 0x1000}) ioctl$BTRFS_IOC_SNAP_DESTROY(r2, 0x5000940f, &(0x7f0000000380)={{r1}, "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"}) r4 = openat(r1, &(0x7f0000000280)='./file0\x00', 0x4f6500, 0x2) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f00000000c0)={'macvlan0\x00', 0xab}) r5 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f00000026c0)={'syzkaller1\x00', 0x1}) 00:45:33 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140)={0x0, 0x0, 0x400}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net\x00') symlinkat(&(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file1\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net\x00') symlinkat(&(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file1\x00') r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x33000, 0x20) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r5, &(0x7f0000000080)=ANY=[@ANYBLOB='#!\n'], 0xf) close(r5) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'pimreg0\x00', 0x0}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r6}) getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000680)={@local, 0x0}, &(0x7f00000006c0)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x8923, &(0x7f0000001740)={'syztnl1\x00', &(0x7f0000002340)={'syztnl0\x00', r8, 0x2f, 0x8, 0x94, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x40, 0xffff, 0xe92}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="ec000000", @ANYRES16=0x0, @ANYBLOB="000426bd7000fddbdf2511000000200001020073797a2b616c6c6572ff0f0000000001020001000000004caa6b03ef12bb760e0ac486f7c721e99e05247a0b20", @ANYRES32=0x0, @ANYBLOB="3800018008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000000000b08000300020000001400020076657468315f746f5f7c65616d000000580001800800030001000000080003000000000014000200626f6e645f736c6176655f30000000001400020076657468305f746f5f62726964676500080003000100000014000200697036746e6c30000000000000000000280001801400020000000000000080000000000000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="d036e28562185d853e77054c5316a1b651f33e5a59967cb4abf38cf460f0a912ab112e80c9a2a570757b9bed44debdd091de6beafe89e053f4ee7fdcd62b9d17cc1f23f184b5c8402f1cba966c7d655c2b862b492192aaf317a1c6ac764733449726d8ebf33b3ad578adee97533ee8becfaa634dc1905c61cfb540b044d9c6c3bdb459010f"], 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r3, &(0x7f0000000300)=""/232, 0xe8) r9 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r9, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) r10 = socket(0x1c, 0x1, 0x7) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r10, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f0000000240)={0x1, 0x1, 0xce, &(0x7f0000000400)=""/206}) 00:45:43 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_io_uring_setup(0x7b51, &(0x7f0000000140)={0x0, 0x0, 0x400}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net\x00') symlinkat(&(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file1\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net\x00') symlinkat(&(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file1\x00') r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x33000, 0x20) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r5, &(0x7f0000000080)=ANY=[@ANYBLOB='#!\n'], 0xf) close(r5) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'pimreg0\x00', 0x0}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, r6}) getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000680)={@local, 0x0}, &(0x7f00000006c0)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x8923, &(0x7f0000001740)={'syztnl1\x00', &(0x7f0000002340)={'syztnl0\x00', r8, 0x2f, 0x8, 0x94, 0x7fff, 0xd, @loopback, @mcast2, 0x10, 0x40, 0xffff, 0xe92}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="ec000000", @ANYRES16=0x0, @ANYBLOB="000426bd7000fddbdf2511000000200001020073797a2b616c6c6572ff0f0000000001020001000000004caa6b03ef12bb760e0ac486f7c721e99e05247a0b20", @ANYRES32=0x0, @ANYBLOB="3800018008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000000000b08000300020000001400020076657468315f746f5f7c65616d000000580001800800030001000000080003000000000014000200626f6e645f736c6176655f30000000001400020076657468305f746f5f62726964676500080003000100000014000200697036746e6c30000000000000000000280001801400020000000000000080000000000000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="d036e28562185d853e77054c5316a1b651f33e5a59967cb4abf38cf460f0a912ab112e80c9a2a570757b9bed44debdd091de6beafe89e053f4ee7fdcd62b9d17cc1f23f184b5c8402f1cba966c7d655c2b862b492192aaf317a1c6ac764733449726d8ebf33b3ad578adee97533ee8becfaa634dc1905c61cfb540b044d9c6c3bdb459010f"], 0xec}, 0x1, 0x0, 0x0, 0x64880}, 0x40000) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r3, &(0x7f0000000300)=""/232, 0xe8) r9 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x563ce1, 0x5) pwritev(r9, &(0x7f0000003200)=[{&(0x7f0000003280)="95", 0x1}], 0x1, 0x0, 0x0) r10 = socket(0x1c, 0x1, 0x7) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r10, 0x28, 0x0, &(0x7f0000000000), 0x8) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f0000000240)={0x1, 0x1, 0xce, &(0x7f0000000400)=""/206}) 00:45:48 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{0x0, 0x1}, 0x0, 0x6}) 00:45:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYRES32=0x0], 0x10, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) write(r0, &(0x7f0000000080)='O', 0xffff8000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2754.581051][ T5306] loop1: detected capacity change from 0 to 128 00:45:55 executing program 0: syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, &(0x7f00000020c0)={{}, 0x37}, 0x0, 0x0, 0x0) [ 2756.091682][ T5306] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 without journal. Quota mode: none. [ 2758.171997][ T5311] fuse: Bad value for 'fd' 00:45:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x3}}, 0x10) 00:45:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYRES32=0x0], 0x10, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) write(r0, &(0x7f0000000080)='O', 0xffff8000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2760.709148][ T2888] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 2763.732634][ T5317] loop1: detected capacity change from 0 to 128 00:46:03 executing program 0: clock_settime(0x3354cf1fa1b57a20, &(0x7f0000007580)={0x0, 0x3938700}) [ 2764.385668][ T5317] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 without journal. Quota mode: none. 00:46:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x0]}}, &(0x7f00000001c0)=""/4096, 0x2f, 0x1000, 0x1}, 0x20) 00:46:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYRES32=0x0], 0x10, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) write(r0, &(0x7f0000000080)='O', 0xffff8000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:46:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x800) sendmmsg$alg(r2, &(0x7f00000062c0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) [ 2769.665693][ T2888] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 2772.612014][ T5330] loop1: detected capacity change from 0 to 128 [ 2773.418328][ T5330] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 without journal. Quota mode: none. 00:46:13 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x800) sendmmsg$alg(r2, &(0x7f00000062c0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 00:46:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x800) sendmmsg$alg(r2, &(0x7f00000062c0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 00:46:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYRES32=0x0], 0x10, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) write(r0, &(0x7f0000000080)='O', 0xffff8000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2778.102239][ T2888] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 2779.924528][ T5341] loop1: detected capacity change from 0 to 128 [ 2780.746823][ T5341] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 without journal. Quota mode: none. 00:46:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0xea007) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x800) sendmmsg$alg(r2, &(0x7f00000062c0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 00:46:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="20000000110001e9e23d6100000000000000000007"], 0x20}}, 0x0) ps_root_recvmsgcb: failed to send message to pid 5262: Connection refused ps_root_recvmsgcb: failed to send message to pid 5263: Connection refused [ 2785.042844][ T2888] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. ps_root_recvmsgcb: failed to send message to pid 5265: Connection refused ps_root_recvmsgcb: failed to send message to pid 5266: Connection refused 00:46:26 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "2b924d", 0x18, 0x3c, 0x0, @private0, @local, {[@hopopts], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "879f5e", 0x0, "b9b7bb"}}}}}}}, 0x0) 00:46:27 executing program 0: bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e1edf143341a737a1269aa26b680d2abbf86a5db2415b093be4c1c0c53f9fcc94472fc0d7a6d170df694bd0442de225d81b029149702dcb8eb880dacce0360"}, 0x60) r0 = syz_open_dev$sndpcmp(&(0x7f0000002100), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r0, 0x80044100, &(0x7f0000000000)) 00:46:28 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs, 0x80) 00:46:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}, 0x2b}], [{@subj_type={'subj_type', 0x3d, '[:,&,.'