Warning: Permanently added '10.128.1.61' (ED25519) to the list of known hosts. 2023/08/19 12:54:47 fuzzer started 2023/08/19 12:54:47 dialing manager at 10.128.0.163:30015 [ 21.949589][ T26] audit: type=1400 audit(1692449688.163:81): avc: denied { mounton } for pid=3065 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.950602][ T3065] cgroup: Unknown subsys name 'net' [ 21.972467][ T26] audit: type=1400 audit(1692449688.163:82): avc: denied { mount } for pid=3065 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.000263][ T26] audit: type=1400 audit(1692449688.183:83): avc: denied { unmount } for pid=3065 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.020701][ T26] audit: type=1400 audit(1692449688.193:84): avc: denied { read } for pid=2749 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 22.160522][ T3065] cgroup: Unknown subsys name 'rlimit' [ 22.310544][ T26] audit: type=1400 audit(1692449688.523:85): avc: denied { mounton } for pid=3065 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.336853][ T26] audit: type=1400 audit(1692449688.523:86): avc: denied { mount } for pid=3065 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.361415][ T26] audit: type=1400 audit(1692449688.523:87): avc: denied { create } for pid=3065 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.364734][ T3066] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.381880][ T26] audit: type=1400 audit(1692449688.523:88): avc: denied { write } for pid=3065 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.410817][ T26] audit: type=1400 audit(1692449688.523:89): avc: denied { read } for pid=3065 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.413886][ T3065] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2023/08/19 12:54:48 syscalls: 2856 2023/08/19 12:54:48 code coverage: enabled 2023/08/19 12:54:48 comparison tracing: enabled 2023/08/19 12:54:48 extra coverage: enabled 2023/08/19 12:54:48 delay kcov mmap: enabled 2023/08/19 12:54:48 setuid sandbox: enabled 2023/08/19 12:54:48 namespace sandbox: enabled 2023/08/19 12:54:48 Android sandbox: enabled 2023/08/19 12:54:48 fault injection: enabled 2023/08/19 12:54:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/08/19 12:54:48 net packet injection: enabled 2023/08/19 12:54:48 net device setup: enabled 2023/08/19 12:54:48 concurrency sanitizer: enabled 2023/08/19 12:54:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/08/19 12:54:48 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/08/19 12:54:48 USB emulation: /dev/raw-gadget does not exist 2023/08/19 12:54:48 hci packet injection: /dev/vhci does not exist 2023/08/19 12:54:48 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2023/08/19 12:54:48 802.15.4 emulation: enabled 2023/08/19 12:54:48 swap file: enabled 2023/08/19 12:54:48 suppressing KCSAN reports in functions: 'd_delete' 'generic_write_end' 'xas_clear_mark' 'generic_fillattr' 'exit_mm' 2023/08/19 12:54:48 fetching corpus: 0, signal 0/2000 (executing program) [ 22.431407][ T26] audit: type=1400 audit(1692449688.603:90): avc: denied { relabelto } for pid=3066 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2023/08/19 12:54:48 fetching corpus: 49, signal 16493/19960 (executing program) 2023/08/19 12:54:48 fetching corpus: 99, signal 24294/29076 (executing program) 2023/08/19 12:54:49 fetching corpus: 149, signal 31017/36899 (executing program) 2023/08/19 12:54:49 fetching corpus: 199, signal 37967/44713 (executing program) 2023/08/19 12:54:49 fetching corpus: 249, signal 42025/49663 (executing program) 2023/08/19 12:54:49 fetching corpus: 299, signal 45097/53655 (executing program) 2023/08/19 12:54:49 fetching corpus: 349, signal 48882/58151 (executing program) 2023/08/19 12:54:49 fetching corpus: 399, signal 52286/62136 (executing program) 2023/08/19 12:54:49 fetching corpus: 448, signal 56850/67048 (executing program) 2023/08/19 12:54:49 fetching corpus: 498, signal 59928/70540 (executing program) 2023/08/19 12:54:49 fetching corpus: 548, signal 62765/73759 (executing program) 2023/08/19 12:54:50 fetching corpus: 598, signal 64867/76324 (executing program) 2023/08/19 12:54:50 fetching corpus: 648, signal 67501/79235 (executing program) 2023/08/19 12:54:50 fetching corpus: 698, signal 70722/82510 (executing program) 2023/08/19 12:54:50 fetching corpus: 748, signal 72661/84731 (executing program) 2023/08/19 12:54:50 fetching corpus: 798, signal 73879/86393 (executing program) 2023/08/19 12:54:50 fetching corpus: 847, signal 75804/88471 (executing program) 2023/08/19 12:54:50 fetching corpus: 897, signal 77255/90163 (executing program) 2023/08/19 12:54:50 fetching corpus: 947, signal 78892/91930 (executing program) 2023/08/19 12:54:50 fetching corpus: 997, signal 80731/93747 (executing program) 2023/08/19 12:54:50 fetching corpus: 1045, signal 82033/95229 (executing program) 2023/08/19 12:54:50 fetching corpus: 1093, signal 83829/96958 (executing program) 2023/08/19 12:54:51 fetching corpus: 1143, signal 85422/98480 (executing program) 2023/08/19 12:54:51 fetching corpus: 1190, signal 86557/99692 (executing program) 2023/08/19 12:54:51 fetching corpus: 1237, signal 87784/100911 (executing program) 2023/08/19 12:54:51 fetching corpus: 1287, signal 89086/102146 (executing program) 2023/08/19 12:54:51 fetching corpus: 1336, signal 90453/103363 (executing program) 2023/08/19 12:54:51 fetching corpus: 1384, signal 91714/104507 (executing program) 2023/08/19 12:54:51 fetching corpus: 1432, signal 92976/105595 (executing program) 2023/08/19 12:54:51 fetching corpus: 1482, signal 94044/106503 (executing program) 2023/08/19 12:54:51 fetching corpus: 1531, signal 95270/107458 (executing program) 2023/08/19 12:54:52 fetching corpus: 1581, signal 96424/108341 (executing program) 2023/08/19 12:54:52 fetching corpus: 1631, signal 97566/109151 (executing program) 2023/08/19 12:54:52 fetching corpus: 1681, signal 98671/109937 (executing program) 2023/08/19 12:54:52 fetching corpus: 1729, signal 99587/110628 (executing program) 2023/08/19 12:54:52 fetching corpus: 1779, signal 100638/111325 (executing program) 2023/08/19 12:54:52 fetching corpus: 1828, signal 102097/112098 (executing program) 2023/08/19 12:54:52 fetching corpus: 1877, signal 103202/112727 (executing program) 2023/08/19 12:54:52 fetching corpus: 1927, signal 103931/113184 (executing program) 2023/08/19 12:54:52 fetching corpus: 1977, signal 104971/113735 (executing program) 2023/08/19 12:54:53 fetching corpus: 2027, signal 105698/114155 (executing program) 2023/08/19 12:54:53 fetching corpus: 2075, signal 106903/114686 (executing program) 2023/08/19 12:54:53 fetching corpus: 2125, signal 107488/115020 (executing program) 2023/08/19 12:54:53 fetching corpus: 2175, signal 108418/115390 (executing program) 2023/08/19 12:54:53 fetching corpus: 2225, signal 109162/115727 (executing program) 2023/08/19 12:54:53 fetching corpus: 2273, signal 109920/116036 (executing program) 2023/08/19 12:54:53 fetching corpus: 2322, signal 110783/116330 (executing program) 2023/08/19 12:54:53 fetching corpus: 2371, signal 111903/116640 (executing program) 2023/08/19 12:54:53 fetching corpus: 2421, signal 113065/116914 (executing program) 2023/08/19 12:54:53 fetching corpus: 2471, signal 113639/117067 (executing program) 2023/08/19 12:54:54 fetching corpus: 2520, signal 114384/117262 (executing program) 2023/08/19 12:54:54 fetching corpus: 2559, signal 115448/117465 (executing program) 2023/08/19 12:54:54 fetching corpus: 2561, signal 115560/117582 (executing program) 2023/08/19 12:54:54 fetching corpus: 2561, signal 115560/117622 (executing program) 2023/08/19 12:54:54 fetching corpus: 2561, signal 115560/117669 (executing program) 2023/08/19 12:54:54 fetching corpus: 2561, signal 115560/117704 (executing program) 2023/08/19 12:54:54 fetching corpus: 2561, signal 115560/117757 (executing program) 2023/08/19 12:54:54 fetching corpus: 2561, signal 115560/117790 (executing program) 2023/08/19 12:54:54 fetching corpus: 2561, signal 115560/117790 (executing program) 2023/08/19 12:54:55 starting 6 fuzzer processes 12:54:55 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000001300000000a5565526a60000000085000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x287b, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0xd, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0}, 0x20) 12:54:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:54:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xfe, 0x0, &(0x7f0000000000)) r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$bt_BT_SECURITY(r0, 0x111, 0x4, 0x0, 0x20000000) 12:54:55 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x800, 0xf052, 0x838, 0x9, 0x1}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) 12:54:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0x90) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x2) 12:54:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x46, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000200)=""/130}, 0x20) [ 29.683600][ T3059] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=3059 'syz-fuzzer' [ 29.782778][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 29.782788][ T26] audit: type=1400 audit(1692449695.993:94): avc: denied { execmem } for pid=3071 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 29.895351][ T26] audit: type=1400 audit(1692449696.103:95): avc: denied { read } for pid=3081 comm="syz-executor.2" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 29.916848][ T26] audit: type=1400 audit(1692449696.103:96): avc: denied { open } for pid=3081 comm="syz-executor.2" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 29.940594][ T26] audit: type=1400 audit(1692449696.103:97): avc: denied { mounton } for pid=3081 comm="syz-executor.2" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 30.035835][ T26] audit: type=1400 