s=@f_matchall={{0xd}, {0x14, 0x2, [@TCA_MATCHALL_CLASSID={0x8}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}]}}]}, 0x48}}, 0x0) 14:39:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_BITWISE_SREG={0x8}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_BITWISE_DREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_USERDATA={0x5, 0x7, 0x1, 0x0, 'P'}]}], {0x14}}, 0x8c}}, 0x0) 14:39:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private1={0xfc, 0x2}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@empty, 0x0, 0x3c}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x60}, [@coaddr={0x14, 0xe, @in6=@private2}]}, 0x104}}, 0x0) 14:39:20 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x70}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) 14:39:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee00"/20, @ANYRES32=r3, @ANYBLOB="01000000010051001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="080350035801480301020200c52cf7c25975e010b02f0800eb2b2ff0dac8897c6b118777faffffff3066100cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) [ 39.028526][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 39.028535][ T27] audit: type=1400 audit(1705070360.423:96): avc: denied { execmem } for pid=3074 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 39.053995][ T27] audit: type=1400 audit(1705070360.443:97): avc: denied { read } for pid=3076 comm="syz-executor.5" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 39.075310][ T27] audit: type=1400 audit(1705070360.443:98): avc: denied { open } for pid=3076 comm="syz-executor.5" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 39.098858][ T27] audit: type=1400 audit(1705070360.443:99): avc: denied { mounton } for pid=3076 comm="syz-executor.5" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 39.120332][ T27] audit: type=1400 audit(1705070360.443:100): avc: denied { module_request } for pid=3076 comm="syz-executor.5" kmod="netdev-nr5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 39.143073][ T27] audit: type=1400 audit(1705070360.563:101): avc: denied { append } for pid=2746 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.165267][ T27] audit: type=1400 audit(1705070360.563:102): avc: denied { open } for pid=2746 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.187721][ T27] audit: type=1400 audit(1705070360.563:103): avc: denied { getattr } for pid=2746 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.357431][ T27] audit: type=1400 audit(1705070360.633:104): avc: denied { sys_module } for pid=3076 comm="syz-executor.5" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 39.550028][ T3087] chnl_net:caif_netlink_parms(): no params data found [ 39.558337][ T3076] chnl_net:caif_netlink_parms(): no params data found [ 39.623456][ T3077] chnl_net:caif_netlink_parms(): no params data found [ 39.676321][ T3076] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.683515][ T3076] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.690709][ T3076] bridge_slave_0: entered allmulticast mode [ 39.697001][ T3076] bridge_slave_0: entered promiscuous mode [ 39.704615][ T3076] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.711806][ T3076] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.718897][ T3076] bridge_slave_1: entered allmulticast mode [ 39.725147][ T3076] bridge_slave_1: entered promiscuous mode [ 39.733631][ T3087] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.740697][ T3087] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.747899][ T3087] bridge_slave_0: entered allmulticast mode [ 39.754220][ T3087] bridge_slave_0: entered promiscuous mode [ 39.761682][ T3087] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.768793][ T3087] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.775939][ T3087] bridge_slave_1: entered allmulticast mode [ 39.782356][ T3087] bridge_slave_1: entered promiscuous mode [ 39.839179][ T3076] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.859530][ T3087] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.871073][ T3087] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.887656][ T3076] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.896895][ T3077] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.904042][ T3077] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.911606][ T3077] bridge_slave_0: entered allmulticast mode [ 39.918042][ T3077] bridge_slave_0: entered promiscuous mode [ 39.924490][ T3077] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.931591][ T3077] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.938679][ T3077] bridge_slave_1: entered allmulticast mode [ 39.945190][ T3077] bridge_slave_1: entered promiscuous mode [ 39.965618][ T3078] chnl_net:caif_netlink_parms(): no params data found [ 39.990741][ T3077] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.003158][ T3089] chnl_net:caif_netlink_parms(): no params data found [ 40.014281][ T3087] team0: Port device team_slave_0 added [ 40.020677][ T3087] team0: Port device team_slave_1 added [ 40.030869][ T3076] team0: Port device team_slave_0 added [ 40.037250][ T3076] team0: Port device team_slave_1 added [ 40.048232][ T3077] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 40.071479][ T3087] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.078519][ T3087] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.104422][ T3087] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.117173][ T3087] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.124131][ T3087] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.150098][ T3087] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.179686][ T3117] chnl_net:caif_netlink_parms(): no params data found [ 40.200136][ T3076] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.207090][ T3076] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.232998][ T3076] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.244123][ T3076] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.251137][ T3076] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.277015][ T3076] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.292704][ T3077] team0: Port device team_slave_0 added [ 40.317129][ T3077] team0: Port device team_slave_1 added [ 40.342608][ T3078] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.349778][ T3078] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.356988][ T3078] bridge_slave_0: entered allmulticast mode [ 40.363541][ T3078] bridge_slave_0: entered promiscuous mode [ 40.370104][ T3078] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.377165][ T3078] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.384563][ T3078] bridge_slave_1: entered allmulticast mode [ 40.391107][ T3078] bridge_slave_1: entered promiscuous mode [ 40.406979][ T3089] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.414128][ T3089] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.421448][ T3089] bridge_slave_0: entered allmulticast mode [ 40.427808][ T3089] bridge_slave_0: entered promiscuous mode [ 40.442895][ T3087] hsr_slave_0: entered promiscuous mode [ 40.448913][ T3087] hsr_slave_1: entered promiscuous mode [ 40.460840][ T3078] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.472056][ T3077] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.478997][ T3077] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.504944][ T3077] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.516059][ T3077] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.523067][ T3077] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.549005][ T3077] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.559686][ T3089] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.566698][ T3089] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.573959][ T3089] bridge_slave_1: entered allmulticast mode [ 40.580263][ T3089] bridge_slave_1: entered promiscuous mode [ 40.609567][ T3076] hsr_slave_0: entered promiscuous mode [ 40.615446][ T3076] hsr_slave_1: entered promiscuous mode [ 40.621358][ T3076] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 40.628916][ T3076] Cannot create hsr debugfs directory [ 40.635426][ T3078] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 40.663818][ T3117] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.670903][ T3117] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.678060][ T3117] bridge_slave_0: entered allmulticast mode [ 40.684305][ T3117] bridge_slave_0: entered promiscuous mode [ 40.703510][ T3078] team0: Port device team_slave_0 added [ 40.710419][ T3089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.720702][ T3089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 40.729826][ T3117] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.736866][ T3117] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.745051][ T3117] bridge_slave_1: entered allmulticast mode [ 40.751440][ T3117] bridge_slave_1: entered promiscuous mode [ 40.768607][ T3078] team0: Port device team_slave_1 added [ 40.797089][ T3077] hsr_slave_0: entered promiscuous mode [ 40.803375][ T3077] hsr_slave_1: entered promiscuous mode [ 40.809332][ T3077] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 40.816864][ T3077] Cannot create hsr debugfs directory [ 40.833772][ T3089] team0: Port device team_slave_0 added [ 40.840325][ T3089] team0: Port device team_slave_1 added [ 40.851152][ T3117] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.864907][ T3078] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.871912][ T3078] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.897783][ T3078] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.916715][ T3117] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 40.931562][ T3078] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.938564][ T3078] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.964563][ T3078] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.982829][ T3089] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.989813][ T3089] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 41.015721][ T3089] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 41.041275][ T3089] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 41.048257][ T3089] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 41.074185][ T3089] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 41.075138][ T27] audit: type=1400 audit(1705070362.503:105): avc: denied { remove_name } for pid=2746 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 41.108679][ T3117] team0: Port device team_slave_0 added [ 41.115933][ T3117] team0: Port device team_slave_1 added [ 41.133799][ T3078] hsr_slave_0: entered promiscuous mode [ 41.139780][ T3078] hsr_slave_1: entered promiscuous mode [ 41.145595][ T3078] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 41.153165][ T3078] Cannot create hsr debugfs directory [ 41.175480][ T3117] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 41.182471][ T3117] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 41.208582][ T3117] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 41.232832][ T3089] hsr_slave_0: entered promiscuous mode [ 41.238800][ T3089] hsr_slave_1: entered promiscuous mode [ 41.244569][ T3089] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 41.252129][ T3089] Cannot create hsr debugfs directory [ 41.261955][ T3117] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 41.268917][ T3117] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 41.294811][ T3117] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 41.328260][ T3117] hsr_slave_0: entered promiscuous mode [ 41.334110][ T3117] hsr_slave_1: entered promiscuous mode [ 41.340110][ T3117] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 41.348668][ T3117] Cannot create hsr debugfs directory [ 41.401457][ T3087] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 41.410073][ T3087] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 41.419728][ T3087] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 41.428765][ T3087] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 41.455607][ T3076] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 41.464872][ T3076] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 41.491386][ T3076] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 41.505736][ T3076] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 41.518128][ T3077] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 41.526823][ T3077] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 41.535511][ T3077] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 41.543922][ T3077] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 41.596787][ T3078] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 41.605613][ T3078] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 41.618190][ T3078] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 41.626929][ T3078] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 41.660170][ T3117] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 41.681951][ T3117] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 41.690395][ T3117] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 41.706365][ T3089] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 41.720541][ T3117] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 41.743131][ T3087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.752849][ T3076] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.761175][ T3089] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 41.769939][ T3089] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 41.784078][ T3077] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.793541][ T3089] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 41.814981][ T3076] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.824590][ T3087] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.848400][ T3180] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.855510][ T3180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.864639][ T3180] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.871751][ T3180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.883195][ T3077] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.904732][ T3180] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.911871][ T3180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.920905][ T3180] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.928029][ T3180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.938691][ T3180] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.945852][ T3180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.988671][ T3117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.996406][ T3180] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.003464][ T3180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.022843][ T3087] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 42.033312][ T3087] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 42.054019][ T3076] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 42.064492][ T3076] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 42.107085][ T3078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 42.119296][ T3078] 8021q: adding VLAN 0 to HW filter on device team0 [ 42.149747][ T3180] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.156836][ T3180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.172297][ T3180] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.179365][ T3180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.190543][ T3117] 8021q: adding VLAN 0 to HW filter on device team0 [ 42.198872][ T3087] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 42.220145][ T3089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 42.236492][ T3180] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.243544][ T3180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.255832][ T3180] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.262879][ T3180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.275639][ T3089] 8021q: adding VLAN 0 to HW filter on device team0 [ 42.298400][ T3076] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 42.311972][ T3078] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 42.325721][ T3170] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.332825][ T3170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.346066][ T3077] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 42.384282][ T3117] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 42.394706][ T3117] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 42.410192][ T3181] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.417244][ T3181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.481670][ T3087] veth0_vlan: entered promiscuous mode [ 42.521787][ T3078] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 42.540304][ T3087] veth1_vlan: entered promiscuous mode [ 42.549466][ T3077] veth0_vlan: entered promiscuous mode [ 42.560428][ T3117] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 42.575176][ T3089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 42.597353][ T3077] veth1_vlan: entered promiscuous mode [ 42.648598][ T3087] veth0_macvtap: entered promiscuous mode [ 42.664168][ T3076] veth0_vlan: entered promiscuous mode [ 42.679645][ T3077] veth0_macvtap: entered promiscuous mode [ 42.688455][ T3087] veth1_macvtap: entered promiscuous mode [ 42.699127][ T3076] veth1_vlan: entered promiscuous mode [ 42.713967][ T3087] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.723991][ T3077] veth1_macvtap: entered promiscuous mode [ 42.738082][ T3087] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.761269][ T3087] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.770069][ T3087] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.778835][ T3087] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.787557][ T3087] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.803755][ T3077] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.814251][ T3077] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.825783][ T3077] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.835389][ T3089] veth0_vlan: entered promiscuous mode [ 42.843822][ T3078] veth0_vlan: entered promiscuous mode [ 42.858537][ T3077] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.869051][ T3077] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.879867][ T3077] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.888366][ T3076] veth0_macvtap: entered promiscuous mode [ 42.896441][ T3076] veth1_macvtap: entered promiscuous mode [ 42.914121][ T3077] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.923070][ T3077] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.931794][ T3077] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.940550][ T3077] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.954999][ T3078] veth1_vlan: entered promiscuous mode [ 42.980281][ T3089] veth1_vlan: entered promiscuous mode [ 42.986897][ T3078] veth0_macvtap: entered promiscuous mode [ 42.997170][ T3076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 43.007800][ T3076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.017748][ T3076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 43.028346][ T3076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.040770][ T3076] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 43.049039][ T3076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 43.059584][ T3076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.069447][ T3076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 43.079896][ T3076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.090796][ T3076] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 43.107962][ T3089] veth0_macvtap: entered promiscuous mode [ 43.121216][ T3078] veth1_macvtap: entered promiscuous mode 14:39:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x1c}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x2, 0x3, 0x5, 0x0, 0x0, {}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x3}}]}, 0x20}}, 0x0) 14:39:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x1c}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x2, 0x3, 0x5, 0x0, 0x0, {}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x3}}]}, 0x20}}, 0x0) 14:39:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private1={0xfc, 0x2}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@empty, 0x0, 0x3c}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x60}, [@coaddr={0x14, 0xe, @in6=@private2}]}, 0x104}}, 0x0) 14:39:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x1c}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x2, 0x3, 0x5, 0x0, 0x0, {}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x3}}]}, 0x20}}, 0x0) [ 43.149535][ T3076] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.158319][ T3076] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.167012][ T3076] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.175825][ T3076] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.189577][ T3089] veth1_macvtap: entered promiscuous mode 14:39:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private1={0xfc, 0x2}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@empty, 0x0, 0x3c}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x60}, [@coaddr={0x14, 0xe, @in6=@private2}]}, 0x104}}, 0x0) 14:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) [ 43.218264][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 43.228742][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.238569][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 43.249025][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:39:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private1={0xfc, 0x2}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@empty, 0x0, 0x3c}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x60}, [@coaddr={0x14, 0xe, @in6=@private2}]}, 0x104}}, 0x0) 14:39:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000081000000bfa30000000000000703000005feffff720af0fff8ffffff71a4f0ff000000002d030000000000001d400500000000004704000001ed000072030000000000001d440000000000006b0a00fe000000007303000000000000b5000000000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f1ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c107571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d1abf3cb17b40ac9b10968f38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6432399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c7bc46dd12305a1ae9dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ad1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67a41b9e320146ee9f566a28"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 14:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 14:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) [ 43.259098][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 43.269541][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.295862][ T3089] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 43.305518][ T3117] veth0_vlan: entered promiscuous mode 14:39:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) [ 43.329669][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 43.340432][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.350361][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 43.360939][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 14:39:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0x42, 0x4, 0x4a0, 0xffffffff, 0xb0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x408, 0x408, 0x408, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb0, 0x0, {0x100000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x9}}}, {{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'hsr0\x00', {0x0, 0x0, 0x68, 0x0, 0x0, 0x9, 0x1000}}}, @common=@unspec=@helper={{0x48}, {0x0, 'snmp\x00'}}]}, @REJECT={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={{0x28}}, @common=@ttl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) [ 43.370768][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 43.381377][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.391227][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 43.401747][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.413846][ T3078] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 43.422106][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 43.432669][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.433985][ T3291] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 43.442519][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 43.464633][ T3291] xt_hashlimit: invalid rate [ 43.464595][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:39:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 14:39:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0x42, 0x4, 0x4a0, 0xffffffff, 0xb0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x408, 0x408, 0x408, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb0, 0x0, {0x100000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x9}}}, {{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'hsr0\x00', {0x0, 0x0, 0x68, 0x0, 0x0, 0x9, 0x1000}}}, @common=@unspec=@helper={{0x48}, {0x0, 'snmp\x00'}}]}, @REJECT={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={{0x28}}, @common=@ttl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) 14:39:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0x42, 0x4, 0x4a0, 0xffffffff, 0xb0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x408, 0x408, 0x408, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb0, 0x0, {0x100000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x9}}}, {{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'hsr0\x00', {0x0, 0x0, 0x68, 0x0, 0x0, 0x9, 0x1000}}}, @common=@unspec=@helper={{0x48}, {0x0, 'snmp\x00'}}]}, @REJECT={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={{0x28}}, @common=@ttl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) [ 43.464648][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 43.489743][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.509310][ T3089] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 43.520512][ T3295] xt_hashlimit: invalid rate 14:39:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000081000000bfa30000000000000703000005feffff720af0fff8ffffff71a4f0ff000000002d030000000000001d400500000000004704000001ed000072030000000000001d440000000000006b0a00fe000000007303000000000000b5000000000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f1ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c107571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d1abf3cb17b40ac9b10968f38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6432399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c7bc46dd12305a1ae9dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ad1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67a41b9e320146ee9f566a28"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) [ 43.538745][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 43.543794][ T3297] xt_hashlimit: invalid rate [ 43.549214][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.549224][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 43.549237][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:39:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0x42, 0x4, 0x4a0, 0xffffffff, 0xb0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x408, 0x408, 0x408, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb0, 0x0, {0x100000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x9}}}, {{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'hsr0\x00', {0x0, 0x0, 0x68, 0x0, 0x0, 0x9, 0x1000}}}, @common=@unspec=@helper={{0x48}, {0x0, 'snmp\x00'}}]}, @REJECT={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={{0x28}}, @common=@ttl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) [ 43.549246][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 43.549257][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.549270][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 43.549281][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.569285][ T3078] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 43.606605][ T3301] xt_hashlimit: invalid rate 14:39:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe1, 0x0, &(0x7f00000000c0)) [ 43.633286][ T3078] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.645673][ T3078] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.654512][ T3078] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.663261][ T3078] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.684480][ T3089] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.690401][ T3303] loop2: detected capacity change from 0 to 2048 [ 43.693341][ T3089] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.701100][ T3303] ======================================================= [ 43.701100][ T3303] WARNING: The mand mount option has been deprecated and [ 43.701100][ T3303] and is ignored by this kernel. Remove the mand [ 43.701100][ T3303] option from the mount to silence this warning. 