}}]}) 00:46:30 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) close_range(r0, r1, 0x0) [ 2791.999064][ T5358] tmpfs: Bad value for 'mpol' 00:46:32 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x24512) 00:46:33 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x4, 0x9, 0x9}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x4}, 0x38) 00:46:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000800), 0x1, 0x74e, &(0x7f0000000840)="$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") 00:46:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') syz_mount_image$tmpfs(0x0, &(0x7f0000001480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x2008c41, 0x0) pivot_root(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001400), 0x2000000, &(0x7f0000001680)=ANY=[@ANYBLOB='mode=00000000000000000001777,mode=01777777777757777777777,dont_appraise,uid<', @ANYRESDEC=0x0, @ANYBLOB="efc6776ac1", @ANYRESDEC=0x0, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,dont_appraise,obj_role=mounts\x00,permit_directio,\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000015c0)=ANY=[@ANYBLOB="fc00000001000000180000005108d3313ba2dc9283a1295a5171867f61bcca74e59308d2fd87a892350332619f2b0fc67d92a1237a82c1b0c64b73e42eeb59cb006f4cd4e090f7eb38cb5903e5ef2298739e06e3a8c07d2f34b1c1ce32fc31a82d66d495672342eb154ed1030e4fbab17417", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="2e2f66896c653000"]) symlinkat(&(0x7f00000013c0)='./file0\x00', r2, &(0x7f0000001440)='./file0\x00') readv(r1, &(0x7f0000001140)=[{&(0x7f0000000100)=""/6, 0x6}], 0x1) mount$bpf(0x0, &(0x7f0000001200)='./file0\x00', &(0x7f0000001240), 0x400, &(0x7f0000001280)=ANY=[@ANYBLOB="6d3030303030303030303031303030f7a730312c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030003030352c66756e633d4b455844435f4b45524e454c5f434845434b2c7065726d69745f646972656374696f2c646f6e745f6d6561737572652c66756b633d504f4c4943595f434845434b2c00"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffffffd) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x5, 0x0, &(0x7f0000001340)) r7 = open_tree(r5, &(0x7f0000001780)='./file0\x00', 0x8000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000017c0)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) openat(r1, &(0x7f0000001800)='./file0\x00', 0x20000, 0x90) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000001880)={'sit0\x00', &(0x7f0000001840)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=0x64010100, 0x16, 0x1f}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000001540)=ANY=[@ANYBLOB="0100000001000000180000007fe6530df7201cb217b9507a7f7d21df2b76af09783f1118d819a76129cdfbcb3650ed65b4cbf7a59c6239e0d1ca1ab61f8d5a88a2a28987964de76d252548984cb46741d0fe89c3d34373327ec183a964", @ANYRES16=r5, @ANYRES32, @ANYRES64=r3]) accept4$llc(0xffffffffffffffff, &(0x7f00000014c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001500)=0x10, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@base={0x7, 0xffff, 0xfffff64d, 0x6, 0x20, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x2, 0x3, 0x4}, 0x48) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 2798.688193][ T5368] ======================================================= [ 2798.688193][ T5368] WARNING: The mand mount option has been deprecated and [ 2798.688193][ T5368] and is ignored by this kernel. Remove the mand [ 2798.688193][ T5368] option from the mount to silence this warning. [ 2798.688193][ T5368] ======================================================= [ 2799.271075][ T5368] bpf: Bad value for 'mode' [ 2799.816911][ T5366] loop0: detected capacity change from 0 to 2048 [ 2800.392926][ T27] audit: type=1800 audit(2799.750:58): pid=5370 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=645 res=0 errno=0 [ 2800.545695][ T27] audit: type=1804 audit(2799.930:59): pid=5370 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/306/file1" dev="vda" ino=645 res=1 errno=0 [ 2801.010429][ T5366] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 00:46:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000800), 0x1, 0x74e, &(0x7f0000000840)="$eJzs3c9rHOUfB/DPzOZX23y/SaVUK4IBDxXUTVNbf53SKgpVRFQ8N6TbUrptShLBxB5Sjx5EUPCo/hcFL714FjxUvepJoUi1l4qyMrO7ydLsJjFsdtB5vWA2zzPPJs/zzpA8MzvLPgGU1lT2kEYciYizScREa38SEcN5aShitvm8e3euzf9x59p8Eo3GW78m+XOyfdHxPZkDrcpYRHx7OokHKpv7XVpZvTRXr9cWW/Xp5ctXp5dWVp+6eHnuQu1C7crxEydnnj353DMnnu9b1sNnnnz98Acv3vqq8eYrL31zci2J2RhvtXXm6JepmFr/nXQaioiX+91ZQSqtPJ05k6ECB8Q/knYcw8MxEZXYOHgT8fV3hQ4OANgTjUpEAwAomcT8DwAl034d4N6da/PtrdhXJAbr9qnIb1Ruzj8Us/nXsfw+6P7fk+i8rZVExGQf+p+KiBt337mVbbFH9yG3snY9Ih7qlj/J80/md3E3569ExLE+9D91X/3flH+2D/0XnR+Acrp5qjmRbZ7/0vXzn+gy/411mbt2o+j5r/f530b+So/zvzd22McXHz3yYK+2zvO/bMv6b58LDsLt6xEPD/U+/8nyJz3yn91hHzd+fn+uV1vR+RtfRhztev2z8Y62ZOv3J06fv1ivHWs+du3jk+kzH/bqv+j82fHf3yP/dsf/6g77+OvQj6d7tW2fP/1lJHk7L4209rw3t7y8OBMxkry2ef/xrcfSfk77Z2T5H39s67//bvmza8K1Heb//NXfPtt9/r2V5T+3y+P/8Q77+HPhp7FebUXnBwAAAAAAAAAAAAAAAAAAAAAAAIBBSCNiPJK0ul5O02q1uYb3odif1heWlp84v/DulXORr5U9GcNp+5MuJ5r1JKvPtD4Pv10/fl/96Yg4GBGfju7L69X5hfq5osMDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQMuB+9b/vzvaXP8fAPiPGyt6AADAwJn/AaB8zP8AUD7mfwAoH/M/AJSP+R8Aysf8DwAAAAAAAAAAAAAAAAAAAAAAA3Xw0Zs/JBGx9sK+fMuMtNqGCx0ZsNfSogcAFKZS9ACAwgwVPQCgMK7xgWSb9p4fEb7mCgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgPI4esT6/1BW1v+H8rJ6J5SX9f+hvFzjA9b/BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA7Y3nW5JWW2uBj0eaVqsR/4uIyRhOzl+s145FxP8j4vvR4dGsPlP0oAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgz5ZWVi/N1eu1RQUFBYX1QtH/mQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGDwNhb9LnokAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFGlpZfXSXL1eW9zDQtEZAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPrp7wAAAP//3MYrEg==") [ 2803.001666][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:46:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') syz_mount_image$tmpfs(0x0, &(0x7f0000001480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x2008c41, 0x0) pivot_root(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001400), 0x2000000, &(0x7f0000001680)=ANY=[@ANYBLOB='mode=00000000000000000001777,mode=01777777777757777777777,dont_appraise,uid<', @ANYRESDEC=0x0, @ANYBLOB="efc6776ac1", @ANYRESDEC=0x0, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,dont_appraise,obj_role=mounts\x00,permit_directio,\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000015c0)=ANY=[@ANYBLOB="fc00000001000000180000005108d3313ba2dc9283a1295a5171867f61bcca74e59308d2fd87a892350332619f2b0fc67d92a1237a82c1b0c64b73e42eeb59cb006f4cd4e090f7eb38cb5903e5ef2298739e06e3a8c07d2f34b1c1ce32fc31a82d66d495672342eb154ed1030e4fbab17417", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="2e2f66896c653000"]) symlinkat(&(0x7f00000013c0)='./file0\x00', r2, &(0x7f0000001440)='./file0\x00') readv(r1, &(0x7f0000001140)=[{&(0x7f0000000100)=""/6, 0x6}], 0x1) mount$bpf(0x0, &(0x7f0000001200)='./file0\x00', &(0x7f0000001240), 0x400, &(0x7f0000001280)=ANY=[@ANYBLOB="6d3030303030303030303031303030f7a730312c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030003030352c66756e633d4b455844435f4b45524e454c5f434845434b2c7065726d69745f646972656374696f2c646f6e745f6d6561737572652c66756b633d504f4c4943595f434845434b2c00"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffffffd) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x5, 0x0, &(0x7f0000001340)) r7 = open_tree(r5, &(0x7f0000001780)='./file0\x00', 0x8000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000017c0)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) openat(r1, &(0x7f0000001800)='./file0\x00', 0x20000, 0x90) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000001880)={'sit0\x00', &(0x7f0000001840)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=0x64010100, 0x16, 0x1f}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000001540)=ANY=[@ANYBLOB="0100000001000000180000007fe6530df7201cb217b9507a7f7d21df2b76af09783f1118d819a76129cdfbcb3650ed65b4cbf7a59c6239e0d1ca1ab61f8d5a88a2a28987964de76d252548984cb46741d0fe89c3d34373327ec183a964", @ANYRES16=r5, @ANYRES32, @ANYRES64=r3]) accept4$llc(0xffffffffffffffff, &(0x7f00000014c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001500)=0x10, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@base={0x7, 0xffff, 0xfffff64d, 0x6, 0x20, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x2, 0x3, 0x4}, 0x48) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 2805.251350][ T5377] bpf: Bad value for 'mode' [ 2806.175502][ T27] audit: type=1800 audit(2805.560:60): pid=5380 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=644 res=0 errno=0 [ 2806.372590][ T27] audit: type=1804 audit(2805.710:61): pid=5380 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/307/file1" dev="vda" ino=644 res=1 errno=0 00:46:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') syz_mount_image$tmpfs(0x0, &(0x7f0000001480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x2008c41, 0x0) pivot_root(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001400), 