audit(1692449696.103:98): avc: denied { module_request } for pid=3081 comm="syz-executor.2" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 30.057773][ T26] audit: type=1400 audit(1692449696.113:99): avc: denied { sys_module } for pid=3081 comm="syz-executor.2" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 30.168919][ T3081] chnl_net:caif_netlink_parms(): no params data found [ 30.183170][ T3082] chnl_net:caif_netlink_parms(): no params data found [ 30.310261][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.317339][ T3081] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.324609][ T3081] bridge_slave_0: entered allmulticast mode [ 30.330968][ T3081] bridge_slave_0: entered promiscuous mode [ 30.341253][ T3082] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.348483][ T3082] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.355642][ T3082] bridge_slave_0: entered allmulticast mode [ 30.361997][ T3082] bridge_slave_0: entered promiscuous mode [ 30.372469][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.379668][ T3081] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.386826][ T3081] bridge_slave_1: entered allmulticast mode [ 30.393369][ T3081] bridge_slave_1: entered promiscuous mode [ 30.404211][ T3082] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.411460][ T3082] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.418806][ T3082] bridge_slave_1: entered allmulticast mode [ 30.425129][ T3082] bridge_slave_1: entered promiscuous mode [ 30.478180][ T3081] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.492321][ T3082] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.503148][ T3082] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.523158][ T3081] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.571572][ T3082] team0: Port device team_slave_0 added [ 30.586817][ T3081] team0: Port device team_slave_0 added [ 30.595045][ T3085] chnl_net:caif_netlink_parms(): no params data found [ 30.605339][ T3082] team0: Port device team_slave_1 added [ 30.615643][ T3083] chnl_net:caif_netlink_parms(): no params data found [ 30.630468][ T3081] team0: Port device team_slave_1 added [ 30.651194][ T3097] chnl_net:caif_netlink_parms(): no params data found [ 30.671881][ T3082] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.679025][ T3082] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.705446][ T3082] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.724084][ T3108] chnl_net:caif_netlink_parms(): no params data found [ 30.743034][ T3081] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.750190][ T3081] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.776368][ T3081] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.787311][ T3082] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.794289][ T3082] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.794699][ T26] audit: type=1400 audit(1692449697.003:100): avc: denied { append } for pid=2749 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 30.820392][ T3082] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.835536][ T3081] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.842671][ T26] audit: type=1400 audit(1692449697.003:101): avc: denied { open } for pid=2749 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 30.853163][ T3081] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.860294][ T26] audit: type=1400 audit(1692449697.003:102): avc: denied { getattr } for pid=2749 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 30.932713][ T3081] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.984817][ T3097] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.992084][ T3097] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.999414][ T3097] bridge_slave_0: entered allmulticast mode [ 31.005793][ T3097] bridge_slave_0: entered promiscuous mode [ 31.031892][ T3083] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.039030][ T3083] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.046139][ T3083] bridge_slave_0: entered allmulticast mode [ 31.052649][ T3083] bridge_slave_0: entered promiscuous mode [ 31.060005][ T3097] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.067123][ T3097] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.074689][ T3097] bridge_slave_1: entered allmulticast mode [ 31.081101][ T3097] bridge_slave_1: entered promiscuous mode [ 31.091506][ T3085] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.098731][ T3085] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.106284][ T3085] bridge_slave_0: entered allmulticast mode [ 31.112665][ T3085] bridge_slave_0: entered promiscuous mode [ 31.121059][ T3082] hsr_slave_0: entered promiscuous mode [ 31.127057][ T3082] hsr_slave_1: entered promiscuous mode [ 31.135503][ T3083] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.143319][ T3083] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.151404][ T3083] bridge_slave_1: entered allmulticast mode [ 31.157941][ T3083] bridge_slave_1: entered promiscuous mode [ 31.173885][ T3081] hsr_slave_0: entered promiscuous mode [ 31.180038][ T3081] hsr_slave_1: entered promiscuous mode [ 31.186055][ T3081] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 31.195070][ T3081] Cannot create hsr debugfs directory [ 31.200873][ T3085] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.208120][ T3085] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.215938][ T3085] bridge_slave_1: entered allmulticast mode [ 31.222347][ T3085] bridge_slave_1: entered promiscuous mode [ 31.249716][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.272125][ T3083] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.283486][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.295633][ T3085] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.309824][ T3108] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.317132][ T3108] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.324288][ T3108] bridge_slave_0: entered allmulticast mode [ 31.330926][ T3108] bridge_slave_0: entered promiscuous mode [ 31.338387][ T3083] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.357831][ T3085] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.382516][ T3108] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.389642][ T3108] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.398341][ T3108] bridge_slave_1: entered allmulticast mode [ 31.405031][ T3108] bridge_slave_1: entered promiscuous mode [ 31.416579][ T3097] team0: Port device team_slave_0 added [ 31.443309][ T3083] team0: Port device team_slave_0 added [ 31.449778][ T3097] team0: Port device team_slave_1 added [ 31.456842][ T3085] team0: Port device team_slave_0 added [ 31.463409][ T3085] team0: Port device team_slave_1 added [ 31.481715][ T3083] team0: Port device team_slave_1 added [ 31.503392][ T3108] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.523213][ T3085] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.530290][ T3085] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.556529][ T3085] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.567694][ T3085] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.574683][ T3085] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.601666][ T3085] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.613439][ T3108] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.634531][ T3083] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.641506][ T3083] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.668897][ T3083] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.680402][ T3097] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.687534][ T3097] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.714141][ T3097] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.735105][ T3083] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.742094][ T3083] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.768143][ T3083] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.785578][ T3097] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.792564][ T3097] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.818840][ T3097] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.832605][ T3108] team0: Port device team_slave_0 added [ 31.870566][ T3085] hsr_slave_0: entered promiscuous mode [ 31.880460][ T3085] hsr_slave_1: entered promiscuous mode [ 31.886619][ T3085] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 31.894377][ T3085] Cannot create hsr debugfs directory [ 31.906101][ T3108] team0: Port device team_slave_1 added [ 31.931976][ T3082] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 31.942458][ T3083] hsr_slave_0: entered promiscuous mode [ 31.948392][ T3083] hsr_slave_1: entered promiscuous mode [ 31.954267][ T3083] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 31.961850][ T3083] Cannot create hsr debugfs directory [ 31.979917][ T3108] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.986903][ T3108] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.012988][ T3108] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.029000][ T3082] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 32.049213][ T3108] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.056202][ T3108] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.082830][ T3108] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.109103][ T3082] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 32.123416][ T3097] hsr_slave_0: entered promiscuous mode [ 32.129764][ T3097] hsr_slave_1: entered promiscuous mode [ 32.135507][ T3097] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.143780][ T26] audit: type=1400 audit(1692449698.353:103): avc: denied { remove_name } for pid=2749 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 32.150293][ T3097] Cannot create hsr debugfs directory [ 32.173267][ T3081] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 