14:39:25 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./bus\x00', 0x0) mkdirat(r0, &(0x7f00000002c0)='./file1\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0x17f}) renameat2(r0, &(0x7f0000000080)='./bus\x00', r1, &(0x7f0000000100)='./bus\x00', 0x0) 14:39:25 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./bus\x00', 0x0) mkdirat(r0, &(0x7f00000002c0)='./file1\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0x17f}) renameat2(r0, &(0x7f0000000080)='./bus\x00', r1, &(0x7f0000000100)='./bus\x00', 0x0) [ 43.701100][ T3303] ======================================================= [ 43.708539][ T3089] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.752123][ T3089] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.766572][ T3117] veth1_vlan: entered promiscuous mode 14:39:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe1, 0x0, &(0x7f00000000c0)) [ 43.785619][ T3303] EXT4-fs (loop2): warning: checktime reached, running e2fsck is recommended [ 43.799617][ T3303] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 43.824273][ T3303] syz-executor.2 (3303) used greatest stack depth: 11456 bytes left [ 43.868764][ T3087] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.882029][ T3117] veth0_macvtap: entered promiscuous mode [ 43.901755][ T3316] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 43.912807][ T3117] veth1_macvtap: entered promiscuous mode 14:39:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_BITWISE_SREG={0x8}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_BITWISE_DREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_USERDATA={0x5, 0x7, 0x1, 0x0, 'P'}]}], {0x14}}, 0x8c}}, 0x0) [ 43.935973][ T3117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 43.946607][ T3117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.956604][ T3117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 43.967048][ T3117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.969782][ T3323] loop2: detected capacity change from 0 to 2048 14:39:25 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x70}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) [ 43.976871][ T3117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 43.993678][ T3117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.003519][ T3117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 44.009385][ T3323] EXT4-fs (loop2): warning: checktime reached, running e2fsck is recommended [ 44.013950][ T3117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:39:25 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./bus\x00', 0x0) mkdirat(r0, &(0x7f00000002c0)='./file1\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0x17f}) renameat2(r0, &(0x7f0000000080)='./bus\x00', r1, &(0x7f0000000100)='./bus\x00', 0x0) 14:39:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_BITWISE_SREG={0x8}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_BITWISE_DREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_USERDATA={0x5, 0x7, 0x1, 0x0, 'P'}]}], {0x14}}, 0x8c}}, 0x0) 14:39:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$eJzs3d1rW+cZAPDnyFLkONnswWDLrgyDzRAiz4mXbLCLjF2MQQKB7XqJkRWTWbaCJYfYGLawFnpTaEsvCu1NrvuR3vW2H1eF9L/oRUlIGyfUoZTicvThOLbk2LFiufHvB8d+33Ne6XkfnQ+9OucgBXBgDad/MhHHIuK1JGKwOT+JiFy9lI0422i3srxUTKckVlf/+U1Sb/Nweal4eN1jUkealV9HxKcvRxzPbI5bXVicniiXS3PN+mht5upodWHxxJWZianSVGn29Nj4+MkzfzxzercZ5tdK336xePTu63///Qdnv/v/r269+lkSZ+Noc1max24jbTQcw83XJJe+hE/4W7eD9Viyw/b/fU79YGfSXbOvsZfHsRiMvnoJAHiRpeOwVQDggEm8/wPAAdM6D/BweanYmtZODpzr1VmJvXPvrxHR38i/dX2zsSTbvGbXX78OOvAweeLKSBIRQ12IPxwR73z07/fSKbZxHTLXhZgAqf/diIhLQ8Obj//JpnsWduoP22gzvKH+PO7DANr7OB3//Knd+C+zNv6JNuOffJt991k8ff/P3OlCmI7S8d9f1t3btrIu/6ahvmbtZ/UxXy65fKVcSo9tP4+Ikcjl0/pYq3X/5hgjD3540Cn++vHf/Tf+824aP/3/uEXmTjb/5GMmJ2oTu8275d6NiN9k2+XfOv731z8ktBv/XthmjH/8+ZW3Oy1L80/zTafW2DYtJ3s01l29GfG7tuv/8R1tyZb3J47WN4fR1kbRxodfvjXQKf769Z9OafzWZ4G9kK7/ga3zH0rW369Z3XmM2zcHP+m0bHjt7HOn/Ntv/4eSf9XLh5rzrk/UanNjEYeSc5vnn2w9Mp3bqLfap/mP/Lb9/t86/iVttv9027y0zfyzd79+f8Os+4/z7/36n9zR+t9YSJKOi5qFWyvTfZ3ib5H/5y81Now72fx4ve1I8zH149+DrYeJW3SnXJo7HM++NQMAAAAAAAAAAAAAAAAAAAAAAADAzmUi4mgkmcJaOZMpFBq/4f3LGMiUK9Xa8cuV+dnJqP9W9lDkMq2vuhxc932oY83vw2/VT26on4qIX0TEm/nD9XqhWClP9jp5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGg60uH3/1Nf5R+tNvS6lwBA1/X3ugMAwJ7z/g8AB4/3fwA4eLz/A8DBczvT6x4AAHvt2T7/57veDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF5YF86fT6fVR8tLxbQ+eW1hfrpy7cRkqTpdmJkvFoqVuauFqUplqlwqFCszT3u+cqVydTxm56+P1krV2mh1YfHiTGV+tnbxyszEVOliKbcnWQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAzlQXFqcnyuXS3O4LmYhouyjb/Vj7rdAf+6Ib2yucWmmsj64+c7arT/j9vnihnk8htz+68bRCL49KAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8dPwYAAP//WQAx3w==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe1, 0x0, &(0x7f00000000c0)) [ 44.032807][ T3117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 44.033151][ T3323] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 44.043368][ T3117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:39:25 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./bus\x00', 0x0) mkdirat(r0, &(0x7f00000002c0)='./file1\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0x17f}) renameat2(r0, &(0x7f0000000080)='./bus\x00', r1, &(0x7f0000000100)='./bus\x00', 0x0) 14:39:25 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./bus\x00', 0x0) mkdirat(r0, &(0x7f00000002c0)='./file1\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0x17f}) renameat2(r0, &(0x7f0000000080)='./bus\x00', r1, &(0x7f0000000100)='./bus\x00', 0x0) 14:39:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_BITWISE_SREG={0x8}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_BITWISE_DREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_USERDATA={0x5, 0x7, 0x1, 0x0, 'P'}]}], {0x14}}, 0x8c}}, 0x0) [ 44.094701][ T3087] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.104129][ T3117] batman_adv: batadv0: Interface activated: batadv_slave_0 14:39:25 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x70}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) [ 44.150582][ T3117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 44.161258][ T3117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.171295][ T3117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 44.181802][ T3117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.191671][ T3117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 44.202172][ T3117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.211998][ T3117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 44.222432][ T3117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.228356][ T3344] loop2: detected capacity change from 0 to 2048 [ 44.232302][ T3117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 44.249095][ T3117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.262761][ T3117] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 44.272101][ T3117] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.280881][ T3117] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.290091][ T3117] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.298046][ T3344] EXT4-fs (loop2): warning: checktime reached, running e2fsck is recommended [ 44.298973][ T3117] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.310320][ T3344] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 44.377038][ T3087] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.409489][ T3351] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 44.413432][ T27] kauditd_printk_skb: 34 callbacks suppressed [ 44.413443][ T27] audit: type=1400 audit(1705070365.833:140): avc: denied { create } for pid=3350 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 44.444814][ T27] audit: type=1400 audit(1705070365.833:141): avc: denied { setopt } for pid=3350 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 14:39:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, '_'}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local={0xac, 0x14, 0x24}}}]}, 0x60}, 0x1, 0x7}, 0x0) 14:39:25 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x70}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) 14:39:25 executing program 1: listen(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./bus\x00', 0x2000000, &(0x7f0000000100)=ANY=[], 0x1, 0x11ed, &(0x7f0000000300)="$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") r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x7fb) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1080fc4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x80000009) 14:39:25 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./bus\x00', 0x0) mkdirat(r0, &(0x7f00000002c0)='./file1\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0x17f}) renameat2(r0, &(0x7f0000000080)='./bus\x00', r1, &(0x7f0000000100)='./bus\x00', 0x0) 14:39:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7d2, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe1, 0x0, &(0x7f00000000c0)) 14:39:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee00"/20, @ANYRES32=r3, @ANYBLOB="01000000010051001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="080350035801480301020200c52cf7c25975e010b02f0800eb2b2ff0dac8897c6b118777faffffff3066100cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 14:39:25 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee00"/20, @ANYRES32=r3, @ANYBLOB="01000000010051001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="080350035801480301020200c52cf7c25975e010b02f0800eb2b2ff0dac8897c6b118777faffffff3066100cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) [ 44.466035][ T27] audit: type=1400 audit(1705070365.843:142): avc: denied { bind } for pid=3350 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 44.485895][ T27] audit: type=1400 audit(1705070365.893:143): avc: denied { write } for pid=3350 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 14:39:25 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./bus\x00', 0x0) mkdirat(r0, &(0x7f00000002c0)='./file1\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0x17f}) renameat2(r0, &(0x7f0000000080)='./bus\x00', r1, &(0x7f0000000100)='./bus\x00', 0x0) 14:39:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, '_'}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local={0xac, 0x14, 0x24}}}]}, 0x60}, 0x1, 0x7}, 0x0) [ 44.539709][ T27] audit: type=1400 audit(1705070365.963:144): avc: denied { create } for pid=3359 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 44.590211][ T3364] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 44.607117][ T3365] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 44.608819][ T3361] loop2: detected capacity change from 0 to 2048 14:39:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, '_'}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local={0xac, 0x14, 0x24}}}]}, 0x60}, 0x1, 0x7}, 0x0) 14:39:26 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB=',\nN'], 0x31) 14:39:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee00"/20, @ANYRES32=r3, @ANYBLOB="01000000010051001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="080350035801480301020200c52cf7c25975e010b02f0800eb2b2ff0dac8897c6b118777faffffff3066100cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) [ 44.619395][ T27] audit: type=1400 audit(1705070365.993:145): avc: denied { write } for pid=3359 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 44.637413][ T3355] loop1: detected capacity change from 0 to 8192 14:39:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee00"/20, @ANYRES32=r3, @ANYBLOB="01000000010051001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="080350035801480301020200c52cf7c25975e010b02f0800eb2b2ff0dac8897c6b118777faffffff3066100cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 14:39:26 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB=',\nN'], 0x31) 14:39:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, '_'}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local={0xac, 0x14, 0x24}}}]}, 0x60}, 0x1, 0x7}, 0x0) [ 44.674563][ T27] audit: type=1400 audit(1705070366.093:146): avc: denied { mount } for pid=3352 comm="syz-executor.1" name="/" dev="loop1" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 44.707729][ T3361] EXT4-fs (loop2): warning: checktime reached, running e2fsck is