0x2000000, &(0x7f0000001680)=ANY=[@ANYBLOB='mode=00000000000000000001777,mode=01777777777757777777777,dont_appraise,uid<', @ANYRESDEC=0x0, @ANYBLOB="efc6776ac1", @ANYRESDEC=0x0, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,dont_appraise,obj_role=mounts\x00,permit_directio,\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000015c0)=ANY=[@ANYBLOB="fc00000001000000180000005108d3313ba2dc9283a1295a5171867f61bcca74e59308d2fd87a892350332619f2b0fc67d92a1237a82c1b0c64b73e42eeb59cb006f4cd4e090f7eb38cb5903e5ef2298739e06e3a8c07d2f34b1c1ce32fc31a82d66d495672342eb154ed1030e4fbab17417", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="2e2f66896c653000"]) symlinkat(&(0x7f00000013c0)='./file0\x00', r2, &(0x7f0000001440)='./file0\x00') readv(r1, &(0x7f0000001140)=[{&(0x7f0000000100)=""/6, 0x6}], 0x1) mount$bpf(0x0, &(0x7f0000001200)='./file0\x00', &(0x7f0000001240), 0x400, &(0x7f0000001280)=ANY=[@ANYBLOB="6d3030303030303030303031303030f7a730312c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030003030352c66756e633d4b455844435f4b45524e454c5f434845434b2c7065726d69745f646972656374696f2c646f6e745f6d6561737572652c66756b633d504f4c4943595f434845434b2c00"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffffffd) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x5, 0x0, &(0x7f0000001340)) r7 = open_tree(r5, &(0x7f0000001780)='./file0\x00', 0x8000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000017c0)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) openat(r1, &(0x7f0000001800)='./file0\x00', 0x20000, 0x90) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000001880)={'sit0\x00', &(0x7f0000001840)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=0x64010100, 0x16, 0x1f}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000001540)=ANY=[@ANYBLOB="0100000001000000180000007fe6530df7201cb217b9507a7f7d21df2b76af09783f1118d819a76129cdfbcb3650ed65b4cbf7a59c6239e0d1ca1ab61f8d5a88a2a28987964de76d252548984cb46741d0fe89c3d34373327ec183a964", @ANYRES16=r5, @ANYRES32, @ANYRES64=r3]) accept4$llc(0xffffffffffffffff, &(0x7f00000014c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001500)=0x10, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@base={0x7, 0xffff, 0xfffff64d, 0x6, 0x20, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x2, 0x3, 0x4}, 0x48) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 2809.688793][ T5379] loop0: detected capacity change from 0 to 2048 [ 2810.604544][ T5379] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 2811.709857][ T5384] bpf: Bad value for 'mode' 00:46:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000800), 0x1, 0x74e, &(0x7f0000000840)="$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") [ 2812.552410][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2812.735255][ T27] audit: type=1800 audit(2812.120:62): pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=639 res=0 errno=0 [ 2812.953095][ T27] audit: type=1804 audit(2812.340:63): pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/308/file1" dev="vda" ino=639 res=1 errno=0 00:46:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') syz_mount_image$tmpfs(0x0, &(0x7f0000001480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x2008c41, 0x0) pivot_root(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001400), 0x2000000, &(0x7f0000001680)=ANY=[@ANYBLOB='mode=00000000000000000001777,mode=01777777777757777777777,dont_appraise,uid<', @ANYRESDEC=0x0, @ANYBLOB="efc6776ac1", @ANYRESDEC=0x0, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,dont_appraise,obj_role=mounts\x00,permit_directio,\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000015c0)=ANY=[@ANYBLOB="fc00000001000000180000005108d3313ba2dc9283a1295a5171867f61bcca74e59308d2fd87a892350332619f2b0fc67d92a1237a82c1b0c64b73e42eeb59cb006f4cd4e090f7eb38cb5903e5ef2298739e06e3a8c07d2f34b1c1ce32fc31a82d66d495672342eb154ed1030e4fbab17417", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="2e2f66896c653000"]) symlinkat(&(0x7f00000013c0)='./file0\x00', r2, &(0x7f0000001440)='./file0\x00') readv(r1, &(0x7f0000001140)=[{&(0x7f0000000100)=""/6, 0x6}], 0x1) mount$bpf(0x0, &(0x7f0000001200)='./file0\x00', &(0x7f0000001240), 0x400, &(0x7f0000001280)=ANY=[@ANYBLOB="6d3030303030303030303031303030f7a730312c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030003030352c66756e633d4b455844435f4b45524e454c5f434845434b2c7065726d69745f646972656374696f2c646f6e745f6d6561737572652c66756b633d504f4c4943595f434845434b2c00"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffffffd) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x5, 0x0, &(0x7f0000001340)) r7 = open_tree(r5, &(0x7f0000001780)='./file0\x00', 0x8000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000017c0)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) openat(r1, &(0x7f0000001800)='./file0\x00', 0x20000, 0x90) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000001880)={'sit0\x00', &(0x7f0000001840)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=0x64010100, 0x16, 0x1f}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000001540)=ANY=[@ANYBLOB="0100000001000000180000007fe6530df7201cb217b9507a7f7d21df2b76af09783f1118d819a76129cdfbcb3650ed65b4cbf7a59c6239e0d1ca1ab61f8d5a88a2a28987964de76d252548984cb46741d0fe89c3d34373327ec183a964", @ANYRES16=r5, @ANYRES32, @ANYRES64=r3]) accept4$llc(0xffffffffffffffff, &(0x7f00000014c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001500)=0x10, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@base={0x7, 0xffff, 0xfffff64d, 0x6, 0x20, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x2, 0x3, 0x4}, 0x48) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 2819.148821][ T5390] loop0: detected capacity change from 0 to 2048 [ 2819.400224][ T5392] bpf: Bad value for 'mode' [ 2819.987803][ T5390] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 2820.470316][ T27] audit: type=1800 audit(2819.800:64): pid=5396 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=645 res=0 errno=0 [ 2820.607416][ T27] audit: type=1804 audit(2819.950:65): pid=5396 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/309/file1" dev="vda" ino=645 res=1 errno=0 00:47:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000800), 0x1, 0x74e, &(0x7f0000000840)="$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") [ 2823.167981][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:47:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') syz_mount_image$tmpfs(0x0, &(0x7f0000001480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x2008c41, 0x0) pivot_root(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001400), 0x2000000, &(0x7f0000001680)=ANY=[@ANYBLOB='mode=00000000000000000001777,mode=01777777777757777777777,dont_appraise,uid<', @ANYRESDEC=0x0, @ANYBLOB="efc6776ac1", @ANYRESDEC=0x0, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,dont_appraise,obj_role=mounts\x00,permit_directio,\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000015c0)=ANY=[@ANYBLOB="fc00000001000000180000005108d3313ba2dc9283a1295a5171867f61bcca74e59308d2fd87a892350332619f2b0fc67d92a1237a82c1b0c64b73e42eeb59cb006f4cd4e090f7eb38cb5903e5ef2298739e06e3a8c07d2f34b1c1ce32fc31a82d66d495672342eb154ed1030e4fbab17417", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="2e2f66896c653000"]) symlinkat(&(0x7f00000013c0)='./file0\x00', r2, &(0x7f0000001440)='./file0\x00') readv(r1, &(0x7f0000001140)=[{&(0x7f0000000100)=""/6, 0x6}], 0x1) mount$bpf(0x0, &(0x7f0000001200)='./file0\x00', &(0x7f0000001240), 0x400, &(0x7f0000001280)=ANY=[@ANYBLOB="6d3030303030303030303031303030f7a730312c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030003030352c66756e633d4b455844435f4b45524e454c5f434845434b2c7065726d69745f646972656374696f2c646f6e745f6d6561737572652c66756b633d504f4c4943595f434845434b2c00"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffffffd) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x5, 0x0, &(0x7f0000001340)) r7 = open_tree(r5, &(0x7f0000001780)='./file0\x00', 0x8000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000017c0)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) openat(r1, &(0x7f0000001800)='./file0\x00', 0x20000, 0x90) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000001880)={'sit0\x00', &(0x7f0000001840)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=0x64010100, 0x16, 0x1f}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000001540)=ANY=[@ANYBLOB="0100000001000000180000007fe6530df7201cb217b9507a7f7d21df2b76af09783f1118d819a76129cdfbcb3650ed65b4cbf7a59c6239e0d1ca1ab61f8d5a88a2a28987964de76d252548984cb46741d0fe89c3d34373327ec183a964", @ANYRES16=r5, @ANYRES32, @ANYRES64=r3]) accept4$llc(0xffffffffffffffff, &(0x7f00000014c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001500)=0x10, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@base={0x7, 0xffff, 0xfffff64d, 0x6, 0x20, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x2, 0x3, 0x4}, 0x48) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 2827.120829][ T5402] bpf: Bad value for 'mode' [ 2828.001464][ T27] audit: type=1800 audit(2827.390:66): pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=644 res=0 errno=0 [ 2828.330800][ T27] audit: type=1804 audit(2827.690:67): pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/310/file1" dev="vda" ino=644 res=1 errno=0 [ 2830.145491][ T5401] loop0: detected capacity change from 0 to 2048 [ 2831.076384][ T5401] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 