32.184845][ T3082] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 32.201079][ T3081] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 32.222821][ T3081] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 32.252657][ T3108] hsr_slave_0: entered promiscuous mode [ 32.258532][ T3108] hsr_slave_1: entered promiscuous mode [ 32.264456][ T3108] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.272040][ T3108] Cannot create hsr debugfs directory [ 32.278410][ T3081] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 32.287607][ T3083] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 32.305762][ T3083] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 32.315092][ T3083] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 32.324530][ T3083] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 32.377331][ T3085] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 32.396732][ T3085] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 32.418298][ T3085] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 32.430011][ T3085] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 32.439483][ T3097] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 32.449946][ T3097] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 32.480236][ T3097] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 32.501373][ T3108] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 32.511382][ T3081] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.518451][ T3097] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 32.539734][ T3108] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 32.551536][ T3108] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 32.565056][ T3108] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 32.592157][ T3081] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.601328][ T3082] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.622096][ T3085] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.632666][ T3182] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.640457][ T3182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.660911][ T3182] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.668074][ T3182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.700177][ T3108] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.713842][ T3085] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.726917][ T3182] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.734021][ T3182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.744100][ T3082] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.754415][ T3083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.769891][ T3081] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 32.780428][ T3081] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.797800][ T3108] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.815060][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.826431][ T3180] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.833626][ T3180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.843051][ T3180] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.850111][ T3180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.867162][ T3085] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 32.877598][ T3085] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.906170][ T3083] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.917091][ T3097] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.930877][ T3182] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.938120][ T3182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.947523][ T3182] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.954828][ T3182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.964726][ T3182] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.971869][ T3182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.001461][ T3082] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 33.012145][ T3082] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.031504][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.038651][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.052610][ T3108] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 33.063017][ T3108] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.079089][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.086223][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.108333][ T3083] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 33.118757][ T3083] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.133429][ T3081] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.147341][ T3085] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.156440][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.163661][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.174952][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.182215][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.259643][ T3108] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.303591][ T3083] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.315782][ T3082] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.353485][ T3081] veth0_vlan: entered promiscuous mode [ 33.387772][ T3097] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.403092][ T3081] veth1_vlan: entered promiscuous mode [ 33.451252][ T3081] veth0_macvtap: entered promiscuous mode [ 33.477249][ T3085] veth0_vlan: entered promiscuous mode [ 33.498610][ T3081] veth1_macvtap: entered promiscuous mode [ 33.527098][ T3083] veth0_vlan: entered promiscuous mode [ 33.544138][ T3085] veth1_vlan: entered promiscuous mode [ 33.556435][ T3081] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.578628][ T3083] veth1_vlan: entered promiscuous mode [ 33.589742][ T3082] veth0_vlan: entered promiscuous mode [ 33.597368][ T3082] veth1_vlan: entered promiscuous mode [ 33.606327][ T3081] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.628165][ T3085] veth0_macvtap: entered promiscuous mode [ 33.635873][ T3081] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.644792][ T3081] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.653633][ T3081] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.662513][ T3081] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.682147][ T3108] veth0_vlan: entered promiscuous mode [ 33.689494][ T3085] veth1_macvtap: entered promiscuous mode [ 33.707860][ T3108] veth1_vlan: entered promiscuous mode [ 33.722571][ T3083] veth0_macvtap: entered promiscuous mode [ 33.736767][ T3108] veth0_macvtap: entered promiscuous mode [ 33.745117][ T3085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.755734][ T3085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.767196][ T3085] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.779235][ T3097] veth0_vlan: entered promiscuous mode [ 33.790275][ T3097] veth1_vlan: entered promiscuous mode [ 33.797328][ T3083] veth1_macvtap: entered promiscuous mode [ 33.818252][ T3082] veth0_macvtap: entered promiscuous mode [ 33.831753][ T3108] veth1_macvtap: entered promiscuous mode [ 33.843324][ T3085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.853885][ T3085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.865755][ T3085] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.876943][ T3085] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 12:55:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xfe, 0x0, &(0x7f0000000000)) r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$bt_BT_SECURITY(r0, 0x111, 0x4, 0x0, 0x20000000) 12:55:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xfe, 0x0, &(0x7f0000000000)) r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$bt_BT_SECURITY(r0, 0x111, 0x4, 0x0, 0x20000000) [ 33.885762][ T3085] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.894578][ T3085] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.903363][ T3085] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.918196][ T3097] veth0_macvtap: entered promiscuous mode [ 33.931613][ T3082] veth1_macvtap: entered promiscuous mode 12:55:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xfe, 0x0, &(0x7f0000000000)) r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$bt_BT_SECURITY(r0, 0x111, 0x4, 0x0, 0x20000000) 12:55:00 executing program 2: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000001000/0x4000)=nil) 12:55:00 executing program 2: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000001000/0x4000)=nil) [ 33.952223][ T3083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.963003][ T3083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.973088][ T3083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.984233][ T3083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 12:55:00 executing program 2: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000001000/0x4000)=nil) [ 33.996078][ T3083] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.004450][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.015507][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.025633][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.036260][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.046321][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.056915][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.067991][ T3108] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.078592][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.089316][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.099480][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.110535][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.121742][ T3108] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.130575][ T3097] veth1_macvtap: entered promiscuous mode [ 34.144211][ T3083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.154767][ T3083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.164628][ T3083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.175095][ T3083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.185136][ T3083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.195841][ T3083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.207239][ T3083] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.216239][ T3108] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.225026][ T3108] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.233851][ T3108] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.242793][ T3108] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.267701][ T3083] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.276437][ T3083] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.285199][ T3083] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.294067][ T3083] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.309312][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.320155][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.330630][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.341216][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.351161][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.361706][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.371606][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.382166][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.393129][ T3082] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.402262][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.412738][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.423025][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.433441][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.443236][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.453645][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.463470][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.473976][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.484928][ T3082] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.493951][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.504501][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.514500][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.524958][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.534885][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.545327][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.555133][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.565751][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.575682][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.586101][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.596877][ T3097] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.620603][ T3082] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.629542][ T3082] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.638388][ T3082] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.647224][ T3082] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.663560][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.674099][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.684026][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.694430][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.704307][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.714955][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.724779][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.735214][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.745043][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.755459][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.766603][ T3097] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.801940][ T3097] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.811058][ T3097] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.820023][ T3097] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.828906][ T3097] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.842772][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 34.842782][ T26] audit: type=1400 audit(1692449701.053:112): avc: denied { map_create } for pid=3277 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 34.872404][ T26] audit: type=1400 audit(1692449701.063:113): avc: denied { map_read } for pid=3277 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 34.892254][ T26] audit: type=1400 audit(1692449701.093:114): avc: denied { write } for pid=3278 comm="syz-executor.5" name="ip_tables_matches" dev="proc" ino=4026533109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 34.916536][ T26] audit: type=1400 audit(1692449701.093:115): avc: denied { mounton } for pid=3278 comm="syz-executor.5" path="/root/syzkaller-testdir2750091925/syzkaller.9Pgorz/0" dev="sda1" ino=1943 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 34.979070][ T3180] kernel write not supported for file /3278/net/ip_tables_matches (pid: 3180 comm: kworker/0:5) [ 35.022711][ T26] audit: type=1400 audit(1692449701.233:116): avc: denied { prog_load } for pid=3287 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 35.042376][ T26] audit: type=1400 audit(1692449701.233:117): avc: denied { bpf } for pid=3287 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 35.064042][ T26] audit: type=1400 audit(1692449701.233:118): avc: denied { perfmon } for pid=3287 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 12:55:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000001300000000a5565526a60000000085000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x287b, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0xd, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0}, 0x20) [ 35.101075][ T26] audit: type=1400 audit(1692449701.233:119): avc: denied { read write } for pid=3286 comm="syz-executor.3" name="rdma_cm" dev="devtmpfs" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 35.125129][ T26] audit: type=1400 audit(1692449701.233:120): avc: denied { open } for pid=3286 comm="syz-executor.3" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 35.152538][ T26] audit: type=1400 audit(1692449701.313:121): avc: denied { map_write } for pid=3290 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 12:55:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:55:01 executing program 2: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000001000/0x4000)=nil) 12:55:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x800, 0xf052, 0x838, 0x9, 0x1}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) 12:55:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0x90) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x2) 12:55:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x46, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000200)=""/130}, 0x20) 12:55:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000001300000000a5565526a60000000085000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x287b, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0xd, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0}, 0x20) 12:55:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x46, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000200)=""/130}, 0x20) 12:55:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:55:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x800, 0xf052, 0x838, 0x9, 0x1}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) 12:55:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0x90) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x2) 12:55:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000001300000000a5565526a60000000085000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x287b, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0xd, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0}, 0x20) 12:55:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x46, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000200)=""/130}, 0x20) 12:55:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:55:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:55:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x800, 0xf052, 0x838, 0x9, 0x1}, 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) 12:55:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:55:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0x90) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x2) 12:55:02 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000001300000000a5565526a60000000085000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x287b, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0xd, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0}, 0x20) 12:55:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:55:02 executing program 1: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000001000/0x4000)=nil) 12:55:02 executing program 1: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000001000/0x4000)=nil) 12:55:02 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000001300000000a5565526a60000000085000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x287b, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0xd, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0}, 0x20) 12:55:02 executing program 1: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000001000/0x4000)=nil) 12:55:02 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000001300000000a5565526a60000000085000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x287b, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0xd, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0}, 0x20) 12:55:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:55:03 executing program 1: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000001000/0x4000)=nil) 12:55:03 executing program 3: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) 