recommended [ 44.723556][ T3361] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 14:39:26 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB=',\nN'], 0x31) 14:39:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee00"/20, @ANYRES32=r3, @ANYBLOB="01000000010051001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="080350035801480301020200c52cf7c25975e010b02f0800eb2b2ff0dac8897c6b118777faffffff3066100cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 14:39:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee00"/20, @ANYRES32=r3, @ANYBLOB="01000000010051001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="080350035801480301020200c52cf7c25975e010b02f0800eb2b2ff0dac8897c6b118777faffffff3066100cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 14:39:26 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB=',\nN'], 0x31) [ 44.744583][ T3378] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 44.767585][ T3379] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 14:39:26 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB=',\nN'], 0x31) 14:39:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r0, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$eventfd(r1, &(0x7f0000000340), 0x8) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x12, r3, 0x1000000000000) 14:39:26 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./bus\x00', 0xa08886, &(0x7f0000000800)=ANY=[@ANYRES32=0x0], 0x1, 0x2b4, &(0x7f00000012c0)="$eJzs3E1oU1kUwPHTj2k7HdqEYRiYgRmPdqMijyZroQ3Sihho0UaqBeHVvmjIMwl5IZoiTQShGxdu/FqrIFIoiAtBKHXhSlqkOxfuuuvCurKI9Ema1CY1bbWGptj/b5Eccu653PvuyyO5IW/h6K3L0bBjhM2U1LfUSX235GSpTrxSL6tycujK5Jv/Tp89dzIQDPacUu0NDPj8qtq+b2ro2sSB6dQfZ561v2iWGe/5hUX//MzfM/8sLA9cijgacTQWX1ZTh+PxlDlsWzpyx4kaqv22ZTqWRmKOlUyV5sN2PJHIqBkbaWtNJC3HUTOW0aiV0VRcU8mMmhfNSEwNw9C2VsHmJtL3AxtnQ0+WXFcWU69dtzknruvmX2zZweGhxlbW33VL1v9mrYeEHVRyUW8RscfToXSo8FzIB8ISEVss6RSPfJb8OeI+mHRXTpX841X/ZHDu8KuXquqVMTtbrM+mQw3l9T7xiLdQU1CIe08Ee3xaUF7/m7SW1vvFI39VrvdXrG+Sgx0l9YZ4ZO6CxMWW2an9H+f7xu+u1o/5VI/1BdfV/y4ja4fp8YcarQ8AAAAAAAAAANth6FcV9++NfIMbo6rati5fqC/9faC/2Of6/fnOivvzjfJvY+3mDQAAAADAXuJkRqOmbVvJnwzyX+Wr0c+vFzy8/v2N/+/dvE1HV8Ns99tcYjfM6weCT4O7YhjlgRR3n7Zq3FDld8pa8L4q/dQVx7dxm+ND755u2U/TN8enRNlfAqZ35soEAAAAoNrWPvR3STb8PJ0dPHK71mMCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGCv2cYtx2bvVUppPvjzUaVUrecIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwmS8BAAD//zwQy/Q=") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x803) lseek(r4, 0x0, 0x2) statx(r0, 0x0, 0x0, 0x40, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000800)}], 0x3, &(0x7f0000000ec0)=[@rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, r5}}}], 0xc0}}], 0x1, 0x8000) r6 = open(&(0x7f0000000000)='./bus\x00', 0x125000, 0x0) sendfile(r4, r6, 0x0, 0x1dd00) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x41, 0x3, 0x230, 0x0, 0x19, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @dev, 0x0, 0x0, 'wlan1\x00', 'wg1\x00'}, 0x0, 0xa8, 0xc8, 0x0, {0x0, 0xffffffffa0028000}, [@common=@unspec=@quota={{0x38}}]}, @unspec=@TRACE={0x20}}, {{@ip={@empty, @empty, 0x0, 0x0, 'veth0_vlan\x00', 'netpci0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x290) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r8, 0x89f1, 0x0) 14:39:26 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0xf, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x5}}, &(0x7f0000000200)='syzkaller\x00'}, 0x90) [ 44.812048][ T3387] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 44.822467][ T3087] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.836167][ T3389] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 14:39:26 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB=',\nN'], 0x31) 14:39:26 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0xf, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x5}}, &(0x7f0000000200)='syzkaller\x00'}, 0x90) [ 44.891221][ T3397] loop3: detected capacity change from 0 to 128 14:39:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r0, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$eventfd(r1, &(0x7f0000000340), 0x8) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x12, r3, 0x1000000000000) 14:39:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x3c, r1, 0x221, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}]}, 0x3c}}, 0x0) 14:39:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r0, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$eventfd(r1, &(0x7f0000000340), 0x8) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x12, r3, 0x1000000000000) 14:39:26 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0xf, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x5}}, &(0x7f0000000200)='syzkaller\x00'}, 0x90) 14:39:26 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB=',\nN'], 0x31) 14:39:26 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0xf, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x5}}, &(0x7f0000000200)='syzkaller\x00'}, 0x90) 14:39:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x3c, r1, 0x221, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}]}, 0x3c}}, 0x0) 14:39:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) dup2(r0, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$eventfd(r1, &(0x7f0000000340), 0x8) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r2, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x12, r3, 0x1000000000000) [ 45.019431][ T27] audit: type=1400 audit(1705070366.443:147): avc: denied { read } for pid=3409 comm="syz-executor.5" dev="nsfs" ino=4026532392 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 14:39:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[], 0x48, 0xffffffffffffffff) setfsgid(0xee00) [ 45.074032][ T27] audit: type=1400 audit(1705070366.443:148): avc: denied { open } for pid=3409 comm="syz-executor.5" path="net:[4026532392]" dev="nsfs" ino=4026532392 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 45.179331][ T27] audit: type=1400 audit(1705070366.603:149): avc: denied { ioctl } for pid=3396 comm="syz-executor.3" path="socket:[3915]" dev="sockfs" ino=3915 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 14:39:26 executing program 1: listen(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./bus\x00', 0x2000000, &(0x7f0000000100)=ANY=[], 0x1, 0x11ed, &(0x7f0000000300)="$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") r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x7fb) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1080fc4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x80000009) 14:39:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x3c, r1, 0x221, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}]}, 0x3c}}, 0x0) 14:39:26 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000001f80)=""/225, 0x2e, 0xe1, 0xa}, 0x20) 14:39:26 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000f4a000/0x1000)=nil], 0x0, &(0x7f0000000240), 0x0) 14:39:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[], 0x48, 0xffffffffffffffff) setfsgid(0xee00) 14:39:26 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000001f80)=""/225, 0x2e, 0xe1, 0xa}, 0x20) 14:39:26 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000f4a000/0x1000)=nil], 0x0, &(0x7f0000000240), 0x0) 14:39:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[], 0x48, 0xffffffffffffffff) setfsgid(0xee00) 14:39:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x3c, r1, 0x221, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}]}, 0x3c}}, 0x0) 14:39:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[], 0x48, 0xffffffffffffffff) setfsgid(0xee00) 14:39:26 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000001f80)=""/225, 0x2e, 0xe1, 0xa}, 0x20) 14:39:26 executing program 5: listen(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./bus\x00', 0x2000000, &(0x7f0000000100)=ANY=[], 0x1, 0x11ed, &(0x7f0000000300)="$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") r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x7fb) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1080fc4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x80000009) 14:39:26 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000f4a000/0x1000)=nil], 0x0, &(0x7f0000000240), 0x0) 14:39:26 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000001f80)=""/225, 0x2e, 0xe1, 0xa}, 0x20) 14:39:26 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000f4a000/0x1000)=nil], 0x0, &(0x7f0000000240), 0x0) 14:39:27 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) close(r0) 14:39:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv6_newnexthop={0x3c, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP_TYPE={0x6, 0x7, 0x4}, @NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x8, 0x12}}, @NHA_ID={0x8, 0x6, 0xf2}, @NHA_OIF={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:39:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv6_newnexthop={0x3c, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP_TYPE={0x6, 0x7, 0x4}, @NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x8, 0x12}}, @NHA_ID={0x8, 0x6, 0xf2}, @NHA_OIF={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:39:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@polexpire={0xcc, 0x1b, 0x211, 0x0, 0x0, {{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) [ 45.642148][ T3445] loop1: detected capacity change from 0 to 8192 [ 45.712003][ T3451] loop5: detected capacity change from 0 to 8192 14:39:27 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./bus\x00', 0xa08886, &(0x7f0000000800)=ANY=[@ANYRES32=0x0], 0x1, 0x2b4, &(0x7f00000012c0)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x803) lseek(r4, 0x0, 0x2) statx(r0, 0x0, 0x0, 0x40, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000800)}], 0x3, &(0x7f0000000ec0)=[@rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, r5}}}], 0xc0}}], 0x1, 0x8000) r6 = open(&(0x7f0000000000)='./bus\x00', 0x125000, 0x0) sendfile(r4, r6, 0x0, 0x1dd00) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x41, 0x3, 0x230, 0x0, 0x19, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @dev, 0x0, 0x0, 'wlan1\x00', 'wg1\x00'}, 0x0, 0xa8, 0xc8, 0x0, {0x0, 0xffffffffa0028000}, [@common=@unspec=@quota={{0x38}}]}, @unspec=@TRACE={0x20}}, {{@ip={@empty, @empty, 0x0, 0x0, 'veth0_vlan\x00', 'netpci0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x290) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r8, 0x89f1, 0x0) 14:39:27 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) close(r0) 14:39:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv6_newnexthop={0x3c, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP_TYPE={0x6, 0x7, 0x4}, @NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x8, 0x12}}, @NHA_ID={0x8, 0x6, 0xf2}, @NHA_OIF={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:39:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@polexpire={0xcc, 0x1b, 0x211, 0x0, 0x0, {{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) 14:39:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv6_newnexthop={0x3c, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP_TYPE={0x6, 0x7, 0x4}, @NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x8, 0x12}}, @NHA_ID={0x8, 0x6, 0xf2}, @NHA_OIF={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 14:39:27 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) close(r0) 14:39:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@polexpire={0xcc, 0x1b, 0x211, 0x0, 0x0, {{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) [ 46.023629][ T3476] loop3: detected capacity change from 0 to 128 14:39:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@polexpire={0xcc, 0x1b, 0x211, 0x0, 0x0, {{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) 14:39:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="7c3b6add", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000000)=0x8) sendmmsg$inet_sctp(r2, &(0x7f00000026c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 14:39:27 executing program 2: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0105500, &(0x7f0000000000)={0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x71, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={r3, 0x0, 0x800}, 0x10) 14:39:27 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) close(r0) 14:39:27 executing program 0: iopl(0x3) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x10000b}, 0x20) 14:39:27 executing program 0: iopl(0x3) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x10000b}, 0x20) 14:39:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="7c3b6add", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000000)=0x8) sendmmsg$inet_sctp(r2, &(0x7f00000026c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 14:39:27 executing program 2: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0105500, &(0x7f0000000000)={0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x71, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={r3, 0x0, 0x800}, 0x10) 14:39:27 executing program 0: iopl(0x3) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x10000b}, 0x20) 14:39:27 executing program 5: listen(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./bus\x00', 0x2000000, &(0x7f0000000100)=ANY=[], 0x1, 0x11ed, &(0x7f0000000300)="$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") r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x7fb) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1080fc4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x80000009) 14:39:27 executing program 1: listen(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./bus\x00', 0x2000000, &(0x7f0000000100)=ANY=[], 0x1, 0x11ed, &(0x7f0000000300)="$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") r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x7fb) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1080fc4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x80000009) 