00:47:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') syz_mount_image$tmpfs(0x0, &(0x7f0000001480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x2008c41, 0x0) pivot_root(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001400), 0x2000000, &(0x7f0000001680)=ANY=[@ANYBLOB='mode=00000000000000000001777,mode=01777777777757777777777,dont_appraise,uid<', @ANYRESDEC=0x0, @ANYBLOB="efc6776ac1", @ANYRESDEC=0x0, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,dont_appraise,obj_role=mounts\x00,permit_directio,\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000015c0)=ANY=[@ANYBLOB="fc00000001000000180000005108d3313ba2dc9283a1295a5171867f61bcca74e59308d2fd87a892350332619f2b0fc67d92a1237a82c1b0c64b73e42eeb59cb006f4cd4e090f7eb38cb5903e5ef2298739e06e3a8c07d2f34b1c1ce32fc31a82d66d495672342eb154ed1030e4fbab17417", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="2e2f66896c653000"]) symlinkat(&(0x7f00000013c0)='./file0\x00', r2, &(0x7f0000001440)='./file0\x00') readv(r1, &(0x7f0000001140)=[{&(0x7f0000000100)=""/6, 0x6}], 0x1) mount$bpf(0x0, &(0x7f0000001200)='./file0\x00', &(0x7f0000001240), 0x400, &(0x7f0000001280)=ANY=[@ANYBLOB="6d3030303030303030303031303030f7a730312c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030003030352c66756e633d4b455844435f4b45524e454c5f434845434b2c7065726d69745f646972656374696f2c646f6e745f6d6561737572652c66756b633d504f4c4943595f434845434b2c00"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffffffd) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x5, 0x0, &(0x7f0000001340)) r7 = open_tree(r5, &(0x7f0000001780)='./file0\x00', 0x8000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000017c0)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) openat(r1, &(0x7f0000001800)='./file0\x00', 0x20000, 0x90) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000001880)={'sit0\x00', &(0x7f0000001840)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=0x64010100, 0x16, 0x1f}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000001540)=ANY=[@ANYBLOB="0100000001000000180000007fe6530df7201cb217b9507a7f7d21df2b76af09783f1118d819a76129cdfbcb3650ed65b4cbf7a59c6239e0d1ca1ab61f8d5a88a2a28987964de76d252548984cb46741d0fe89c3d34373327ec183a964", @ANYRES16=r5, @ANYRES32, @ANYRES64=r3]) accept4$llc(0xffffffffffffffff, &(0x7f00000014c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001500)=0x10, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@base={0x7, 0xffff, 0xfffff64d, 0x6, 0x20, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x2, 0x3, 0x4}, 0x48) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 2832.572057][ T2889] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2836.132563][ T5410] bpf: Bad value for 'mode' [ 2837.067644][ T27] audit: type=1800 audit(2836.420:68): pid=5412 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=640 res=0 errno=0 [ 2837.182396][ T27] audit: type=1804 audit(2836.570:69): pid=5412 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/311/file1" dev="vda" ino=640 res=1 errno=0 00:47:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') syz_mount_image$tmpfs(0x0, &(0x7f0000001480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x2008c41, 0x0) pivot_root(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001400), 0x2000000, &(0x7f0000001680)=ANY=[@ANYBLOB='mode=00000000000000000001777,mode=01777777777757777777777,dont_appraise,uid<', @ANYRESDEC=0x0, @ANYBLOB="efc6776ac1", @ANYRESDEC=0x0, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,dont_appraise,obj_role=mounts\x00,permit_directio,\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000015c0)=ANY=[@ANYBLOB="fc00000001000000180000005108d3313ba2dc9283a1295a5171867f61bcca74e59308d2fd87a892350332619f2b0fc67d92a1237a82c1b0c64b73e42eeb59cb006f4cd4e090f7eb38cb5903e5ef2298739e06e3a8c07d2f34b1c1ce32fc31a82d66d495672342eb154ed1030e4fbab17417", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="2e2f66896c653000"]) symlinkat(&(0x7f00000013c0)='./file0\x00', r2, &(0x7f0000001440)='./file0\x00') readv(r1, &(0x7f0000001140)=[{&(0x7f0000000100)=""/6, 0x6}], 0x1) mount$bpf(0x0, &(0x7f0000001200)='./file0\x00', &(0x7f0000001240), 0x400, &(0x7f0000001280)=ANY=[@ANYBLOB="6d3030303030303030303031303030f7a730312c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030003030352c66756e633d4b455844435f4b45524e454c5f434845434b2c7065726d69745f646972656374696f2c646f6e745f6d6561737572652c66756b633d504f4c4943595f434845434b2c00"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffffffd) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x5, 0x0, &(0x7f0000001340)) r7 = open_tree(r5, &(0x7f0000001780)='./file0\x00', 0x8000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000017c0)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) openat(r1, &(0x7f0000001800)='./file0\x00', 0x20000, 0x90) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000001880)={'sit0\x00', &(0x7f0000001840)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=0x64010100, 0x16, 0x1f}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000001540)=ANY=[@ANYBLOB="0100000001000000180000007fe6530df7201cb217b9507a7f7d21df2b76af09783f1118d819a76129cdfbcb3650ed65b4cbf7a59c6239e0d1ca1ab61f8d5a88a2a28987964de76d252548984cb46741d0fe89c3d34373327ec183a964", @ANYRES16=r5, @ANYRES32, @ANYRES64=r3]) accept4$llc(0xffffffffffffffff, &(0x7f00000014c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001500)=0x10, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@base={0x7, 0xffff, 0xfffff64d, 0x6, 0x20, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x2, 0x3, 0x4}, 0x48) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 00:47:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') syz_mount_image$tmpfs(0x0, &(0x7f0000001480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x2008c41, 0x0) pivot_root(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001400), 0x2000000, &(0x7f0000001680)=ANY=[@ANYBLOB='mode=00000000000000000001777,mode=01777777777757777777777,dont_appraise,uid<', @ANYRESDEC=0x0, @ANYBLOB="efc6776ac1", @ANYRESDEC=0x0, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,dont_appraise,obj_role=mounts\x00,permit_directio,\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000015c0)=ANY=[@ANYBLOB="fc00000001000000180000005108d3313ba2dc9283a1295a5171867f61bcca74e59308d2fd87a892350332619f2b0fc67d92a1237a82c1b0c64b73e42eeb59cb006f4cd4e090f7eb38cb5903e5ef2298739e06e3a8c07d2f34b1c1ce32fc31a82d66d495672342eb154ed1030e4fbab17417", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="2e2f66896c653000"]) symlinkat(&(0x7f00000013c0)='./file0\x00', r2, &(0x7f0000001440)='./file0\x00') readv(r1, &(0x7f0000001140)=[{&(0x7f0000000100)=""/6, 0x6}], 0x1) mount$bpf(0x0, &(0x7f0000001200)='./file0\x00', &(0x7f0000001240), 0x400, &(0x7f0000001280)=ANY=[@ANYBLOB="6d3030303030303030303031303030f7a730312c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030003030352c66756e633d4b455844435f4b45524e454c5f434845434b2c7065726d69745f646972656374696f2c646f6e745f6d6561737572652c66756b633d504f4c4943595f434845434b2c00"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffffffd) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x5, 0x0, &(0x7f0000001340)) r7 = open_tree(r5, &(0x7f0000001780)='./file0\x00', 0x8000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000017c0)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) openat(r1, &(0x7f0000001800)='./file0\x00', 0x20000, 0x90) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000001880)={'sit0\x00', &(0x7f0000001840)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=0x64010100, 0x16, 0x1f}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000001540)=ANY=[@ANYBLOB="0100000001000000180000007fe6530df7201cb217b9507a7f7d21df2b76af09783f1118d819a76129cdfbcb3650ed65b4cbf7a59c6239e0d1ca1ab61f8d5a88a2a28987964de76d252548984cb46741d0fe89c3d34373327ec183a964", @ANYRES16=r5, @ANYRES32, @ANYRES64=r3]) accept4$llc(0xffffffffffffffff, &(0x7f00000014c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001500)=0x10, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@base={0x7, 0xffff, 0xfffff64d, 0x6, 0x20, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x2, 0x3, 0x4}, 0x48) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 2840.831342][ T5414] bpf: Bad value for 'mode' [ 2841.687334][ T27] audit: type=1800 audit(2841.050:70): pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="vda" ino=635 res=0 errno=0 [ 2841.785063][ T27] audit: type=1804 audit(2841.170:71): pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/328/file1" dev="vda" ino=635 res=1 errno=0 00:47:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') syz_mount_image$tmpfs(0x0, &(0x7f0000001480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x2008c41, 0x0) pivot_root(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001400), 0x2000000, &(0x7f0000001680)=ANY=[@ANYBLOB='mode=00000000000000000001777,mode=01777777777757777777777,dont_appraise,uid<', @ANYRESDEC=0x0, @ANYBLOB="efc6776ac1", @ANYRESDEC=0x0, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,dont_appraise,obj_role=mounts\x00,permit_directio,\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000015c0)=ANY=[@ANYBLOB="fc00000001000000180000005108d3313ba2dc9283a1295a5171867f61bcca74e59308d2fd87a892350332619f2b0fc67d92a1237a82c1b0c64b73e42eeb59cb006f4cd4e090f7eb38cb5903e5ef2298739e06e3a8c07d2f34b1c1ce32fc31a82d66d495672342eb154ed1030e4fbab17417", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="2e2f66896c653000"]) symlinkat(&(0x7f00000013c0)='./file0\x00', r2, &(0x7f0000001440)='./file0\x00') readv(r1, &(0x7f0000001140)=[{&(0x7f0000000100)=""/6, 