12:55:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:55:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:55:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:55:03 executing program 1: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000001000/0x4000)=nil) 12:55:03 executing program 1: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000001000/0x4000)=nil) 12:55:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f00000001c0)=""/110, &(0x7f0000000100)=0x6e) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ffe7ffffffff1eff000000000000000000e300"/56, @ANYRES32=0x0, @ANYBLOB="0008000000000000002569ba29f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r3, 0x0, 0x21fd1ee9) 12:55:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f00000001c0)=""/110, &(0x7f0000000100)=0x6e) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ffe7ffffffff1eff000000000000000000e300"/56, @ANYRES32=0x0, @ANYBLOB="0008000000000000002569ba29f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r3, 0x0, 0x21fd1ee9) 12:55:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f00000001c0)=""/110, &(0x7f0000000100)=0x6e) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ffe7ffffffff1eff000000000000000000e300"/56, @ANYRES32=0x0, @ANYBLOB="0008000000000000002569ba29f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r3, 0x0, 0x21fd1ee9) 12:55:04 executing program 3: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) 12:55:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:55:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x22701, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x0, 0x0, "cd9fe0158bd38ac30bfd9e0ca5a21ad25ce691"}) 12:55:04 executing program 5: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) 12:55:04 executing program 2: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) [ 38.493110][ T3349] ================================================================== [ 38.501563][ T3349] BUG: KCSAN: data-race in process_one_work / process_one_work [ 38.509479][ T3349] [ 38.511807][ T3349] read-write to 0xffff888100066098 of 8 bytes by task 31 on cpu 0: [ 38.519708][ T3349] process_one_work+0x40d/0x860 [ 38.524562][ T3349] worker_thread+0x5f2/0xa10 [ 38.529153][ T3349] kthread+0x1d7/0x210 [ 38.533234][ T3349] ret_from_fork+0x2e/0x40 [ 38.537741][ T3349] ret_from_fork_asm+0x11/0x20 [ 38.542674][ T3349] [ 38.544990][ T3349] read-write to 0xffff888100066098 of 8 bytes by task 3349 on cpu 1: [ 38.553053][ T3349] process_one_work+0x40d/0x860 [ 38.558015][ T3349] worker_thread+0x5f2/0xa10 [ 38.562707][ T3349] kthread+0x1d7/0x210 [ 38.566787][ T3349] ret_from_fork+0x2e/0x40 [ 38.571223][ T3349] ret_from_fork_asm+0x11/0x20 [ 38.576164][ T3349] [ 38.578476][ T3349] value changed: 0x000000000000491c -> 0x000000000000491d [ 38.585590][ T3349] 12:55:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f00000001c0)=""/110, &(0x7f0000000100)=0x6e) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ffe7ffffffff1eff000000000000000000e300"/56, @ANYRES32=0x0, @ANYBLOB="0008000000000000002569ba29f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r3, 0x0, 0x21fd1ee9) [ 38.587907][ T3349] Reported by Kernel Concurrency Sanitizer on: [ 38.594042][ T3349] CPU: 1 PID: 3349 Comm: kworker/u4:8 Not tainted 6.5.0-rc6-syzkaller-00225-gaa9ea98cca3a #0 [ 38.604275][ T3349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 38.614347][ T3349] Workqueue: events_unbound flush_to_ldisc [ 38.620241][ T3349] ================================================================== 12:55:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f00000001c0)=""/110, &(0x7f0000000100)=0x6e) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ffe7ffffffff1eff000000000000000000e300"/56, @ANYRES32=0x0, @ANYBLOB="0008000000000000002569ba29f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r3, 0x0, 0x21fd1ee9) 12:55:05 executing program 3: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) 12:55:05 executing program 4: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x3, &(0x7f00000007c0)=@framed, &(0x7f0000000800)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f00000000c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r0}, 0x10) 12:55:05 executing program 5: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) 12:55:05 executing program 0: r0 = syz_io_uring_setup(0x589a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SYMLINKAT={0x26, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000020c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) 12:55:05 executing program 2: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) 12:55:05 executing program 4: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x3, &(0x7f00000007c0)=@framed, &(0x7f0000000800)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f00000000c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r0}, 0x10) 12:55:05 executing program 0: r0 = syz_io_uring_setup(0x589a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SYMLINKAT={0x26, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000020c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) 12:55:05 executing program 4: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x3, &(0x7f00000007c0)=@framed, &(0x7f0000000800)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f00000000c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r0}, 0x10) 12:55:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f00000001c0)=""/110, &(0x7f0000000100)=0x6e) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ffe7ffffffff1eff000000000000000000e300"/56, @ANYRES32=0x0, @ANYBLOB="0008000000000000002569ba29f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r3, 0x0, 0x21fd1ee9) 12:55:05 executing program 0: r0 = syz_io_uring_setup(0x589a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SYMLINKAT={0x26, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000020c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) 12:55:05 executing program 4: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x3, &(0x7f00000007c0)=@framed, &(0x7f0000000800)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f00000000c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r0}, 0x10) 12:55:05 executing program 4: r0 = syz_io_uring_setup(0x589a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SYMLINKAT={0x26, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000020c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) [ 39.571850][ T3435] syz-executor.1 (3435) used greatest stack depth: 11416 bytes left 12:55:06 executing program 3: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) 12:55:06 executing program 0: r0 = syz_io_uring_setup(0x589a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SYMLINKAT={0x26, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000020c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) 12:55:06 executing program 5: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) 12:55:06 executing program 4: r0 = syz_io_uring_setup(0x589a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SYMLINKAT={0x26, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000020c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) 12:55:06 executing program 2: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) 12:55:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f00000001c0)=""/110, &(0x7f0000000100)=0x6e) write$binfmt_script(r0, &(0x7f0000005880)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001300f5a1ab621a7c678e0000ffff01ffe7ffffffff1eff000000000000000000e300"/56, @ANYRES32=0x0, @ANYBLOB="0008000000000000002569ba29f64a9b080003000601"], 0x54}}, 0x0) sendfile(r4, r3, 0x0, 0x21fd1ee9) 12:55:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) 12:55:06 executing program 4: r0 = syz_io_uring_setup(0x589a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000006c0)=@IORING_OP_SYMLINKAT={0x26, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000020c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) 12:55:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) 12:55:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) [ 40.164588][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 40.164599][ T26] audit: type=1400 audit(1692449706.373:130): avc: denied { block_suspend } for pid=3449 comm="syz-executor.0" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 12:55:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) 12:55:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) 12:55:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) 12:55:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) 12:55:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) 12:55:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) 12:55:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) 12:55:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x35}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffcbc}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) 12:55:07 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) listen(r0, 0x4c4) sendmmsg(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="f5", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x10}}], 0x2, 0x0) 12:55:07 executing program 2: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x35}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffcbc}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) 12:55:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x35}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffcbc}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) [ 41.003609][ T26] audit: type=1400 audit(1692449707.213:131): avc: denied { ioctl } for pid=3487 comm="syz-executor.2" path="/dev/virtual_nci" dev="devtmpfs" ino=108 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.028725][ T26] audit: type=1400 audit(1692449707.213:132): avc: denied { create } for pid=3487 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 