14:39:27 executing program 0: iopl(0x3) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x10000b}, 0x20) 14:39:27 executing program 2: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0105500, &(0x7f0000000000)={0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x71, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={r3, 0x0, 0x800}, 0x10) 14:39:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="7c3b6add", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000000)=0x8) sendmmsg$inet_sctp(r2, &(0x7f00000026c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 14:39:28 executing program 2: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0105500, &(0x7f0000000000)={0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x71, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={r3, 0x0, 0x800}, 0x10) 14:39:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="7c3b6add", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000000)=0x8) sendmmsg$inet_sctp(r2, &(0x7f00000026c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 14:39:28 executing program 2: r0 = socket(0x1d, 0x2, 0x6) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r2, 0x8000000000000002}, 0x18) sendmmsg$unix(r0, &(0x7f0000005600)=[{{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="e7", 0x1}, {&(0x7f00000001c0)="ed09d27afc0256", 0x7}], 0x2}}, {{&(0x7f0000001540)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x4004071) 14:39:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="7c3b6add", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000000)=0x8) sendmmsg$inet_sctp(r2, &(0x7f00000026c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 14:39:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="7c3b6add", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000000)=0x8) sendmmsg$inet_sctp(r2, &(0x7f00000026c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) [ 46.665806][ T3511] loop5: detected capacity change from 0 to 8192 [ 46.684360][ T3514] loop1: detected capacity change from 0 to 8192 14:39:28 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./bus\x00', 0xa08886, &(0x7f0000000800)=ANY=[@ANYRES32=0x0], 0x1, 0x2b4, &(0x7f00000012c0)="$eJzs3E1oU1kUwPHTj2k7HdqEYRiYgRmPdqMijyZroQ3Sihho0UaqBeHVvmjIMwl5IZoiTQShGxdu/FqrIFIoiAtBKHXhSlqkOxfuuuvCurKI9Ema1CY1bbWGptj/b5Eccu653PvuyyO5IW/h6K3L0bBjhM2U1LfUSX235GSpTrxSL6tycujK5Jv/Tp89dzIQDPacUu0NDPj8qtq+b2ro2sSB6dQfZ561v2iWGe/5hUX//MzfM/8sLA9cijgacTQWX1ZTh+PxlDlsWzpyx4kaqv22ZTqWRmKOlUyV5sN2PJHIqBkbaWtNJC3HUTOW0aiV0VRcU8mMmhfNSEwNw9C2VsHmJtL3AxtnQ0+WXFcWU69dtzknruvmX2zZweGhxlbW33VL1v9mrYeEHVRyUW8RscfToXSo8FzIB8ISEVss6RSPfJb8OeI+mHRXTpX841X/ZHDu8KuXquqVMTtbrM+mQw3l9T7xiLdQU1CIe08Ee3xaUF7/m7SW1vvFI39VrvdXrG+Sgx0l9YZ4ZO6CxMWW2an9H+f7xu+u1o/5VI/1BdfV/y4ja4fp8YcarQ8AAAAAAAAAANth6FcV9++NfIMbo6rati5fqC/9faC/2Of6/fnOivvzjfJvY+3mDQAAAADAXuJkRqOmbVvJnwzyX+Wr0c+vFzy8/v2N/+/dvE1HV8Ns99tcYjfM6weCT4O7YhjlgRR3n7Zq3FDld8pa8L4q/dQVx7dxm+ND755u2U/TN8enRNlfAqZ35soEAAAAoNrWPvR3STb8PJ0dPHK71mMCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGCv2cYtx2bvVUppPvjzUaVUrecIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwmS8BAAD//zwQy/Q=") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x803) lseek(r4, 0x0, 0x2) statx(r0, 0x0, 0x0, 0x40, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000800)}], 0x3, &(0x7f0000000ec0)=[@rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, r5}}}], 0xc0}}], 0x1, 0x8000) r6 = open(&(0x7f0000000000)='./bus\x00', 0x125000, 0x0) sendfile(r4, r6, 0x0, 0x1dd00) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x41, 0x3, 0x230, 0x0, 0x19, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @dev, 0x0, 0x0, 'wlan1\x00', 'wg1\x00'}, 0x0, 0xa8, 0xc8, 0x0, {0x0, 0xffffffffa0028000}, [@common=@unspec=@quota={{0x38}}]}, @unspec=@TRACE={0x20}}, {{@ip={@empty, @empty, 0x0, 0x0, 'veth0_vlan\x00', 'netpci0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x290) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r8, 0x89f1, 0x0) [ 47.110585][ T3534] loop3: detected capacity change from 0 to 128 14:39:28 executing program 5: listen(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./bus\x00', 0x2000000, &(0x7f0000000100)=ANY=[], 0x1, 0x11ed, &(0x7f0000000300)="$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") r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x7fb) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1080fc4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x80000009) 14:39:28 executing program 1: listen(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./bus\x00', 0x2000000, &(0x7f0000000100)=ANY=[], 0x1, 0x11ed, &(0x7f0000000300)="$eJzs3EGLW1UUB/CTsbbj1E5GrdUWxItudPNoZuFGN0GmIA0obSO0gvBqEw15JsO8MBARO67c+jnEpTtB3OlmNn4Gd7Nx2YX4xLxqOyWiQ5nJMPx+mxy47889h0DghtzsvfX1p8N+mfXzSSw1GrG0GZHupUixFH/bidff/Onnl67fvHW13elsXEvpSvtG642U0urLP3zw+bev/Dg5+/53q9+fid21D/d+W/9198Luxb0/bnwyKNOgTKPxJOXp9ng8yW8XvXRnUA6zlN4rennZS4NR2dvat94vxpub05Qv39+9TPlomoa9aZqM02RrmvKP88EoZVmWzq0Ej6P7zb2qqiKq6sk4HVVVVU/FSpyNp+NcrEYz1uKZeDaei/PxfFyIF+LFuDh7atF9AwAAAAAAAAAAAAAAAAAAwMni/j8AAAAAAAAAAAAAAAAAAAAs3vWbt662O52NayktRxRfbXe3u/Vrvd7uxyCK6MXlaMbvMbv9X6vrK+90Ni6nmbX4srh7P393u/vE/nxr9ncCc/OtOp/258/EysP59WjG+fn59bn55Xjt1YfyWTTjl49iHEXcib+yD/JftFJ6+93OI/lLs+cAAADgJMjSP+ae37Ps39br/AG+H3jkfH0qLp1a7OxElNPPhnlR9LYOrTgdh77FfxaxU0+74Db+X9Goe905tC0ax2VSxTEuFvqxxBF58KYvuhMAAAAAAAAAAAAO4ih+TrjoGQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAP9mBYwEAAAAAYf7WaXRsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8FUAAAD//4LDy7U=") r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x7fb) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1080fc4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x80000009) 14:39:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="7c3b6add", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000000)=0x8) sendmmsg$inet_sctp(r2, &(0x7f00000026c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 14:39:29 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 47.523805][ T3538] loop5: detected capacity change from 0 to 8192 14:39:29 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:39:29 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:39:29 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:39:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000a7f300000000000002000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010005081000414900400a040800", 0xb6}], 0x1) 14:39:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FIONREAD(r0, 0x40045431, &(0x7f0000001140)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r1, 0x541d, 0x0) 14:39:29 executing program 2: r0 = socket(0x1d, 0x2, 0x6) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r2, 0x8000000000000002}, 0x18) sendmmsg$unix(r0, &(0x7f0000005600)=[{{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="e7", 0x1}, {&(0x7f00000001c0)="ed09d27afc0256", 0x7}], 0x2}}, {{&(0x7f0000001540)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x4004071) [ 47.699431][ T3540] loop1: detected capacity change from 0 to 8192 14:39:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FIONREAD(r0, 0x40045431, &(0x7f0000001140)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r1, 0x541d, 0x0) 14:39:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000a7f300000000000002000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010005081000414900400a040800", 0xb6}], 0x1) 14:39:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000a7f300000000000002000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010005081000414900400a040800", 0xb6}], 0x1) 14:39:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FIONREAD(r0, 0x40045431, &(0x7f0000001140)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r1, 0x541d, 0x0) 14:39:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000a7f300000000000002000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010005081000414900400a040800", 0xb6}], 0x1) 14:39:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FIONREAD(r0, 0x40045431, &(0x7f0000001140)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r1, 0x541d, 0x0) 14:39:29 executing program 0: r0 = socket(0x1d, 0x2, 0x6) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r2, 0x8000000000000002}, 0x18) sendmmsg$unix(r0, &(0x7f0000005600)=[{{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="e7", 0x1}, {&(0x7f00000001c0)="ed09d27afc0256", 0x7}], 0x2}}, {{&(0x7f0000001540)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x4004071) 14:39:29 executing program 4: r0 = socket(0x1d, 0x3, 0x1) getsockopt$nfc_llcp(r0, 0x65, 0x2, 0x0, 0x20000002) 14:39:29 executing program 4: r0 = socket(0x1d, 0x3, 0x1) getsockopt$nfc_llcp(r0, 0x65, 0x2, 0x0, 0x20000002) 14:39:29 executing program 4: r0 = socket(0x1d, 0x3, 0x1) getsockopt$nfc_llcp(r0, 0x65, 0x2, 0x0, 0x20000002) 14:39:29 executing program 4: r0 = socket(0x1d, 0x3, 0x1) getsockopt$nfc_llcp(r0, 0x65, 0x2, 0x0, 0x20000002) 14:39:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000600)={'team_slave_1\x00', &(0x7f0000000500)=@ethtool_regs={0x16}}) 14:39:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000600)={'team_slave_1\x00', &(0x7f0000000500)=@ethtool_regs={0x16}}) 14:39:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000600)={'team_slave_1\x00', &(0x7f0000000500)=@ethtool_regs={0x16}}) 14:39:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000600)={'team_slave_1\x00', &(0x7f0000000500)=@ethtool_regs={0x16}}) 14:39:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x80, 0x2, 0x7ff, 0xd}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x2}, 0x38) 14:39:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x80, 0x2, 0x7ff, 0xd}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x2}, 0x38) 14:39:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x80, 0x2, 0x7ff, 0xd}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x2}, 0x38) 14:39:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x80, 0x2, 0x7ff, 0xd}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x2}, 0x38) 14:39:29 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./bus\x00', 0xa08886, &(0x7f0000000800)=ANY=[@ANYRES32=0x0], 0x1, 0x2b4, &(0x7f00000012c0)="$eJzs3E1oU1kUwPHTj2k7HdqEYRiYgRmPdqMijyZroQ3Sihho0UaqBeHVvmjIMwl5IZoiTQShGxdu/FqrIFIoiAtBKHXhSlqkOxfuuuvCurKI9Ema1CY1bbWGptj/b5Eccu653PvuyyO5IW/h6K3L0bBjhM2U1LfUSX235GSpTrxSL6tycujK5Jv/Tp89dzIQDPacUu0NDPj8qtq+b2ro2sSB6dQfZ561v2iWGe/5hUX//MzfM/8sLA9cijgacTQWX1ZTh+PxlDlsWzpyx4kaqv22ZTqWRmKOlUyV5sN2PJHIqBkbaWtNJC3HUTOW0aiV0VRcU8mMmhfNSEwNw9C2VsHmJtL3AxtnQ0+WXFcWU69dtzknruvmX2zZweGhxlbW33VL1v9mrYeEHVRyUW8RscfToXSo8FzIB8ISEVss6RSPfJb8OeI+mHRXTpX841X/ZHDu8KuXquqVMTtbrM+mQw3l9T7xiLdQU1CIe08Ee3xaUF7/m7SW1vvFI39VrvdXrG+Sgx0l9YZ4ZO6CxMWW2an9H+f7xu+u1o/5VI/1BdfV/y4ja4fp8YcarQ8AAAAAAAAAANth6FcV9++NfIMbo6rati5fqC/9faC/2Of6/fnOivvzjfJvY+3mDQAAAADAXuJkRqOmbVvJnwzyX+Wr0c+vFzy8/v2N/+/dvE1HV8Ns99tcYjfM6weCT4O7YhjlgRR3n7Zq3FDld8pa8L4q/dQVx7dxm+ND755u2U/TN8enRNlfAqZ35soEAAAAoNrWPvR3STb8PJ0dPHK71mMCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGCv2cYtx2bvVUppPvjzUaVUrecIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwmS8BAAD//zwQy/Q=") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x803) lseek(r4, 0x0, 0x2) statx(r0, 0x0, 0x0, 0x40, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000800)}], 0x3, &(0x7f0000000ec0)=[@rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, r5}}}], 0xc0}}], 0x1, 0x8000) r6 = open(&(0x7f0000000000)='./bus\x00', 0x125000, 0x0) sendfile(r4, r6, 0x0, 0x1dd00) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x41, 0x3, 0x230, 0x0, 0x19, 0x0, 0x0, 0x0, 0x2e8, 0x1f0, 0x1f0, 0x2e8, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @dev, 0x0, 0x0, 'wlan1\x00', 'wg1\x00'}, 0x0, 0xa8, 0xc8, 0x0, {0x0, 0xffffffffa0028000}, [@common=@unspec=@quota={{0x38}}]}, @unspec=@TRACE={0x20}}, {{@ip={@empty, @empty, 0x0, 0x0, 'veth0_vlan\x00', 'netpci0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x290) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r8, 0x89f1, 0x0) 14:39:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x5}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000200)="11926d6c", 0x4}], 0x1}}], 0x1, 0x0) 14:39:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) time(0x0) 14:39:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x5}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000200)="11926d6c", 0x4}], 0x1}}], 0x1, 0x0) 14:39:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_REMOTE={0x8, 0x2, @rand_addr=0x64010100}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) [ 48.392953][ T3599] loop3: detected capacity change from 0 to 128 14:39:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x5}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000200)="11926d6c", 0x4}], 0x1}}], 0x1, 0x0) 14:39:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x5}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000200)="11926d6c", 0x4}], 0x1}}], 0x1, 0x0) 14:39:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) time(0x0) 14:39:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) time(0x0) 14:39:30 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000340), 0x10) 14:39:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_REMOTE={0x8, 0x2, @rand_addr=0x64010100}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) 14:39:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) time(0x0) 14:39:30 executing program 2: r0 = socket(0x1d, 0x2, 0x6) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r2, 0x8000000000000002}, 0x18) sendmmsg$unix(r0, &(0x7f0000005600)=[{{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="e7", 0x1}, {&(0x7f00000001c0)="ed09d27afc0256", 0x7}], 0x2}}, {{&(0x7f0000001540)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x4004071) 