0x6}], 0x1) mount$bpf(0x0, &(0x7f0000001200)='./file0\x00', &(0x7f0000001240), 0x400, &(0x7f0000001280)=ANY=[@ANYBLOB="6d3030303030303030303031303030f7a730312c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030003030352c66756e633d4b455844435f4b45524e454c5f434845434b2c7065726d69745f646972656374696f2c646f6e745f6d6561737572652c66756b633d504f4c4943595f434845434b2c00"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffffffd) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x5, 0x0, &(0x7f0000001340)) r7 = open_tree(r5, &(0x7f0000001780)='./file0\x00', 0x8000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000017c0)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) openat(r1, &(0x7f0000001800)='./file0\x00', 0x20000, 0x90) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000001880)={'sit0\x00', &(0x7f0000001840)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=0x64010100, 0x16, 0x1f}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000001540)=ANY=[@ANYBLOB="0100000001000000180000007fe6530df7201cb217b9507a7f7d21df2b76af09783f1118d819a76129cdfbcb3650ed65b4cbf7a59c6239e0d1ca1ab61f8d5a88a2a28987964de76d252548984cb46741d0fe89c3d34373327ec183a964", @ANYRES16=r5, @ANYRES32, @ANYRES64=r3]) accept4$llc(0xffffffffffffffff, &(0x7f00000014c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001500)=0x10, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@base={0x7, 0xffff, 0xfffff64d, 0x6, 0x20, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x2, 0x3, 0x4}, 0x48) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 2844.471939][ T5418] bpf: Bad value for 'mode' [ 2845.329965][ T27] audit: type=1800 audit(2844.720:72): pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=635 res=0 errno=0 [ 2845.438492][ T27] audit: type=1804 audit(2844.820:73): pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir3640355965/syzkaller.s0PUps/312/file1" dev="vda" ino=635 res=1 errno=0 00:47:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x8, 0x0, 0x0, 0x85ffffff}, [@initr0]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) [ 2848.307704][ T5422] bpf: Bad value for 'mode' [ 2849.352724][ T5425] warn_alloc: 3 callbacks suppressed [ 2849.353020][ T5425] dhcpcd: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 2849.408864][ T5425] CPU: 1 PID: 5425 Comm: dhcpcd Tainted: G W 6.2.0-rc1-syzkaller #0 [ 2849.410123][ T5425] Hardware name: riscv-virtio,qemu (DT) [ 2849.410849][ T5425] Call Trace: [ 2849.411694][ T5425] [] dump_backtrace+0x2e/0x3c [ 2849.413086][ T5425] [] show_stack+0x34/0x40 [ 2849.414806][ T5425] [] dump_stack_lvl+0xe0/0x14c [ 2849.416288][ T5425] [] dump_stack+0x1c/0x24 [ 2849.417377][ T5425] [] warn_alloc+0x168/0x22c [ 2849.418539][ T5425] [] __vmalloc_node_range+0xb6c/0xdb4 [ 2849.420143][ T5425] [] bpf_jit_alloc_exec+0x46/0x52 [ 2849.421663][ T5425] [] bpf_jit_binary_alloc+0x96/0x13c [ 2849.423164][ T5425] [] bpf_int_jit_compile+0x886/0xaa6 [ 2849.425361][ T5425] [] bpf_prog_select_runtime+0x1a2/0x22e [ 2849.427151][ T5425] [] bpf_migrate_filter+0x258/0x2be [ 2849.429241][ T5425] [] bpf_prepare_filter+0x10e/0x1b4 [ 2849.430846][ T5425] [] __get_filter+0x148/0x1a0 [ 2849.432349][ T5425] [] sk_attach_filter+0x22/0x11a [ 2849.434108][ T5425] [] sk_setsockopt+0x144e/0x270c [ 2849.436103][ T5425] [] sock_setsockopt+0x48/0x58 [ 2849.437715][ T5425] [] __sys_setsockopt+0x3f0/0x418 [ 2849.439204][ T5425] [] sys_setsockopt+0x3a/0x4c [ 2849.440112][ T5425] [] ret_from_syscall+0x0/0x2 [ 2849.512457][ T27] audit: type=1800 audit(2848.900:74): pid=5426 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="vda" ino=637 res=0 errno=0 [ 2849.585523][ T5425] Mem-Info: [ 2849.586578][ T5425] active_anon:37693 inactive_anon:94 isolated_anon:0 [ 2849.586578][ T5425] active_file:0 inactive_file:8024 isolated_file:0 [ 2849.586578][ T5425] unevictable:768 dirty:16 writeback:0 [ 2849.586578][ T5425] slab_reclaimable:5614 slab_unreclaimable:24070 [ 2849.586578][ T5425] mapped:8763 shmem:931 pagetables:330 [ 2849.586578][ T5425] sec_pagetables:0 bounce:0 [ 2849.586578][ T5425] kernel_misc_reclaimable:0 [ 2849.586578][ T5425] free:219732 free_pcp:783 free_cma:4096 [ 2849.589444][ T5425] Node 0 active_anon:150772kB inactive_anon:376kB active_file:0kB inactive_file:32096kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:35052kB dirty:64kB writeback:0kB shmem:3724kB writeback_tmp:0kB kernel_stack:5472kB pagetables:1320kB sec_pagetables:0kB all_unreclaimable? no [ 2849.592302][ T5425] Node 0 DMA32 free:878928kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:150772kB inactive_anon:376kB active_file:0kB inactive_file:32096kB unevictable:3072kB writepending:64kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:3132kB local_pcp:1088kB free_cma:16384kB [ 2849.643014][ T5425] lowmem_reserve[]: 0 0 0 [ 2849.677456][ T5425] Node 0 DMA32: 1304*4kB (UME) 996*8kB (UME) 723*16kB (UME) 519*32kB (UME) 347*64kB (UME) 170*128kB (UM) 82*256kB (UM) 47*512kB (UME) 15*1024kB (ME) 4*2048kB (MC) 177*4096kB (UMC) = 878928kB [ 2849.708770][ T5425] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2849.709963][ T5425] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 2849.710997][ T5425] 8955 total pagecache pages [ 2849.712031][ T5425] 0 pages in swap cache [ 2849.712888][ T5425] Free swap = 0kB [ 2849.758367][ T5425] Total swap = 0kB [ 2849.760172][ T5425] 523776 pages RAM [ 2849.760933][ T5425] 0 pages HighMem/MovableOnly [ 2849.761902][ T5425] 184025 pages reserved [ 2849.763007][ T5425] 4096 pages cma reserved ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 [ 2850.032752][ T27] audit: type=1804 audit(2849.370:75): pid=5426 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/329/file1" dev="vda" ino=637 res=1 errno=0 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 ps_bpf_start_bpf: bpf_open: Unknown error 524 ps_root_recvmsg: Unknown error 524 00:47:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x8, 0x0, 0x0, 0x85ffffff}, [@initr0]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) 00:47:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') syz_mount_image$tmpfs(0x0, &(0x7f0000001480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x2008c41, 0x0) pivot_root(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001400), 0x2000000, &(0x7f0000001680)=ANY=[@ANYBLOB='mode=00000000000000000001777,mode=01777777777757777777777,dont_appraise,uid<', @ANYRESDEC=0x0, @ANYBLOB="efc6776ac1", @ANYRESDEC=0x0, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,dont_appraise,obj_role=mounts\x00,permit_directio,\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000015c0)=ANY=[@ANYBLOB="fc00000001000000180000005108d3313ba2dc9283a1295a5171867f61bcca74e59308d2fd87a892350332619f2b0fc67d92a1237a82c1b0c64b73e42eeb59cb006f4cd4e090f7eb38cb5903e5ef2298739e06e3a8c07d2f34b1c1ce32fc31a82d66d495672342eb154ed1030e4fbab17417", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="2e2f66896c653000"]) symlinkat(&(0x7f00000013c0)='./file0\x00', r2, &(0x7f0000001440)='./file0\x00') readv(r1, &(0x7f0000001140)=[{&(0x7f0000000100)=""/6, 0x6}], 0x1) mount$bpf(0x0, &(0x7f0000001200)='./file0\x00', &(0x7f0000001240), 0x400, &(0x7f0000001280)=ANY=[@ANYBLOB="6d3030303030303030303031303030f7a730312c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030003030352c66756e633d4b455844435f4b45524e454c5f434845434b2c7065726d69745f646972656374696f2c646f6e745f6d6561737572652c66756b633d504f4c4943595f434845434b2c00"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffffffd) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x5, 0x0, &(0x7f0000001340)) r7 = open_tree(r5, &(0x7f0000001780)='./file0\x00', 0x8000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000017c0)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) openat(r1, &(0x7f0000001800)='./file0\x00', 0x20000, 0x90) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000001880)={'sit0\x00', &(0x7f0000001840)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=0x64010100, 0x16, 0x1f}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000001540)=ANY=[@ANYBLOB="0100000001000000180000007fe6530df7201cb217b9507a7f7d21df2b76af09783f1118d819a76129cdfbcb3650ed65b4cbf7a59c6239e0d1ca1ab61f8d5a88a2a28987964de76d252548984cb46741d0fe89c3d34373327ec183a964", @ANYRES16=r5, @ANYRES32, @ANYRES64=r3]) accept4$llc(0xffffffffffffffff, &(0x7f00000014c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001500)=0x10, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@base={0x7, 0xffff, 0xfffff64d, 0x6, 0x20, 0xffffffffffffffff, 0x4, '\x00', 0x0, r4, 0x2, 0x3, 0x4}, 0x48) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 00:47:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x8, 0x0, 0x0, 0x85ffffff}, [@initr0]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) [ 2856.096624][ T5434] bpf: Bad value for 'mode' [ 2857.689107][ T27] audit: type=1800 audit(2857.020:76): pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="vda" ino=644 res=0 errno=0 [ 2857.865507][ T27] audit: type=1804 audit(2857.250:77): pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4247490788/syzkaller.5COFFt/330/file1" dev="vda" ino=644 