12:55:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) 12:55:07 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) listen(r0, 0x4c4) sendmmsg(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="f5", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x10}}], 0x2, 0x0) 12:55:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) 12:55:07 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) listen(r0, 0x4c4) sendmmsg(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="f5", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x10}}], 0x2, 0x0) [ 41.054077][ T26] audit: type=1400 audit(1692449707.263:133): avc: denied { write } for pid=3487 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.074878][ T26] audit: type=1400 audit(1692449707.263:134): avc: denied { read } for pid=3487 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 12:55:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x35}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffcbc}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) 12:55:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x35}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffcbc}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) 12:55:07 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) listen(r0, 0x4c4) sendmmsg(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="f5", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x10}}], 0x2, 0x0) 12:55:07 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) listen(r0, 0x4c4) sendmmsg(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="f5", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x10}}], 0x2, 0x0) 12:55:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = epoll_create(0x7) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x439b, &(0x7f0000002e00)) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000006880)={0x40000014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000480)={0x20000005}) 12:55:08 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c) 12:55:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x35}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffcbc}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) 12:55:08 executing program 0: r0 = socket$inet(0x2, 0x4000000805, 0x0) listen(r0, 0x4c4) sendmmsg(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="f5", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x10}}], 0x2, 0x0) 12:55:08 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) listen(r0, 0x4c4) sendmmsg(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="f5", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x10}}], 0x2, 0x0) 12:55:08 executing program 2: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@can_delroute={0x154, 0x19, 0x11, 0x0, 0x0, {}, [@CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "18feb80ad2196423"}, 0x5}}, @CGW_CS_XOR={0x8, 0x5, {0x0, 0x8}}, @CGW_CS_CRC8={0x11e, 0x6, {0xff, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "5da72c258f9c9cc49b14f28c24ef7b48f2aa42dd"}}]}, 0x154}}, 0x0) 12:55:08 executing program 5: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:08 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c) 12:55:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@can_delroute={0x154, 0x19, 0x11, 0x0, 0x0, {}, [@CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "18feb80ad2196423"}, 0x5}}, @CGW_CS_XOR={0x8, 0x5, {0x0, 0x8}}, @CGW_CS_CRC8={0x11e, 0x6, {0xff, 0x0, 0x0, 0x0, 0x0, "b6deadbea9007f3bf9f28786d26ca22f81cfc126cf019c5b0b5fd65e4d1d3a74c1ab8ea8e1fd1aa2f34d385352bc1549967258f1fda791c7b31571b39bff63cbce5086cad6b647bb8c2d98e312441aea85c2e22c24217c516573054e899bfc1eddc982634f290ec0f0d385f158bdb507f35c6e0e9c9770f3a0b35fd7212982f5e2f3fe130ab7f28cdb605de4d860b125ad0ecfcacab8dc394d067c4ae8091027bb9d522466065baa94c219680e606a5a0cf97f6f8257929e504e151c41dc631aeebfbbbc989fc5ae6db395a73b16259a517996d7705f977a1ffe352b07fa8474cdc16400344d07dd0003c087f540cc5ece313c9ec4d5744824358a0790808c5d", 0x0, "5da72c258f9c9cc49b14f28c24ef7b48f2aa42dd"}}]}, 0x154}}, 0x0) [ 41.838505][ T26] audit: type=1400 audit(1692449708.043:135): avc: denied { create } for pid=3530 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 41.869008][ T3535] syz-executor.5 (3535) used greatest stack depth: 11408 bytes left [ 41.892308][ T26] audit: type=1400 audit(1692449708.043:136): avc: denied { bind } for pid=3530 comm="syz-executor.1" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 41.912966][ T26] audit: type=1400 audit(1692449708.043:137): avc: denied { name_bind } for pid=3530 comm="syz-executor.1" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 12:55:08 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c) 12:55:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x35}, {0x5}, {0x6, 0x0, 0x0, 0x7ffffcbc}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) 12:55:08 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@can_delroute={0x154, 0x19, 0x11, 0x0, 0x0, {}, [@CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "18feb80ad2196423"}, 0x5}}, @CGW_CS_XOR={0x8, 0x5, {0x0, 0x8}}, @CGW_CS_CRC8={0x11e, 0x6, {0xff, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "5da72c258f9c9cc49b14f28c24ef7b48f2aa42dd"}}]}, 0x154}}, 0x0) 12:55:08 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c) 12:55:08 executing program 4: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) [ 41.934634][ T26] audit: type=1400 audit(1692449708.043:138): avc: denied { node_bind } for pid=3530 comm="syz-executor.1" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 12:55:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@can_delroute={0x154, 0x19, 0x11, 0x0, 0x0, {}, [@CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "18feb80ad2196423"}, 0x5}}, @CGW_CS_XOR={0x8, 0x5, {0x0, 0x8}}, @CGW_CS_CRC8={0x11e, 0x6, {0xff, 0x0, 0x0, 0x0, 0x0, "b6deadbea9007f3bf9f28786d26ca22f81cfc126cf019c5b0b5fd65e4d1d3a74c1ab8ea8e1fd1aa2f34d385352bc1549967258f1fda791c7b31571b39bff63cbce5086cad6b647bb8c2d98e312441aea85c2e22c24217c516573054e899bfc1eddc982634f290ec0f0d385f158bdb507f35c6e0e9c9770f3a0b35fd7212982f5e2f3fe130ab7f28cdb605de4d860b125ad0ecfcacab8dc394d067c4ae8091027bb9d522466065baa94c219680e606a5a0cf97f6f8257929e504e151c41dc631aeebfbbbc989fc5ae6db395a73b16259a517996d7705f977a1ffe352b07fa8474cdc16400344d07dd0003c087f540cc5ece313c9ec4d5744824358a0790808c5d", 0x0, "5da72c258f9c9cc49b14f28c24ef7b48f2aa42dd"}}]}, 0x154}}, 0x0) 12:55:08 executing program 2: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:08 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:08 executing program 5: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_TX={0x5, 0x9, 0x1}, @IFLA_GENEVE_UDP_CSUM={0x5, 0xa, 0x1}]}}}]}, 0x44}}, 0x0) 12:55:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_TX={0x5, 0x9, 0x1}, @IFLA_GENEVE_UDP_CSUM={0x5, 0xa, 0x1}]}}}]}, 0x44}}, 0x0) 12:55:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_TX={0x5, 0x9, 0x1}, @IFLA_GENEVE_UDP_CSUM={0x5, 0xa, 0x1}]}}}]}, 0x44}}, 0x0) 12:55:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_TX={0x5, 0x9, 0x1}, @IFLA_GENEVE_UDP_CSUM={0x5, 0xa, 0x1}]}}}]}, 0x44}}, 0x0) 12:55:09 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)=@can_delroute={0x14c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_AND={0x4, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "fde22222a5200efe"}}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "344a07080b30ecaa8466ebc2fa4ab5fd56fc024d"}}]}, 0x14c}}, 0x0) 12:55:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)=@can_delroute={0x14c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_AND={0x4, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "fde22222a5200efe"}}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "344a07080b30ecaa8466ebc2fa4ab5fd56fc024d"}}]}, 0x14c}}, 0x0) 12:55:09 executing program 4: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)=@can_delroute={0x14c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_AND={0x4, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "fde22222a5200efe"}}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "344a07080b30ecaa8466ebc2fa4ab5fd56fc024d"}}]}, 0x14c}}, 0x0) 12:55:09 executing program 2: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)=@can_delroute={0x14c, 0x19, 0x1, 0x0, 0x0, {}, [@CGW_MOD_AND={0x4, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "fde22222a5200efe"}}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "344a07080b30ecaa8466ebc2fa4ab5fd56fc024d"}}]}, 0x14c}}, 0x0) 12:55:09 executing program 5: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:09 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:09 executing program 3: socketpair(0x22, 0x2, 0x3, &(0x7f0000000000)) 12:55:09 executing program 3: socketpair(0x22, 0x2, 0x3, &(0x7f0000000000)) 12:55:09 executing program 3: socketpair(0x22, 0x2, 0x3, &(0x7f0000000000)) 12:55:09 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:09 executing program 3: socketpair(0x22, 0x2, 0x3, &(0x7f0000000000)) [ 43.618005][ T26] audit: type=1400 audit(1692449709.823:139): avc: denied { create } for pid=3655 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 12:55:09 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x300, [{{0xa, 0x0, 0x0, @mcast1}}]}, 0x110) 12:55:09 executing program 4: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:09 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x300, [{{0xa, 0x0, 0x0, @mcast1}}]}, 0x110) 12:55:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x300, [{{0xa, 0x0, 0x0, @mcast1}}]}, 0x110) 12:55:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 12:55:10 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl1\x00', r1, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback={0x2, 0x460c6}}}) 12:55:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x300, [{{0xa, 0x0, 0x0, @mcast1}}]}, 0x110) 12:55:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 