14:39:30 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000340), 0x10) 14:39:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_REMOTE={0x8, 0x2, @rand_addr=0x64010100}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) 14:39:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x14c, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@local}, {@in6=@remote, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x5c, 0x14, {{'cmac(aes)\x00'}, 0x80, 0x0, "3509fe8fd57fd44aa5074c50bc700e53"}}]}, 0x14c}}, 0x0) 14:39:30 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000340), 0x10) 14:39:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_REMOTE={0x8, 0x2, @rand_addr=0x64010100}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) 14:39:30 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000340), 0x10) 14:39:30 executing program 0: r0 = socket(0x1d, 0x2, 0x6) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r2, 0x8000000000000002}, 0x18) sendmmsg$unix(r0, &(0x7f0000005600)=[{{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="e7", 0x1}, {&(0x7f00000001c0)="ed09d27afc0256", 0x7}], 0x2}}, {{&(0x7f0000001540)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x4004071) 14:39:30 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c80)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001800128008000100677265000c00028008000100", @ANYRES32], 0x38}}, 0x0) r4 = getpid() sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}]}, 0x28}}, 0x0) 14:39:30 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)='./file0/file0\x00', 0xe, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x1) 14:39:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x14c, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@local}, {@in6=@remote, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x5c, 0x14, {{'cmac(aes)\x00'}, 0x80, 0x0, "3509fe8fd57fd44aa5074c50bc700e53"}}]}, 0x14c}}, 0x0) 14:39:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x14c, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@local}, {@in6=@remote, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x5c, 0x14, {{'cmac(aes)\x00'}, 0x80, 0x0, "3509fe8fd57fd44aa5074c50bc700e53"}}]}, 0x14c}}, 0x0) 14:39:30 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)='./file0/file0\x00', 0xe, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x1) 14:39:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x14c, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@local}, {@in6=@remote, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x5c, 0x14, {{'cmac(aes)\x00'}, 0x80, 0x0, "3509fe8fd57fd44aa5074c50bc700e53"}}]}, 0x14c}}, 0x0) 14:39:30 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)='./file0/file0\x00', 0xe, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x1) 14:39:30 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)='./file0/file0\x00', 0xe, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x1) 14:39:30 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)='./file0/file0\x00', 0xe, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x1) 14:39:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x90) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x9, 0x100005, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r2, &(0x7f0000000240), &(0x7f0000000980)=@tcp}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)='%-010d \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r2, &(0x7f0000000140), &(0x7f00000009c0)=""/4096}, 0x20) 14:39:30 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)='./file0/file0\x00', 0xe, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x1) 14:39:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x90) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x9, 0x100005, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r2, &(0x7f0000000240), &(0x7f0000000980)=@tcp}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)='%-010d \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r2, &(0x7f0000000140), &(0x7f00000009c0)=""/4096}, 0x20) 14:39:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x90) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x9, 0x100005, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r2, &(0x7f0000000240), &(0x7f0000000980)=@tcp}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)='%-010d \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r2, &(0x7f0000000140), &(0x7f00000009c0)=""/4096}, 0x20) 14:39:30 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f00000002c0)='./file0/file0\x00', 0xe, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x1) 14:39:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x18, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}, 0x18}}, 0x0) 14:39:30 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c80)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001800128008000100677265000c00028008000100", @ANYRES32], 0x38}}, 0x0) r4 = getpid() sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}]}, 0x28}}, 0x0) 14:39:30 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c80)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001800128008000100677265000c00028008000100", @ANYRES32], 0x38}}, 0x0) r4 = getpid() sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}]}, 0x28}}, 0x0) 14:39:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x18, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}, 0x18}}, 0x0) 14:39:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x90) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x9, 0x100005, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r2, &(0x7f0000000240), &(0x7f0000000980)=@tcp}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)='%-010d \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r2, &(0x7f0000000140), &(0x7f00000009c0)=""/4096}, 0x20) 14:39:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x18, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}, 0x18}}, 0x0) 14:39:30 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c80)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001800128008000100677265000c00028008000100", @ANYRES32], 0x38}}, 0x0) r4 = getpid() sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}]}, 0x28}}, 0x0) 14:39:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x18, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}, 0x18}}, 0x0) 14:39:30 executing program 3: bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000200)={@cgroup, 0xffffffffffffffff, 0x22, 0x2020, 0x0, @prog_fd}, 0x20) 14:39:30 executing program 3: bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000200)={@cgroup, 0xffffffffffffffff, 0x22, 0x2020, 0x0, @prog_fd}, 0x20) 14:39:31 executing program 2: r0 = socket(0x1d, 0x2, 0x6) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r2, 0x8000000000000002}, 0x18) sendmmsg$unix(r0, &(0x7f0000005600)=[{{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="e7", 0x1}, {&(0x7f00000001c0)="ed09d27afc0256", 0x7}], 0x2}}, {{&(0x7f0000001540)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x4004071) 14:39:31 executing program 3: bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000200)={@cgroup, 0xffffffffffffffff, 0x22, 0x2020, 0x0, @prog_fd}, 0x20) 14:39:31 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c80)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001800128008000100677265000c00028008000100", @ANYRES32], 0x38}}, 0x0) r4 = getpid() sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}]}, 0x28}}, 0x0) 14:39:31 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c80)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001800128008000100677265000c00028008000100", @ANYRES32], 0x38}}, 0x0) r4 = getpid() sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}]}, 0x28}}, 0x0) 14:39:31 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c80)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001800128008000100677265000c00028008000100", @ANYRES32], 0x38}}, 0x0) r4 = getpid() sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}]}, 0x28}}, 0x0) 14:39:31 executing program 3: bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000200)={@cgroup, 0xffffffffffffffff, 0x22, 0x2020, 0x0, @prog_fd}, 0x20) 14:39:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = io_uring_setup(0x17ba, &(0x7f00000004c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 49.901773][ T27] kauditd_printk_skb: 25 callbacks suppressed [ 49.901841][ T27] audit: type=1400 audit(1705070371.323:175): avc: denied { create } for pid=3713 comm="syz-executor.3" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 14:39:31 executing program 0: r0 = socket(0x1d, 0x2, 0x6) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r2, 0x8000000000000002}, 0x18) sendmmsg$unix(r0, &(0x7f0000005600)=[{{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="e7", 0x1}, {&(0x7f00000001c0)="ed09d27afc0256", 0x7}], 0x2}}, {{&(0x7f0000001540)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x4004071) 14:39:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = io_uring_setup(0x17ba, &(0x7f00000004c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 14:39:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = io_uring_setup(0x17ba, &(0x7f00000004c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 14:39:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = io_uring_setup(0x17ba, &(0x7f00000004c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 14:39:31 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x420}, 0x420}}, 0x0) 14:39:31 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x420}, 0x420}}, 0x0) 14:39:31 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x420}, 0x420}}, 0x0) [ 50.174440][ T27] audit: type=1400 audit(1705070371.593:176): avc: denied { nlmsg_write } for pid=3724 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 14:39:31 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x420}, 0x420}}, 0x0) 14:39:31 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c80)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001800128008000100677265000c00028008000100", @ANYRES32], 0x38}}, 0x0) r4 = getpid() sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}]}, 0x28}}, 0x0) 14:39:31 executing program 3: sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\b\x00', @ANYBLOB="0000000000000000000002000000060006000000000008"], 0x24}}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0xa000032a) readv(r0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/256, 0x10}], 0x2) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) 14:39:31 executing program 3: sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\b\x00', @ANYBLOB="0000000000000000000002000000060006000000000008"], 0x24}}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0xa000032a) readv(r0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/256, 0x10}], 0x2) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) [ 50.306129][ T3700] syz-executor.5 (3700) used greatest stack depth: 11360 bytes left 14:39:31 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c80)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001800128008000100677265000c00028008000100", @ANYRES32], 0x38}}, 0x0) r4 = getpid() sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}]}, 0x28}}, 0x0) 14:39:31 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c80)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001800128008000100677265000c00028008000100", @ANYRES32], 0x38}}, 0x0) r4 = getpid() sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}]}, 0x28}}, 0x0) 14:39:31 executing program 3: sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\b\x00', @ANYBLOB="0000000000000000000002000000060006000000000008"], 0x24}}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0xa000032a) readv(r0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/256, 0x10}], 0x2) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) 14:39:31 executing program 3: sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\b\x00', @ANYBLOB="0000000000000000000002000000060006000000000008"], 0x24}}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0xa000032a) readv(r0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/256, 0x10}], 0x2) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) 14:39:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) readahead(r0, 0x0, 0xffffffffffffffc1) 14:39:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) readahead(r0, 0x0, 0xffffffffffffffc1) 14:39:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) readahead(r0, 0x0, 0xffffffffffffffc1) 14:39:32 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 14:39:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) readahead(r0, 0x0, 0xffffffffffffffc1) 14:39:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@can_delroute={0x1c, 0x19, 0x509, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5}]}, 0x1c}}, 0x0) 14:39:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 14:39:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 14:39:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@can_delroute={0x1c, 0x19, 0x509, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5}]}, 0x1c}}, 0x0) 14:39:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 14:39:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@can_delroute={0x1c, 0x19, 0x509, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5}]}, 0x1c}}, 0x0) 14:39:32 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x7, 0x1, 0x9, 0x0, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) 14:39:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x2, 0x0) 14:39:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x900, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@ip_retopts={{0x10}}], 0x10}}], 0x300, 0x0) 14:39:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@can_delroute={0x1c, 