res=1 errno=0 00:47:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x8, 0x0, 0x0, 0x85ffffff}, [@initr0]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x78) 00:47:40 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) [ 2861.051922][ T5440] warn_alloc: 6 callbacks suppressed [ 2861.052235][ T5440] syz-executor.1: vmalloc error: size 4096, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 2861.117609][ T5440] CPU: 0 PID: 5440 Comm: syz-executor.1 Tainted: G W 6.2.0-rc1-syzkaller #0 [ 2861.119677][ T5440] Hardware name: riscv-virtio,qemu (DT) [ 2861.120959][ T5440] Call Trace: [ 2861.122149][ T5440] [] dump_backtrace+0x2e/0x3c [ 2861.124058][ T5440] [] show_stack+0x34/0x40 [ 2861.125727][ T5440] [] dump_stack_lvl+0xe0/0x14c [ 2861.127456][ T5440] [] dump_stack+0x1c/0x24 [ 2861.129120][ T5440] [] warn_alloc+0x168/0x22c [ 2861.130628][ T5440] [] __vmalloc_node_range+0xb6c/0xdb4 [ 2861.132347][ T5440] [] bpf_jit_alloc_exec+0x46/0x52 [ 2861.134124][ T5440] [] bpf_jit_binary_alloc+0x96/0x13c [ 2861.135725][ T5440] [] bpf_int_jit_compile+0x886/0xaa6 [ 2861.137306][ T5440] [] bpf_prog_select_runtime+0x1a2/0x22e [ 2861.138657][ T5440] [] bpf_prog_load+0xcb4/0x12b0 [ 2861.140033][ T5440] [] __sys_bpf+0x622/0x31d2 [ 2861.141426][ T5440] [] sys_bpf+0x28/0x36 [ 2861.142739][ T5440] [] ret_from_syscall+0x0/0x2 [ 2861.170496][ T5440] Mem-Info: [ 2861.179667][ T5440] active_anon:37677 inactive_anon:96 isolated_anon:0 [ 2861.179667][ T5440] active_file:0 inactive_file:8030 isolated_file:0 [ 2861.179667][ T5440] unevictable:768 dirty:19 writeback:0 [ 2861.179667][ T5440] slab_reclaimable:5614 slab_unreclaimable:24105 [ 2861.179667][ T5440] mapped:8715 shmem:933 pagetables:327 [ 2861.179667][ T5440] sec_pagetables:0 bounce:0 [ 2861.179667][ T5440] kernel_misc_reclaimable:0 [ 2861.179667][ T5440] free:219843 free_pcp:715 free_cma:4096 [ 2861.228771][ T5440] Node 0 active_anon:150708kB inactive_anon:384kB active_file:0kB inactive_file:32120kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:34860kB dirty:76kB writeback:0kB shmem:3732kB writeback_tmp:0kB kernel_stack:5392kB pagetables:1308kB sec_pagetables:0kB all_unreclaimable? no [ 2861.231790][ T5440] Node 0 DMA32 free:879372kB boost:0kB min:4656kB low:6012kB high:7368kB reserved_highatomic:0KB active_anon:150708kB inactive_anon:384kB active_file:0kB inactive_file:32120kB unevictable:3072kB writepending:76kB present:2095104kB managed:1359004kB mlocked:0kB bounce:0kB free_pcp:2804kB local_pcp:1708kB free_cma:16384kB [ 2861.275903][ T5440] lowmem_reserve[]: 0 0 0 [ 2861.278624][ T5440] Node 0 DMA32: 1249*4kB (UME) 1027*8kB (UME) 703*16kB (UME) 528*32kB (UME) 352*64kB (UME) 171*128kB (UM) 82*256kB (UM) 47*512kB (UME) 15*1024kB (ME) 4*2048kB (MC) 177*4096kB (UMC) = 879372kB [ 2861.372995][ T5440] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2861.396270][ T5440] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 2861.398327][ T5440] 8966 total pagecache pages [ 2861.399924][ T5440] 0 pages in swap cache [ 2861.401334][ T5440] Free swap = 0kB [ 2861.402705][ T5440] Total swap = 0kB [ 2861.425056][ T5440] 523776 pages RAM [ 2861.426617][ T5440] 0 pages HighMem/MovableOnly [ 2861.427818][ T5440] 184025 pages reserved [ 2861.429091][ T5440] 4096 pages cma reserved 00:47:43 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r0, 0x4004510d, &(0x7f0000000080)) 00:47:46 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='children\x00') readv(r0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/22, 0x16}], 0x1) 00:47:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x4004662b, &(0x7f0000000100)={0x2, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, 0x0, 0xffff) openat$cgroup_ro(r0, &(0x7f000001b600)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 00:47:48 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0xc08c5334, &(0x7f0000000000)) 00:47:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@remote}, 0x0, @in=@local}}, 0xe8) 00:48:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x4004662b, &(0x7f0000000100)={0x2, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, 0x0, 0xffff) openat$cgroup_ro(r0, &(0x7f000001b600)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 2871.891944][ T5449] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow 00:48:08 executing program 1: r0 = mq_open(&(0x7f0000000040)='\x01\xf4\x00\x00\x00\x00Q\xefH\xc08aa\xfcF\x9b\xcczDd=\x14\xee\x99\xe6\xc1G\x97\f\xa5\xa6\x10\x0f+~(qU\xc9\x95^=B<\x00L\x00e\xc8u\x9f%\xb6\xf2*\xad15\xeb\xee\xef\xfft\x1c\xa4i\xd3\xfe\xe1\xb9\xeb\x82\x82oHI<\'\x81\x19\xc9\x96\xf1h\xf9\x8b*\x0f\xbcV\x9b\x8aDU^\xac\xb4\xcf}\xf3\xa1\x0e', 0x0, 0x0, 0x0) mq_getsetattr(r0, 0x0, 0x0) 00:48:15 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x248, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b0, 0xffffffff, 0xffffffff, 0x1b0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0, 0x600}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}, {{@ip={@local, @loopback, 0x0, 0x0, 'bridge0\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0xe0}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "1e861eeb08ba48e6ee4e5fe2f2a99aa3783f98d5d7e07ab5e8d8b1b4848218c5e565e6b3b1fda61ed31c69817683cf71f5e5a53b78c2a7627a1957e26b0ca29f"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) 00:48:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x4004662b, &(0x7f0000000100)={0x2, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, 0x0, 0xffff) openat$cgroup_ro(r0, &(0x7f000001b600)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 00:48:17 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x248, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b0, 0xffffffff, 0xffffffff, 0x1b0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0, 0x600}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}, {{@ip={@local, @loopback, 0x0, 0x0, 'bridge0\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0xe0}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "1e861eeb08ba48e6ee4e5fe2f2a99aa3783f98d5d7e07ab5e8d8b1b4848218c5e565e6b3b1fda61ed31c69817683cf71f5e5a53b78c2a7627a1957e26b0ca29f"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) [ 2887.916613][ T5455] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow 00:48:24 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x248, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b0, 0xffffffff, 0xffffffff, 0x1b0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0, 0x600}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}, {{@ip={@local, @loopback, 0x0, 0x0, 'bridge0\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0xe0}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "1e861eeb08ba48e6ee4e5fe2f2a99aa3783f98d5d7e07ab5e8d8b1b4848218c5e565e6b3b1fda61ed31c69817683cf71f5e5a53b78c2a7627a1957e26b0ca29f"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) 00:48:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x4004662b, &(0x7f0000000100)={0x2, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, 0x0, 0xffff) openat$cgroup_ro(r0, &(0x7f000001b600)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 2898.357886][ T5462] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow 00:48:27 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x248, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b0, 0xffffffff, 0xffffffff, 0x1b0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0, 0x600}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}, {{@ip={@local, @loopback, 0x0, 0x0, 'bridge0\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0xe0}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "1e861eeb08ba48e6ee4e5fe2f2a99aa3783f98d5d7e07ab5e8d8b1b4848218c5e565e6b3b1fda61ed31c69817683cf71f5e5a53b78c2a7627a1957e26b0ca29f"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ps_root_recvmsgcb: failed to send message to pid 5425: Connection refused ps_root_recvmsgcb: failed to send message to pid 5427: Connection refused ps_root_recvmsgcb: failed to send message to pid 5429: Connection refused ps_root_recvmsgcb: failed to send message to pid 5430: Connection refused 00:48:35 executing program 0: pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) close(r0) close(r1) 00:48:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 00:48:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000640)=0x6, 0x4) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000000640)=0x6, 0x4) 00:48:37 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f00000001c0)={{0x12, 0x1, 0x0, 0xc3, 0xef, 0x4d, 0x8, 0x5ac, 0x273, 0xf388, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x68, 0x2}}]}}]}}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f00000000c0)="e2", 0x1}], 0x1) syz_usb_connect$cdc_ecm(0x0, 0x7f, &(0x7f0000000200)=ANY=[@ANYBLOB="12010102020000202505a1a440000102030109026d00010106007f09040081030206000106240600008d0524000300fe230f0107000000040001000905240102071524120300a317a88b045e4f01a607c0ffcb7e392a05241506000524157f0006241a01001507240a30e402d0090582024000faaf07090503020002070681"], &(0x7f00000002c0)={0xa, &(0x7f0000000000)={0xa, 0x6, 0x300, 0x2, 0xd4, 0x3, 0x20}, 0x18c, &(0x7f00000003c0)={0x5, 0xf, 0x18c, 0x4, [@generic={0x92, 0x10, 