12:55:10 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00'], 0x6) read$nci(r0, 0x0, 0x0) write$nci(r0, &(0x7f0000000600)=@NCI_OP_CORE_INIT_RSP={0x0, 0x0, 0x2, 0x1, 0x0, {{0x0, 0x0, 0xf4, "66726d31fb0c98776e78b29a0133a61c0e6e5f855ef009a78ab023dddec4218944936d86278c472166dafa54f4068a6b73fe2ed46f943da748f125ee4e3a40d4c9b5e9ff546d221a3a416a76a0a538052adca48910c12ed52e3bdad7daf570b5b2a89357ae7476b2cd19f28a53d9be296a8d5278f7f50b8fe72dbb234019357f1652bb565c421fc9d6f16b8af7bc301b658fddecc67eec992d31f92b0adb4ffcee69d30ed7402fd8ae31986117810f0fc86f2528802c24812b2ba2d668ef1cad4dcc82fe0110b1044924aaa4cbf9cda0cf36ce0b29a0955a7be760f2c414d9e8382e9809ea76f3115cd949daae5b2dfe9d9e42a5"}}}, 0x108) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x90200, 0x0) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) 12:55:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 12:55:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip6erspan0\x00', 0x7c2}) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) 12:55:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000002700)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xffffffff}}]}]}]}, 0x34}}, 0x0) 12:55:10 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl1\x00', r1, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback={0x2, 0x460c6}}}) 12:55:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000002700)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xffffffff}}]}]}]}, 0x34}}, 0x0) 12:55:10 executing program 4: syz_read_part_table(0x5ef, &(0x7f0000000600)="$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") 12:55:10 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl1\x00', r1, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback={0x2, 0x460c6}}}) 12:55:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000002700)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xffffffff}}]}]}]}, 0x34}}, 0x0) 12:55:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000002700)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xffffffff}}]}]}]}, 0x34}}, 0x0) [ 44.567499][ T3728] loop4: detected capacity change from 0 to 2048 [ 44.589950][ T3728] loop4: p2 p3 p4 [ 44.593897][ T3728] loop4: p2 size 50331648 extends beyond EOD, truncated [ 44.603406][ T3728] loop4: p3 start 150996480 is beyond EOD, truncated [ 44.610185][ T3728] loop4: p4 size 4128768 extends beyond EOD, truncated 12:55:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip6erspan0\x00', 0x7c2}) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) 12:55:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip6erspan0\x00', 0x7c2}) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) [ 44.626332][ T2767] loop4: p2 p3 p4 [ 44.632440][ T2767] loop4: p2 size 50331648 extends beyond EOD, truncated [ 44.647246][ T2767] loop4: p3 start 150996480 is beyond EOD, truncated [ 44.654070][ T2767] loop4: p4 size 4128768 extends beyond EOD, truncated [ 44.671891][ T3069] udevd[3069]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 44.682763][ T3506] udevd[3506]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 44.696933][ T3506] udevd[3506]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 44.701333][ T3069] udevd[3069]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory 12:55:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip6erspan0\x00', 0x7c2}) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) 12:55:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 12:55:11 executing program 4: syz_read_part_table(0x5ef, &(0x7f0000000600)="$eJzs1LtrZFUYAPDv3tx5gcssiyKI4IKwVWRBG7cYli2yYmPGdd3SQkFMYxEQVJDxVVlFOwtTJRCCMNhYWYaJjYJWIX+AfUAkKeKR+8iMJikkDkaX36+453HPOfc7nO+e4H8tj7cipexPPccppSiq6kL5eOP9jSLa0Xttv37/Sudk5O14dXvp7pPF8M69+/XYSqqNIqJVdWTRi2/io+mAbsxWn5kuGx9GfibO7pnxkV1kvzxcxoM6V4sYrORNwt3arN+NHjyeR56dTqbDuX6/+XfK5Nz7rB/x0/NlDAfrV/JoxdGz3zfjXn4kIn6ZpnAv8njspdm/MHNeVr8bKb1+Tv/ttTnuhIsYDyb9Tz5dbX9R35gp1Sl4Y+udm4vX9ndGa815/lqX5XFfL2/d05cZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAPzUeTPrtiGg17efefGYpLeRvf55nEUXTmf11Tq8ph3P5frn8ai86g5W9Fz44Tilt/piWD9avZK3dViyvx+8pRcRiPo2jE3nElw+qensOIXCJxoNJXlXeG/z2ddwqa92Pi7ixVdxcvLa/Mzo54Kfa3dGjcdhkYvfS4gUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/vuW7r54fXjn3v26VUTE1Y1JVe+Vj1akiCd67aoni4jlzrdHaTSbv331h6d/3l2IYaduf5dHpKxZKiJSvyq+KqYzsn9nY/wtfwQAAP//6tVjjg==") 12:55:11 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl1\x00', r1, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback={0x2, 0x460c6}}}) 12:55:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip6erspan0\x00', 0x7c2}) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) 12:55:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@exit]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x9f, &(0x7f0000000100)=""/159, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:55:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@exit]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x9f, &(0x7f0000000100)=""/159, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:55:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x40, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0xb, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x0}}}}, 0x90) 12:55:11 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000002000000000000000000001e95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000000)="fef351f64d23421a5b4e415288ca", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 12:55:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@exit]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x9f, &(0x7f0000000100)=""/159, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 45.332489][ T3748] loop4: detected capacity change from 0 to 2048 [ 45.369924][ T3748] loop4: p2 p3 p4 12:55:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x40, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0xb, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x0}}}}, 0x90) 12:55:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip6erspan0\x00', 0x7c2}) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) 12:55:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip6erspan0\x00', 0x7c2}) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) [ 45.391002][ T3748] loop4: p2 size 50331648 extends beyond EOD, truncated 12:55:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x40, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0xb, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x0}}}}, 0x90) [ 45.437859][ T3748] loop4: p3 start 150996480 is beyond EOD, truncated [ 45.444603][ T3748] loop4: p4 size 4128768 extends beyond EOD, truncated 12:55:11 executing program 4: syz_read_part_table(0x5ef, &(0x7f0000000600)="$eJzs1LtrZFUYAPDv3tx5gcssiyKI4IKwVWRBG7cYli2yYmPGdd3SQkFMYxEQVJDxVVlFOwtTJRCCMNhYWYaJjYJWIX+AfUAkKeKR+8iMJikkDkaX36+453HPOfc7nO+e4H8tj7cipexPPccppSiq6kL5eOP9jSLa0Xttv37/Sudk5O14dXvp7pPF8M69+/XYSqqNIqJVdWTRi2/io+mAbsxWn5kuGx9GfibO7pnxkV1kvzxcxoM6V4sYrORNwt3arN+NHjyeR56dTqbDuX6/+XfK5Nz7rB/x0/NlDAfrV/JoxdGz3zfjXn4kIn6ZpnAv8njspdm/MHNeVr8bKb1+Tv/ttTnuhIsYDyb9Tz5dbX9R35gp1Sl4Y+udm4vX9ndGa815/lqX5XFfL2/d05cZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAPzUeTPrtiGg17efefGYpLeRvf55nEUXTmf11Tq8ph3P5frn8ai86g5W9Fz44Tilt/piWD9avZK3dViyvx+8pRcRiPo2jE3nElw+qensOIXCJxoNJXlXeG/z2ddwqa92Pi7ixVdxcvLa/Mzo54Kfa3dGjcdhkYvfS4gUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/vuW7r54fXjn3v26VUTE1Y1JVe+Vj1akiCd67aoni4jlzrdHaTSbv331h6d/3l2IYaduf5dHpKxZKiJSvyq+KqYzsn9nY/wtfwQAAP//6tVjjg==") 12:55:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@exit]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x9f, &(0x7f0000000100)=""/159, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:55:11 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000002000000000000000000001e95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000000)="fef351f64d23421a5b4e415288ca", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 12:55:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x40, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0xb, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x0}}}}, 0x90) 12:55:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x40, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0xb, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x0}}}}, 0x90) 12:55:11 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000002000000000000000000001e95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000000)="fef351f64d23421a5b4e415288ca", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 12:55:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x40, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0xb, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x0}}}}, 0x90) 12:55:11 executing program 0: setresuid(0x0, 0xffffffffffffffff, 0xffffffffffffffff) 12:55:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x47, &(0x7f00000002c0)={[{@noload}, {@sysvgroups}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@data_err_abort}, {@block_validity}, {@nobarrier}, {@grpquota}, {@journal_async_commit}]}, 0x0, 0x4b2, &(0x7f0000000540)="$eJzs3c9rG1ceAPDvjK1sfjhrZ3cP2cBmwyaLHXYj2fEmMXvIZmHZPQW2Te+pa8vGWLaMJSexCcWhf0ChlLbQU0+9FPoHFEr+hFIItPfSlpbSJu2hh7Yqkkap40qxQ2wL5M8HnufNjKTv91loNG/eQxPAvnUqIq5ERF9EnI2IwWx7mpVYb5b64x7cvz1VL0nUate+TiLJtrVeK8mWR7KnHYyIZ/8X8ULy67iV1bX5yVKpuJytF6oLS4XK6tq5uYXJ2eJscXF8fOzixKWJCxOjO9LOoYi4/J/PX3v57f9efv/vNz+5/uXIi/W0BrL9G9uxk5pNzzX+Fy39EbG8G8G6oC9rT67biQAAsC0jEfG7iPhL4/x/MPoaZ3MAAABAL6n9ayB+SCJqAAAAQM9KG3NgkzSfzfcdiDTN55tzeP8Qh9NSuVL920x5ZXG6OVd2KHLpzFypOJrNFR6KXFJfH8vm2LbWz29aH4+IYxHx6uChxnp+qlya7vbFDwAAANgnjmzq/3832Oz/AwAAAD1mqNsJAAAAALtO/x8AAAB6n/4/AAAA9LT/X71aL7XW/a+nb6yuzJdvnJsuVubzCytT+any8lJ+tlyebfxm38JWr1cql5f+EYsrtwrVYqVaqKyuXV8oryxWr889cgtsAAAAYA8d+/Pdj5OIWP/noUapO9DtpIA9kT7Jgz/bvTyAvdfX7QSArunvdgJA1+S6nQDQdckW+ztO3vlg53MBAAB2x/AfO4//uzYAve2Jxv+BnmL8H/Yv4/+wf+WcAcC+t/vj/7XaEyUEAADsuIFGSdJ8NhY4EGmaz0ccbdwWIJfMzJWKoxHx24j4aDD3m/r6WOOZyZZ9BgAAAAAAAAAAAAAAAAAAAAAAAACgqVZLogYAAAD0tIj0iyS7/9fw4JmBzdcHDiTfDzaWEXHzzWuv35qsVpfH6tu/ebi9+ka2/Xw3rmAAAAAAm7X66a1+PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADspAf3b0+1yl7G/erfETHULn5/HGwsD0YuIg5/m0T/huclEdG3A/HX70TE8Xbxk3paMZRl0S7+xuVex08j4shTxob97m79+HOl3ecvjVONZfvPX39Wnlbn41/68PjX1+H4c3SbMU7ce7fQMf6diBP97Y8/rfhJh/intxn/+efW1jrtq70VMdz2+yd5JFahurBUqKyunZtbmJwtzhYXx8fHLk5cmrgwMVqYmSsVs79tY7zyp/d+elz7D3eIP7RF+89ss/0/3rt1//fNaq5d/JHT7d//4x3ip9l331+zen3/cKu+3qxvdPKdD08+rv3THdq/1fs/ss32n33mpU+3+VAAYA9UVtfmJ0ul4rKKiorKw0q3j0wAAMBO++Wkv9uZAAAAAAAAAAAAAAAAAAAAwP61Fz8ntjnmeneaCgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwWD8HAAD//5qv1UE=") 