0x19, 0x509, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5}]}, 0x1c}}, 0x0) 14:39:32 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x7, 0x1, 0x9, 0x0, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) 14:39:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="bc", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="e6", 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='2', 0x1, 0x0, 0x0, 0x0) close(r0) [ 50.923026][ T27] audit: type=1400 audit(1705070372.333:177): avc: denied { bind } for pid=3786 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 50.942729][ T27] audit: type=1400 audit(1705070372.333:178): avc: denied { name_bind } for pid=3786 comm="syz-executor.3" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 50.964890][ T27] audit: type=1400 audit(1705070372.333:179): avc: denied { node_bind } for pid=3786 comm="syz-executor.3" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 50.986904][ T27] audit: type=1400 audit(1705070372.333:180): avc: denied { write } for pid=3786 comm="syz-executor.3" laddr=::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 14:39:32 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="bc", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="e6", 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='2', 0x1, 0x0, 0x0, 0x0) close(r0) 14:39:32 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x7, 0x1, 0x9, 0x0, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) 14:39:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg$sock(r0, &(0x7f00000009c0)=[{{&(0x7f0000000540)=@hci={0x1f, 0x0, 0x3}, 0x80, 0x0, 0x0, &(0x7f00000007c0)=[@txtime={{0x18}}], 0x18}}], 0x1, 0x0) 14:39:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="bc", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="e6", 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='2', 0x1, 0x0, 0x0, 0x0) close(r0) 14:39:32 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x7, 0x1, 0x9, 0x0, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) [ 51.008456][ T27] audit: type=1400 audit(1705070372.333:181): avc: denied { name_connect } for pid=3786 comm="syz-executor.3" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 14:39:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg$sock(r0, &(0x7f00000009c0)=[{{&(0x7f0000000540)=@hci={0x1f, 0x0, 0x3}, 0x80, 0x0, 0x0, &(0x7f00000007c0)=[@txtime={{0x18}}], 0x18}}], 0x1, 0x0) 14:39:32 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="bc", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="e6", 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='2', 0x1, 0x0, 0x0, 0x0) close(r0) 14:39:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="bc", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="e6", 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='2', 0x1, 0x0, 0x0, 0x0) close(r0) 14:39:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6, @link_local}, 0x10) 14:39:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg$sock(r0, &(0x7f00000009c0)=[{{&(0x7f0000000540)=@hci={0x1f, 0x0, 0x3}, 0x80, 0x0, 0x0, &(0x7f00000007c0)=[@txtime={{0x18}}], 0x18}}], 0x1, 0x0) 14:39:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="bc", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="e6", 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='2', 0x1, 0x0, 0x0, 0x0) close(r0) 14:39:32 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="bc", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="e6", 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='2', 0x1, 0x0, 0x0, 0x0) close(r0) 14:39:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6, @link_local}, 0x10) 14:39:32 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000c80)=@newqdisc={0x98, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x68, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x1}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x4, 0x4}]}}]}, 0x98}}, 0x0) 14:39:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@security={'security\x00', 0xe, 0x4, 0x2c8, 0xffffffff, 0x150, 0x210, 0x0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@ip={@loopback, @remote, 0x0, 0x0, 'ip6tnl0\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@ip={@empty, @dev, 0x0, 0x0, 'batadv_slave_1\x00', 'wlan1\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x328) 14:39:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg$sock(r0, &(0x7f00000009c0)=[{{&(0x7f0000000540)=@hci={0x1f, 0x0, 0x3}, 0x80, 0x0, 0x0, &(0x7f00000007c0)=[@txtime={{0x18}}], 0x18}}], 0x1, 0x0) 14:39:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6, @link_local}, 0x10) 14:39:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x900, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@ip_retopts={{0x10}}], 0x10}}], 0x300, 0x0) [ 51.246823][ T27] audit: type=1400 audit(1705070372.663:182): avc: denied { ioctl } for pid=3816 comm="syz-executor.3" path="socket:[6217]" dev="sockfs" ino=6217 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 14:39:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6, @link_local}, 0x10) 14:39:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@security={'security\x00', 0xe, 0x4, 0x2c8, 0xffffffff, 0x150, 0x210, 0x0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@ip={@loopback, @remote, 0x0, 0x0, 'ip6tnl0\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@ip={@empty, @dev, 0x0, 0x0, 'batadv_slave_1\x00', 'wlan1\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x328) 14:39:33 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x54, 0x12, 0xe02d54afa6ad42bd, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "0a3f2602"}]}, 0x54}}, 0x0) 14:39:33 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000c80)=@newqdisc={0x98, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x68, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x1}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x4, 0x4}]}}]}, 0x98}}, 0x0) 14:39:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x900, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@ip_retopts={{0x10}}], 0x10}}], 0x300, 0x0) 14:39:33 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 14:39:33 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x54, 0x12, 0xe02d54afa6ad42bd, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "0a3f2602"}]}, 0x54}}, 0x0) 14:39:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@security={'security\x00', 0xe, 0x4, 0x2c8, 0xffffffff, 0x150, 0x210, 0x0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@ip={@loopback, @remote, 0x0, 0x0, 'ip6tnl0\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@ip={@empty, @dev, 0x0, 0x0, 'batadv_slave_1\x00', 'wlan1\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x328) 14:39:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x22}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0xe5, 0x4) listen(r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x22}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000840)={r2, &(0x7f0000000240), &(0x7f0000000080)=@tcp=r1}, 0x20) dup3(r0, r1, 0x0) 14:39:33 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000c80)=@newqdisc={0x98, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x68, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x1}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x4, 0x4}]}}]}, 0x98}}, 0x0) 14:39:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@security={'security\x00', 0xe, 0x4, 0x2c8, 0xffffffff, 0x150, 0x210, 0x0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@ip={@loopback, @remote, 0x0, 0x0, 'ip6tnl0\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@ip={@empty, @dev, 0x0, 0x0, 'batadv_slave_1\x00', 'wlan1\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x328) 14:39:33 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x54, 0x12, 0xe02d54afa6ad42bd, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "0a3f2602"}]}, 0x54}}, 0x0) 14:39:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x22}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0xe5, 0x4) listen(r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x22}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000840)={r2, &(0x7f0000000240), &(0x7f0000000080)=@tcp=r1}, 0x20) dup3(r0, r1, 0x0) 14:39:33 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000c80)=@newqdisc={0x98, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x68, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x8, 0x4]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x1}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x4, 0x4}]}}]}, 0x98}}, 0x0) 14:39:33 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x54, 0x12, 0xe02d54afa6ad42bd, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "0a3f2602"}]}, 0x54}}, 0x0) 14:39:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:33 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) syz_clone3(&(0x7f0000000140)={0x201180400, 0x0, 0x0, 0x0, {0x23}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 14:39:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x22}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0xe5, 0x4) listen(r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x22}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000840)={r2, &(0x7f0000000240), &(0x7f0000000080)=@tcp=r1}, 0x20) dup3(r0, r1, 0x0) 14:39:33 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) syz_clone3(&(0x7f0000000140)={0x201180400, 0x0, 0x0, 0x0, {0x23}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 14:39:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x22}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0xe5, 0x4) listen(r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x22}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000840)={r2, &(0x7f0000000240), &(0x7f0000000080)=@tcp=r1}, 0x20) dup3(r0, r1, 0x0) 14:39:33 executing program 1: mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 14:39:33 executing program 1: mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 14:39:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x2c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x2, 0x0, 0x0, 0x0, {[@mptcp=@ack={0x5, 0x4}, @sack={0x5, 0x12, [0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 51.757652][ T27] audit: type=1400 audit(1705070373.183:183): avc: denied { getopt } for pid=3856 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 14:39:33 executing program 1: mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 14:39:33 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) syz_clone3(&(0x7f0000000140)={0x201180400, 0x0, 0x0, 0x0, {0x23}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 14:39:33 executing program 1: mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) [ 51.829343][ T27] audit: type=1400 audit(1705070373.203:184): avc: denied { name_bind } for pid=3858 comm="syz-executor.0" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 51.862432][ T3875] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 14:39:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x2c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x2, 0x0, 0x0, 0x0, {[@mptcp=@ack={0x5, 0x4}, @sack={0x5, 0x12, [0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 14:39:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x77, 0x1501) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURB(r0, 0x4008550c, &(0x7f0000000080)) [ 51.910188][ T3875] syz-executor.4 (3875) used greatest stack depth: 10528 bytes left 14:39:33 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) syz_clone3(&(0x7f0000000140)={0x201180400, 0x0, 0x0, 0x0, {0x23}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 14:39:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x900, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@ip_retopts={{0x10}}], 0x10}}], 0x300, 0x0) 14:39:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x77, 0x1501) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURB(r0, 0x4008550c, &(0x7f0000000080)) [ 51.952497][ T3885] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 51.972468][ T3886] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 14:39:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x2c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x2, 0x0, 0x0, 0x0, {[@mptcp=@ack={0x5, 0x4}, @sack={0x5, 0x12, [0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 14:39:33 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_BINDTODEVICE(r0, 0x6, 0x3, 0x0, 0x2) 14:39:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x77, 0x1501) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURB(r0, 0x4008550c, &(0x7f0000000080)) [ 52.004036][ T3891] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 14:39:33 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_BINDTODEVICE(r0, 0x6, 0x3, 0x0, 0x2) 14:39:33 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x77, 0x1501) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURB(r0, 0x4008550c, &(0x7f0000000080)) [ 52.047804][ T3898] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 52.087670][ T3902] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. 