0x2, "2801be4c413962c6f2c43f633eafbeba355befe5f6786a4c9f53832ce219fb31cb373a3e9403499f2cbb19f193c3328b77c01ac9825154430a2824d0c201b60a6ffd43a206fb8348c5af2a3bd0383e901befc942eaf78fd7a4c6bac4d8141ae38a74eda136ab6c096e3086e652abb053dde1708c31366eefc709e0538de846202a5eeadc6928f67072886a9e289335"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "2595d17dcece79fa95554b480a99da8f"}, @ss_container_id={0x14, 0x10, 0x4, 0x54, "99d0e6811c633caa179ddf61c94dd219"}, @generic={0xcd, 0x10, 0xa, "fde8d0889cb5e1de221db51c0704d794e474666e637b282a4d1cb63a2a56012a8b075f7bf32c902a6e9f65a1f4b1e848f0e9d35c15a744fd20b42fe778c1d5c61c5fc1ab1df15ece72b8ec63a86f6c463acfdc9dbd1b471c39867c05af0e56929ee95966c637d5bd44499dd37cac6b66043d87665cea2f523d04f39d9d27c0c6827e141c778f34e3b97aeb2998fdf6a677d7c618305cfac0055252dbe945e3f527c8e391fcb015192cf2bfaa33654ff003dbd94b7f1a38320f077aafbdb3847b4abef3a8379cc72f2a9c"}]}, 0x3, [{0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x1809}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0xc47}}, {0xc6, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]}]}) fallocate(r0, 0x0, 0x0, 0x8800000) 00:48:39 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x4000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) [ 2907.416368][ T5469] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 2921.830761][ T5482] [ 2921.832093][ T5482] ====================================================== [ 2921.832765][ T5482] WARNING: possible circular locking dependency detected [ 2921.833655][ T5482] 6.2.0-rc1-syzkaller #0 Tainted: G W [ 2921.834610][ T5482] ------------------------------------------------------ [ 2921.835313][ T5482] syz-executor.0/5482 is trying to acquire lock: [ 2921.836170][ T5482] ff6000000f45a170 (&journal->j_barrier){+.+.}-{3:3}, at: jbd2_journal_lock_updates+0x154/0x28a [ 2921.840995][ T5482] [ 2921.840995][ T5482] but task is already holding lock: [ 2921.841986][ T5482] ff6000000f458b98 (&sbi->s_writepages_rwsem){++++}-{0:0}, at: ext4_change_inode_journal_flag+0x10e/0x342 [ 2921.844433][ T5482] [ 2921.844433][ T5482] which lock already depends on the new lock. [ 2921.844433][ T5482] [ 2921.845493][ T5482] [ 2921.845493][ T5482] the existing dependency chain (in reverse order) is: [ 2921.846497][ T5482] [ 2921.846497][ T5482] -> #3 (&sbi->s_writepages_rwsem){++++}-{0:0}: [ 2921.848018][ T5482] lock_acquire.part.0+0x1d0/0x424 [ 2921.849197][ T5482] lock_acquire+0x54/0x6a [ 2921.850240][ T5482] percpu_down_write+0x4e/0x1d4 [ 2921.851199][ T5482] ext4_ind_migrate+0x122/0x424 [ 2921.852098][ T5482] ext4_fileattr_set+0xe86/0xfda [ 2921.852805][ T5482] vfs_fileattr_set+0x480/0x616 [ 2921.853934][ T5482] do_vfs_ioctl+0x854/0x151c [ 2921.854711][ T5482] sys_ioctl+0xc4/0x14c [ 2921.855793][ T5482] ret_from_syscall+0x0/0x2 [ 2921.857089][ T5482] [ 2921.857089][ T5482] -> #2 (&sb->s_type->i_mutex_key#8){++++}-{3:3}: [ 2921.860455][ T5482] lock_acquire.part.0+0x1d0/0x424 [ 2921.861815][ T5482] lock_acquire+0x54/0x6a [ 2921.862936][ T5482] down_read+0x3c/0x54 [ 2921.864251][ T5482] ext4_bmap+0x40/0x250 [ 2921.865421][ T5482] bmap+0x5a/0x84 [ 2921.866759][ T5482] jbd2_journal_bmap+0xb4/0x18c [ 2921.868311][ T5482] jbd2_journal_flush+0x5f6/0x800 [ 2921.869735][ T5482] __ext4_ioctl+0x2542/0x3330 [ 2921.870980][ T5482] ext4_ioctl+0x26/0x34 [ 2921.872011][ T5482] sys_ioctl+0x112/0x14c [ 2921.873497][ T5482] ret_from_syscall+0x0/0x2 [ 2921.874632][ T5482] [ 2921.874632][ T5482] -> #1 (&journal->j_checkpoint_mutex){+.+.}-{3:3}: [ 2921.876321][ T5482] lock_acquire.part.0+0x1d0/0x424 [ 2921.877369][ T5482] lock_acquire+0x54/0x6a [ 2921.878370][ T5482] mutex_lock_io_nested+0x120/0xa4e [ 2921.879522][ T5482] jbd2_journal_flush+0x158/0x800 [ 2921.880726][ T5482] __ext4_ioctl+0x2542/0x3330 [ 2921.881737][ T5482] ext4_ioctl+0x26/0x34 [ 2921.882714][ T5482] sys_ioctl+0x112/0x14c [ 2921.884145][ T5482] ret_from_syscall+0x0/0x2 [ 2921.885261][ T5482] [ 2921.885261][ T5482] -> #0 (&journal->j_barrier){+.+.}-{3:3}: [ 2921.887084][ T5482] check_noncircular+0x1de/0x1fe [ 2921.888833][ T5482] __lock_acquire+0x198a/0x347a [ 2921.890015][ T5482] lock_acquire.part.0+0x1d0/0x424 [ 2921.891162][ T5482] lock_acquire+0x54/0x6a [ 2921.892093][ T5482] __mutex_lock+0x114/0xb42 [ 2921.893088][ T5482] mutex_lock_nested+0x14/0x1c [ 2921.894566][ T5482] jbd2_journal_lock_updates+0x154/0x28a [ 2921.895783][ T5482] ext4_change_inode_journal_flag+0x114/0x342 [ 2921.897451][ T5482] ext4_fileattr_set+0xe60/0xfda [ 2921.899029][ T5482] vfs_fileattr_set+0x480/0x616 [ 2921.900723][ T5482] do_vfs_ioctl+0x854/0x151c [ 2921.902016][ T5482] sys_ioctl+0xc4/0x14c [ 2921.903517][ T5482] ret_from_syscall+0x0/0x2 [ 2921.904599][ T5482] [ 2921.904599][ T5482] other info that might help us debug this: [ 2921.904599][ T5482] [ 2921.905828][ T5482] Chain exists of: [ 2921.905828][ T5482] &journal->j_barrier --> &sb->s_type->i_mutex_key#8 --> &sbi->s_writepages_rwsem [ 2921.905828][ T5482] [ 2921.908848][ T5482] Possible unsafe locking scenario: [ 2921.908848][ T5482] [ 2921.909937][ T5482] CPU0 CPU1 [ 2921.910799][ T5482] ---- ---- [ 2921.911909][ T5482] lock(&sbi->s_writepages_rwsem); [ 2921.913122][ T5482] lock(&sb->s_type->i_mutex_key#8); [ 2921.914966][ T5482] lock(&sbi->s_writepages_rwsem); [ 2921.916270][ T5482] lock(&journal->j_barrier); [ 2921.917767][ T5482] [ 2921.917767][ T5482] *** DEADLOCK *** [ 2921.917767][ T5482] [ 2921.919053][ T5482] 4 locks held by syz-executor.0/5482: [ 2921.920331][ T5482] #0: ff6000000f3be460 (sb_writers#4){.+.+}-{0:0}, at: mnt_want_write_file+0x3c/0x136 [ 2921.923694][ T5482] #1: ff60000015fcac00 (&sb->s_type->i_mutex_key#8){++++}-{3:3}, at: vfs_fileattr_set+0x10c/0x616 [ 2921.927200][ T5482] #2: ff60000015fcada0 (mapping.invalidate_lock){++++}-{3:3}, at: ext4_change_inode_journal_flag+0xc6/0x342 [ 2921.930947][ T5482] #3: ff6000000f458b98 (&sbi->s_writepages_rwsem){++++}-{0:0}, at: ext4_change_inode_journal_flag+0x10e/0x342 [ 2921.934337][ T5482] [ 2921.934337][ T5482] stack backtrace: [ 2921.935582][ T5482] CPU: 0 PID: 5482 Comm: syz-executor.0 Tainted: G W 6.2.0-rc1-syzkaller #0 [ 2921.936962][ T5482] Hardware name: riscv-virtio,qemu (DT) [ 2921.937971][ T5482] Call Trace: [ 2921.939107][ T5482] [] dump_backtrace+0x2e/0x3c [ 2921.940359][ T5482] [] show_stack+0x34/0x40 [ 2921.941552][ T5482] [] dump_stack_lvl+0xe0/0x14c [ 2921.942834][ T5482] [] dump_stack+0x1c/0x24 [ 2921.944363][ T5482] [] print_circular_bug+0x370/0x3fa [ 2921.945696][ T5482] [] check_noncircular+0x1de/0x1fe [ 2921.946982][ T5482] [] __lock_acquire+0x198a/0x347a [ 2921.948316][ T5482] [] lock_acquire.part.0+0x1d0/0x424 [ 2921.950030][ T5482] [] lock_acquire+0x54/0x6a [ 2921.951366][ T5482] [] __mutex_lock+0x114/0xb42 [ 2921.952551][ T5482] [] mutex_lock_nested+0x14/0x1c [ 2921.953740][ T5482] [] jbd2_journal_lock_updates+0x154/0x28a [ 2921.955378][ T5482] [] ext4_change_inode_journal_flag+0x114/0x342 [ 2921.956743][ T5482] [] ext4_fileattr_set+0xe60/0xfda [ 2921.957877][ T5482] [] vfs_fileattr_set+0x480/0x616 [ 2921.959172][ T5482] [] do_vfs_ioctl+0x854/0x151c [ 2921.960346][ T5482] [] sys_ioctl+0xc4/0x14c [ 2921.961553][ T5482] [] ret_from_syscall+0x0/0x2 00:48:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv4_newroute={0x1c, 0x2c, 0x1}, 0x1c}}, 0x0) 00:48:42 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x4000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) 00:48:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv4_newroute={0x1c, 0x2c, 0x1}, 0x1c}}, 0x0) 00:48:43 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x4000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) 00:48:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv4_newroute={0x1c, 0x2c, 0x1}, 0x1c}}, 0x0) 00:48:44 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x4000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) 00:48:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv4_newroute={0x1c, 0x2c, 0x1}, 0x1c}}, 0x0) 00:48:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv4_newroute={0x1c, 0x2c, 0x1}, 0x1c}}, 0x0) 00:48:46 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x4000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) 00:48:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv4_newroute={0x1c, 0x2c, 0x1}, 0x1c}}, 0x0) 00:48:48 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x4000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) 00:48:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv4_newroute={0x1c, 0x2c, 0x1}, 0x1c}}, 0x0) 00:48:49 executing program 0: setuid(0xee00) setresgid(0x0, 0xffffffffffffffff, 0x0) 00:48:49 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x4000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) 00:48:50 executing program 0: setuid(0xee00) setresgid(0x0, 0xffffffffffffffff, 0x0) 00:48:51 executing program 1: setuid(0xee00) setresgid(0x0, 0xffffffffffffffff, 0x0) 00:48:51 executing program 0: setuid(0xee00) setresgid(0x0, 0xffffffffffffffff, 0x0) 00:48:51 executing program 1: setuid(0xee00) setresgid(0x0, 0xffffffffffffffff, 0x0) 00:48:52 executing program 0: setuid(0xee00) setresgid(0x0, 0xffffffffffffffff, 0x0) 00:48:52 executing program 1: setuid(0xee00) setresgid(0x0, 0xffffffffffffffff, 0x0) 00:48:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000800), 0x1, 0x74e, &(0x7f0000000840)="$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") 