12:55:11 executing program 0: setresuid(0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 45.479034][ T2767] loop4: p2 p3 p4 [ 45.482943][ T2767] loop4: p2 size 50331648 extends beyond EOD, truncated [ 45.496367][ T2767] loop4: p3 start 150996480 is beyond EOD, truncated [ 45.503131][ T2767] loop4: p4 size 4128768 extends beyond EOD, truncated 12:55:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$vsock_stream(r0, &(0x7f0000000000)={0x10}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000340)=@newlink={0x34, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) 12:55:11 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000002000000000000000000001e95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000000)="fef351f64d23421a5b4e415288ca", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 45.579141][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 45.579201][ T26] audit: type=1400 audit(1692449711.793:141): avc: denied { bind } for pid=3787 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.590917][ T3792] loop5: detected capacity change from 0 to 512 [ 45.613010][ T3784] loop4: detected capacity change from 0 to 2048 [ 45.620079][ T3792] ======================================================= [ 45.620079][ T3792] WARNING: The mand mount option has been deprecated and [ 45.620079][ T3792] and is ignored by this kernel. Remove the mand [ 45.620079][ T3792] option from the mount to silence this warning. [ 45.620079][ T3792] ======================================================= [ 45.658642][ T3792] EXT4-fs (loop5): can't mount with journal_async_commit, fs mounted w/o journal [ 45.671631][ T3784] loop4: p2 p3 p4 12:55:11 executing program 0: setresuid(0x0, 0xffffffffffffffff, 0xffffffffffffffff) 12:55:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x40, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0xb, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, '\x00', 0x0}}}}, 0x90) 12:55:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$vsock_stream(r0, &(0x7f0000000000)={0x10}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000340)=@newlink={0x34, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) 12:55:11 executing program 4: syz_read_part_table(0x5ef, &(0x7f0000000600)="$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") 12:55:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$vsock_stream(r0, &(0x7f0000000000)={0x10}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000340)=@newlink={0x34, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) 12:55:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x47, &(0x7f00000002c0)={[{@noload}, {@sysvgroups}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@data_err_abort}, {@block_validity}, {@nobarrier}, {@grpquota}, {@journal_async_commit}]}, 0x0, 0x4b2, &(0x7f0000000540)="$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") [ 45.675409][ T3784] loop4: p2 size 50331648 extends beyond EOD, truncated [ 45.684964][ T3784] loop4: p3 start 150996480 is beyond EOD, truncated [ 45.691737][ T3784] loop4: p4 size 4128768 extends beyond EOD, truncated 12:55:11 executing program 0: setresuid(0x0, 0xffffffffffffffff, 0xffffffffffffffff) 12:55:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$vsock_stream(r0, &(0x7f0000000000)={0x10}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000340)=@newlink={0x34, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) 12:55:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$vsock_stream(r0, &(0x7f0000000000)={0x10}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000340)=@newlink={0x34, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) [ 45.748446][ T3069] udevd[3069]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 45.752924][ T3804] loop5: detected capacity change from 0 to 512 [ 45.760683][ T3795] udevd[3795]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 45.779053][ T3069] udevd[3069]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory 12:55:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003c80)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003c80)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003c80)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) bind$unix(r2, &(0x7f0000000e00)=@abs={0x1, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000800)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x30}}], 0x2, 0x0) 12:55:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0xa, 0xa, 0x401, 0x0, 0x0, {0xd479392da7d6b3ba}}, 0x14}}, 0x0) [ 45.811725][ T3804] EXT4-fs (loop5): can't mount with journal_async_commit, fs mounted w/o journal [ 45.821457][ T3795] udevd[3795]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 45.824338][ T3809] loop4: detected capacity change from 0 to 2048 12:55:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0xa, 0xa, 0x401, 0x0, 0x0, {0xd479392da7d6b3ba}}, 0x14}}, 0x0) 12:55:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003c80)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003c80)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003c80)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) bind$unix(r2, &(0x7f0000000e00)=@abs={0x1, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000800)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x30}}], 0x2, 0x0) [ 45.857154][ T26] audit: type=1400 audit(1692449712.063:142): avc: denied { create } for pid=3819 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 12:55:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x47, &(0x7f00000002c0)={[{@noload}, {@sysvgroups}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@data_err_abort}, {@block_validity}, {@nobarrier}, {@grpquota}, {@journal_async_commit}]}, 0x0, 0x4b2, &(0x7f0000000540)="$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") 12:55:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0xa, 0xa, 0x401, 0x0, 0x0, {0xd479392da7d6b3ba}}, 0x14}}, 0x0) [ 45.891194][ T26] audit: type=1400 audit(1692449712.063:143): avc: denied { write } for pid=3819 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 45.903154][ T3809] loop4: p2 p3 p4 [ 45.938169][ T3830] loop5: detected capacity change from 0 to 512 [ 45.951209][ T3809] loop4: p2 size 50331648 extends beyond EOD, truncated 12:55:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$vsock_stream(r0, &(0x7f0000000000)={0x10}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000340)=@newlink={0x34, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) 12:55:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$vsock_stream(r0, &(0x7f0000000000)={0x10}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000340)=@newlink={0x34, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) 12:55:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0xa, 0xa, 0x401, 0x0, 0x0, {0xd479392da7d6b3ba}}, 0x14}}, 0x0) 12:55:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003c80)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003c80)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003c80)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) bind$unix(r2, &(0x7f0000000e00)=@abs={0x1, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000800)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x30}}], 0x2, 0x0) [ 45.959189][ T3809] loop4: p3 start 150996480 is beyond EOD, truncated [ 45.965990][ T3809] loop4: p4 size 4128768 extends beyond EOD, truncated [ 45.973564][ T3830] EXT4-fs (loop5): can't mount with journal_async_commit, fs mounted w/o journal 12:55:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x47, &(0x7f00000002c0)={[{@noload}, {@sysvgroups}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@data_err_abort}, {@block_validity}, {@nobarrier}, {@grpquota}, {@journal_async_commit}]}, 0x0, 0x4b2, &(0x7f0000000540)="$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") 12:55:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003c80)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003c80)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003c80)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) bind$unix(r2, &(0x7f0000000e00)=@abs={0x1, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000800)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x30}}], 0x2, 0x0) 12:55:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) 12:55:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "ea430348c95c61c4", "a5b756aafe64316550d78e2bbd6962d6", "c7b423d6", "466ce4a62b2cc35a"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x3, 0x0, 0x0) 12:55:12 executing program 2: prctl$PR_SET_NAME(0x41, &(0x7f0000000200)='/dev/vcsu#\x00') 12:55:12 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x60c2, 0x0) inotify_init() fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r2, 0x6, 0x1f, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xef85) r3 = inotify_init() ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0xa1000a02) inotify_init() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:55:12 executing program 2: prctl$PR_SET_NAME(0x41, &(0x7f0000000200)='/dev/vcsu#\x00') 12:55:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f00