00:48:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:48:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:48:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:48:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000800), 0x1, 0x74e, &(0x7f0000000840)="$eJzs3V1rHNUfB/DfzG4e2qZN+uePWG8MCFqobtNWbfEq9UKweFHQG8GLhnRb2m4fSCKYUDB9Bwq+AMULL3wJFiyIiAqCIlTfglKkKBW8icxkN1mSnSSGzQ46nw/M5pw5m5zzzZCcmZ1lTwCVNZk9pBFHIuJCEjHe3p9ExFBeqkdMrz7v0cPbs38+vD2bxMrK678l+XOyfdH1PZkD7cpoRPzwchL/q23ud35x6dpMq9Wca9ePL1y/dXx+cem5K9dnLjcvN2+cfv6FqVOnz5x5sX9ZJ368+tn7f50d/vzVo199f/fgh0lMx1i7rTtHv0zG5NrvpFs9Il7pd2clqbXzdOdM6iUOiH8k7TqGj8V41GL94I3Hl/dLHRwAsCdWahErAEDFJOZ/AKiYzusAjx7enu1s5b4iMVgPzkZ+o3Jz/npM519H8/ug+39Povu2VhIRE33ofzIipo+d/zXbYo/uQ25l+U5EPN4rf5Lnn8jv4m7OX4uIqT70P7mh/m/KP92H/svOD0A13Tu7OpFtnv/StfOf6DH/jfaYu3aj7Pmv+PxvPX+t4Pzv/A77ePOLc1eL2rrP/7It679zLjgID+5EPFEvPv/J8icF+S/ssI9Phz/+pKit7PwrH0U83fP6Z/0dbcmW7088fulKqzm1+ti7j0eHnn2rqP+y82fHf39B/u2O/60d9vHtd/ffLWrbPn/6y3DyRl4abu95Z2ZhYe5ExHDy2ub9J7ceS+c5nZ+R5T/61NZ//73yZ9eEyzvM/825r9/bff69leW/uMvjXxhqg/rdiaWitrLzAwAAAAAAAAAAAAAAAAAAAAAAAMAgpBExFknaWCunaaOxuob3/2N/2ro5v3Ds0s23b1yMfK3siRhKOx91Ob5aT7L6ifbn4XfqJzfUT0XE4Yj4YGRfXm/M3mxdLDs8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALQd2LD+/x8jq+v/AwD/caNlDwAAGDjzPwBUj/kfAKrH/A8A1WP+B4DqMf8DQPWY/wEAAAAAAAAAAAAAAAAAAAAAYKAOP3nv5yQill/al2+Z4XbbUKkjA/ZaWvYAgNLUyh4AUJp62QMASuMaH0i2aS/8iPBlVxAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFTHM0es/w9VZf1/qC6rd0J1Wf8fqss1PmD9fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2N5YviVpo70W+FikaaMRcTAiJmIouXSl1ZyKiEMR8dPI0EhWP1H2oAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgz+YXl67NtFrNOQUFBYW1Qtn/mQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGDw1hf9LnskAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAlGl+cenaTKvVnNvDQtkZAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPrp7wAAAP//2sgL+w==") 00:48:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:48:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:48:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:48:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:48:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000800), 0x1, 0x74e, &(0x7f0000000840)="$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") 00:48:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:48:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:49:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f0000000800), 0x1, 0x74e, &(0x7f0000000840)="$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") 00:49:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:49:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet(r1, 0x0, 0xd, 0x0, 0x0, 0x0) 00:49:02 executing program 0: r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x2, 0x0, @fd_index=0x4, 0xfffffffffffffffa}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x7, 0x0, 0xff09) 00:49:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet(r1, 0x0, 0xd, 0x0, 0x0, 0x0) 00:49:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet(r1, 0x0, 0xd, 0x0, 0x0, 0x0) 00:49:03 executing program 0: r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x2, 0x0, @fd_index=0x4, 0xfffffffffffffffa}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x7, 0x0, 0xff09) 00:49:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet(r1, 0x0, 0xd, 0x0, 0x0, 0x0) 00:49:04 executing program 0: r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x2, 0x0, @fd_index=0x4, 0xfffffffffffffffa}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x7, 0x0, 0xff09) 00:49:04 executing program 1: r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x2, 0x0, @fd_index=0x4, 0xfffffffffffffffa}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x7, 0x0, 0xff09) 00:49:05 executing program 0: r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x2, 0x0, @fd_index=0x4, 0xfffffffffffffffa}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x7, 0x0, 0xff09) 00:49:05 executing program 1: r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x2, 0x0, @fd_index=0x4, 0xfffffffffffffffa}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x7, 0x0, 0xff09) 00:49:06 executing program 0: r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x2, 0x0, @fd_index=0x4, 0xfffffffffffffffa}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x7, 0x0, 0xff09) 00:49:06 executing program 1: r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x2, 0x0, @fd_index=0x4, 0xfffffffffffffffa}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x7, 0x0, 0xff09) 00:49:08 executing program 0: r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x2, 0x0, @fd_index=0x4, 0xfffffffffffffffa}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x7, 0x0, 0xff09) 00:49:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet(r1, 0x0, 0xd, 0x0, 0x0, 0x0) 00:49:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet(r1, 0x0, 0xd, 0x0, 0x0, 0x0) 00:49:09 executing program 0: r0 = syz_io_uring_setup(0x76a9, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000080)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x2, 0x0, @fd_index=0x4, 0xfffffffffffffffa}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x7, 0x0, 0xff09) 00:49:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet(r1, 0x0, 0xd, 0x0, 0x0, 0x0) 00:49:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xc000, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet(r1, 0x0, 0xd, 0x0, 0x0, 0x0) VM DIAGNOSIS: 17:58:12 Registers: info registers vcpu 0 pc ffffffff804ebcda mhartid 0000000000000000 mstatus 00000000000000a0 mip 00000000000000a0 mie 000000000000022a mideleg 0000000000000222 medeleg 000000000000b109 mtvec 0000000080000540 stvec ffffffff80005e88 mepc ffffffff804ecc0e sepc ffffffff83454114 mcause 8000000000000003 scause 8000000000000005 mtval 0000000000000000 stval 0000000000000000 x0/zero 0000000000000000 x1/ra ffffffff80ee1802 x2/sp ff200000023d6b10 x3/gp ffffffff85efe540 x4/tp ff6000000e5f9880 x5/t0 3030303030366666 x6/t1 00000000000f0000 x7/t2 3030303030303666 x8/s0 ff200000023d6b40 x9/s1 ffffffff87df8760 x10/a0 ff6000000e5f98a0 x11/a1 ff20000000259000 x12/a2 1ffffffff0fbf0f5 x13/a3 ffffffff80ee17ec x14/a4 0000000000000000 x15/a5 ffffffff87df87a8 x16/a6 ffffffff87df8851 x17/a7 0000000000000003 x18/s2 ff6000000e5f9880 x19/s3 0000000000000065 x20/s4 ffffffff87df8760 x21/s5 ffffffff80ee17ac x22/s6 0000000000000000 x23/s7 ffffffff87bb83b5 x24/s8 ffffffff87df87b8 x25/s9 0000000000000010 x26/s10 0000000000000010 x27/s11 0000000000000001 x28/t3 ffffffff87bb8357 x29/t4 fffffffef0fbf0ec x30/t5 fffffffef0fbf0ed x31/t6 ffffffff87bb8357 f0/ft0 0000000000000000 f1/ft1 0000000000000000 f2/ft2 0000000000000000 f3/ft3 0000000000000000 f4/ft4 0000000000000000 f5/ft5 0000000000000000 f6/ft6 0000000000000000 f7/ft7 0000000000000000 f8/fs0 0000000000000000 f9/fs1 0000000000000000 f10/fa0 0000000000000000 f11/fa1 0000000000000000 f12/fa2 0000000000000000 f13/fa3 0000000000000000 f14/fa4 0000000000000000 f15/fa5 0000000000000000 f16/fa6 0000000000000000 f17/fa7 0000000000000000 f18/fs2 0000000000000000 f19/fs3 0000000000000000 f20/fs4 0000000000000000 f21/fs5 0000000000000000 f22/fs6 0000000000000000 f23/fs7 0000000000000000 f24/fs8 0000000000000000 f25/fs9 0000000000000000 f26/fs10 0000000000000000 f27/fs11 0000000000000000 f28/ft8 0000000000000000 f29/ft9 0000000000000000 f30/ft10 0000000000000000 f31/ft11 0000000000000000 info registers vcpu 1 pc ffffffff8022d184 mhartid 0000000000000001 mstatus 00000000000001a0 mip 00000000000000a0 mie 000000000000022a mideleg 0000000000000222 medeleg 000000000000b109 mtvec 0000000080000540 stvec ffffffff80005e88 mepc ffffffff80434cfc sepc ffffffff80434cfc mcause 8000000000000007 scause 8000000000000005 mtval 0000000000000000 stval 0000000000000000 x0/zero 0000000000000000 x1/ra ffffffff83444d16 x2/sp ff200000021d7560 x3/gp ffffffff85efe540 x4/tp ff60000012799880 x5/t0 0000000000046000 x6/t1 00000000000f0000 x7/t2 00ffffffc994d197 x8/s0 ff200000021d7570 x9/s1 ff6000000822b800 x10/a0 0000000000000005 x11/a1 00000000000f0000 x12/a2 ffffffff824e9c62 x13/a3 0000000000000000 x14/a4 ff60000012799880 x15/a5 0000000000000000 x16/a6 0000000000000000 x17/a7 0000000000010001 x18/s2 ffffffff83852f00 x19/s3 ff6000000823f200 x20/s4 ff60000012799880 x21/s5 ffffffff87c080e8 x22/s6 0000000000000005 x23/s7 ffffffff8540a720 x24/s8 ffffffff824e9c4e x25/s9 ff200000021d7ba0 x26/s10 ff200000021d78e0 x27/s11 0000000000000000 x28/t3 000000007fffffff x29/t4 ffebffff0b53e294 x30/t5 ffebffff0b53e295 x31/t6 0000000000040000 f0/ft0 0000000000000000 f1/ft1 0000000000000000 f2/ft2 0000000000000000 f3/ft3 0000000000000000 f4/ft4 0000000000000000 f5/ft5 0000000000000000 f6/ft6 0000000000000000 f7/ft7 0000000000000000 f8/fs0 0000000000000000 f9/fs1 0000000000000000 f10/fa0 0000000000000000 f11/fa1 0000000000000000 f12/fa2 0000000000000000 f13/fa3 0000000000000000 f14/fa4 0000000000000000 f15/fa5 0000000000000000 f16/fa6 0000000000000000 f17/fa7 0000000000000000 f18/fs2 0000000000000000 f19/fs3 0000000000000000 f20/fs4 0000000000000000 f21/fs5 0000000000000000 f22/fs6 0000000000000000 f23/fs7 0000000000000000 f24/fs8 0000000000000000 f25/fs9 0000000000000000 f26/fs10 0000000000000000 f27/fs11 0000000000000000 f28/ft8 0000000000000000 f29/ft9 0000000000000000 f30/ft10 0000000000000000 f31/ft11 0000000000000000