14:39:33 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_BINDTODEVICE(r0, 0x6, 0x3, 0x0, 0x2) [ 52.118671][ T3903] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 14:39:33 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_BINDTODEVICE(r0, 0x6, 0x3, 0x0, 0x2) 14:39:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x2c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x2, 0x0, 0x0, 0x0, {[@mptcp=@ack={0x5, 0x4}, @sack={0x5, 0x12, [0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 14:39:33 executing program 1: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xa0028000}) epoll_pwait(r0, &(0x7f00000003c0)=[{}], 0x1, 0x0, 0x0, 0x0) 14:39:33 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 14:39:33 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="7800000018002507b9409b14ffff00000204be04020b06050e020909430005003f00064c0a0000000d0085a168d0bf46d32345653600648d0a000500eb16000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004a3200040016000b000a0000000000e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0x0) 14:39:33 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000002c0)={&(0x7f0000000200)={0x1, 0x0, 0x0, {}, {0x77359400}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "285b7b7792a1eb6e"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "000200000000000d"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000580)={0x1d, r1}, 0x10, &(0x7f0000000280)={&(0x7f0000000940)={0x1, 0xe3b, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "4210220097b2bb36662d7dd23a596afc470b759d7b9beb92abb8971fdf7268450b731d6d110917f27e538256a669fea5023441347712804650cc7d823600"}}, 0x80}}, 0x0) 14:39:33 executing program 1: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xa0028000}) epoll_pwait(r0, &(0x7f00000003c0)=[{}], 0x1, 0x0, 0x0, 0x0) 14:39:33 executing program 4: io_setup(0x1000, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x3, 0x3, &(0x7f00000000c0)=[{}, {}, {}], 0x0, 0x0) io_setup(0x4, &(0x7f0000000080)) io_setup(0x20, &(0x7f0000000180)) [ 52.468962][ T3912] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 52.504942][ T3914] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 14:39:33 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000002c0)={&(0x7f0000000200)={0x1, 0x0, 0x0, {}, {0x77359400}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "285b7b7792a1eb6e"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "000200000000000d"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000580)={0x1d, r1}, 0x10, &(0x7f0000000280)={&(0x7f0000000940)={0x1, 0xe3b, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "4210220097b2bb36662d7dd23a596afc470b759d7b9beb92abb8971fdf7268450b731d6d110917f27e538256a669fea5023441347712804650cc7d823600"}}, 0x80}}, 0x0) 14:39:33 executing program 1: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xa0028000}) epoll_pwait(r0, &(0x7f00000003c0)=[{}], 0x1, 0x0, 0x0, 0x0) [ 52.513131][ T3914] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 14:39:34 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="7800000018002507b9409b14ffff00000204be04020b06050e020909430005003f00064c0a0000000d0085a168d0bf46d32345653600648d0a000500eb16000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004a3200040016000b000a0000000000e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0x0) 14:39:34 executing program 1: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xa0028000}) epoll_pwait(r0, &(0x7f00000003c0)=[{}], 0x1, 0x0, 0x0, 0x0) 14:39:34 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000002c0)={&(0x7f0000000200)={0x1, 0x0, 0x0, {}, {0x77359400}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "285b7b7792a1eb6e"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "000200000000000d"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000580)={0x1d, r1}, 0x10, &(0x7f0000000280)={&(0x7f0000000940)={0x1, 0xe3b, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "4210220097b2bb36662d7dd23a596afc470b759d7b9beb92abb8971fdf7268450b731d6d110917f27e538256a669fea5023441347712804650cc7d823600"}}, 0x80}}, 0x0) 14:39:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:34 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000002c0)={&(0x7f0000000200)={0x1, 0x0, 0x0, {}, {0x77359400}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "285b7b7792a1eb6e"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "000200000000000d"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000580)={0x1d, r1}, 0x10, &(0x7f0000000280)={&(0x7f0000000940)={0x1, 0xe3b, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "4210220097b2bb36662d7dd23a596afc470b759d7b9beb92abb8971fdf7268450b731d6d110917f27e538256a669fea5023441347712804650cc7d823600"}}, 0x80}}, 0x0) 14:39:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:34 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="7800000018002507b9409b14ffff00000204be04020b06050e020909430005003f00064c0a0000000d0085a168d0bf46d32345653600648d0a000500eb16000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004a3200040016000b000a0000000000e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0x0) [ 52.616377][ T3933] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 52.624570][ T3933] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 14:39:34 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="7800000018002507b9409b14ffff00000204be04020b06050e020909430005003f00064c0a0000000d0085a168d0bf46d32345653600648d0a000500eb16000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004a3200040016000b000a0000000000e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0x0) 14:39:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) [ 52.673244][ T3943] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 52.681385][ T3943] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 52.703955][ T3946] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 52.712180][ T3946] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 14:39:34 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 14:39:34 executing program 4: io_setup(0x1000, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x3, 0x3, &(0x7f00000000c0)=[{}, {}, {}], 0x0, 0x0) io_setup(0x4, &(0x7f0000000080)) io_setup(0x20, &(0x7f0000000180)) 14:39:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:35 executing program 4: io_setup(0x1000, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x3, 0x3, &(0x7f00000000c0)=[{}, {}, {}], 0x0, 0x0) io_setup(0x4, &(0x7f0000000080)) io_setup(0x20, &(0x7f0000000180)) 14:39:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:36 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000002c0)={&(0x7f0000000200)={0x1, 0x0, 0x0, {}, {0x77359400}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "285b7b7792a1eb6e"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "000200000000000d"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000580)={0x1d, r1}, 0x10, &(0x7f0000000280)={&(0x7f0000000940)={0x1, 0xe3b, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "4210220097b2bb36662d7dd23a596afc470b759d7b9beb92abb8971fdf7268450b731d6d110917f27e538256a669fea5023441347712804650cc7d823600"}}, 0x80}}, 0x0) 14:39:36 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000002c0)={&(0x7f0000000200)={0x1, 0x0, 0x0, {}, {0x77359400}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "285b7b7792a1eb6e"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "000200000000000d"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000580)={0x1d, r1}, 0x10, &(0x7f0000000280)={&(0x7f0000000940)={0x1, 0xe3b, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "4210220097b2bb36662d7dd23a596afc470b759d7b9beb92abb8971fdf7268450b731d6d110917f27e538256a669fea5023441347712804650cc7d823600"}}, 0x80}}, 0x0) 14:39:36 executing program 4: io_setup(0x1000, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x3, 0x3, &(0x7f00000000c0)=[{}, {}, {}], 0x0, 0x0) io_setup(0x4, &(0x7f0000000080)) io_setup(0x20, &(0x7f0000000180)) 14:39:36 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f00000002c0)={&(0x7f0000000200)={0x1, 0x0, 0x0, {}, {0x77359400}, {0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "285b7b7792a1eb6e"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f00000000c0)={0x1, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "000200000000000d"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000580)={0x1d, r1}, 0x10, &(0x7f0000000280)={&(0x7f0000000940)={0x1, 0xe3b, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "4210220097b2bb36662d7dd23a596afc470b759d7b9beb92abb8971fdf7268450b731d6d110917f27e538256a669fea5023441347712804650cc7d823600"}}, 0x80}}, 0x0) 14:39:36 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000100)=""/247, 0xf7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000200)) tkill(r0, 0x7) 14:39:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0xd0}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x11}, 0x90) 14:39:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0xd0}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x11}, 0x90) 14:39:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0xd0}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x11}, 0x90) 14:39:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0xd0}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x11}, 0x90) 14:39:36 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f0000000400)="77a7472ea54119b694bea7a55e9b87b9e20506f6b19ec81dfa34ce8ec1a26995e7e6151c996c9dd191ded2b4abe97ecf72f33dbaf35f3542e9d671aeae1c397c55e1da1bb8", 0x45, 0x20008800, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x80) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 55.404035][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 55.404042][ T27] audit: type=1400 audit(1705070376.823:189): avc: denied { name_bind } for pid=4017 comm="syz-executor.2" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 14:39:36 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000100)=""/247, 0xf7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000200)) tkill(r0, 0x7) 14:39:36 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f0000000400)="77a7472ea54119b694bea7a55e9b87b9e20506f6b19ec81dfa34ce8ec1a26995e7e6151c996c9dd191ded2b4abe97ecf72f33dbaf35f3542e9d671aeae1c397c55e1da1bb8", 0x45, 0x20008800, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x80) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:39:37 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000100)=""/247, 0xf7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000200)) tkill(r0, 0x7) 14:39:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f0000000400)="77a7472ea54119b694bea7a55e9b87b9e20506f6b19ec81dfa34ce8ec1a26995e7e6151c996c9dd191ded2b4abe97ecf72f33dbaf35f3542e9d671aeae1c397c55e1da1bb8", 0x45, 0x20008800, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x80) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:39:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f0000000400)="77a7472ea54119b694bea7a55e9b87b9e20506f6b19ec81dfa34ce8ec1a26995e7e6151c996c9dd191ded2b4abe97ecf72f33dbaf35f3542e9d671aeae1c397c55e1da1bb8", 0x45, 0x20008800, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x80) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:39:37 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000100)=""/247, 0xf7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000200)) tkill(r0, 0x7) 14:39:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f0000000400)="77a7472ea54119b694bea7a55e9b87b9e20506f6b19ec81dfa34ce8ec1a26995e7e6151c996c9dd191ded2b4abe97ecf72f33dbaf35f3542e9d671aeae1c397c55e1da1bb8", 0x45, 0x20008800, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x80) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:39:37 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000100)=""/247, 0xf7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000200)) tkill(r0, 0x7) 14:39:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f0000000400)="77a7472ea54119b694bea7a55e9b87b9e20506f6b19ec81dfa34ce8ec1a26995e7e6151c996c9dd191ded2b4abe97ecf72f33dbaf35f3542e9d671aeae1c397c55e1da1bb8", 0x45, 0x20008800, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x80) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:39:37 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000100)=""/247, 0xf7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000200)) tkill(r0, 0x7) 14:39:37 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000100)=""/247, 0xf7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000200)) tkill(r0, 0x7) 14:39:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f0000000400)="77a7472ea54119b694bea7a55e9b87b9e20506f6b19ec81dfa34ce8ec1a26995e7e6151c996c9dd191ded2b4abe97ecf72f33dbaf35f3542e9d671aeae1c397c55e1da1bb8", 0x45, 0x20008800, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x80) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:39:37 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000100)=""/247, 0xf7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000200)) tkill(r0, 0x7) 14:39:37 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000100)=""/247, 0xf7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000200)) tkill(r0, 0x7) 14:39:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x25, &(0x7f0000000040)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 14:39:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x25, &(0x7f0000000040)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 14:39:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x25, &(0x7f0000000040)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 14:39:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x25, &(0x7f0000000040)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) [ 56.422155][ T27] audit: type=1400 audit(1705070377.843:190): avc: denied { shutdown } for pid=4083 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 14:39:37 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x81ff, 0x0) vmsplice(r0, 0x0, 0x0, 0xe) unshare(0x60060200) 14:39:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x1c, r1, 0x6ab2a6a3a1943b9d, 0x0, 0x0, {0x8}, [@TIPC_NLA_SOCK={0x8, 0x4, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}}, 0x0) 14:39:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x1c, r1, 0x6ab2a6a3a1943b9d, 0x0, 0x0, {0x8}, [@TIPC_NLA_SOCK={0x8, 0x4, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}}, 0x0) 14:39:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x1c, r1, 0x6ab2a6a3a1943b9d, 0x0, 0x0, {0x8}, [@TIPC_NLA_SOCK={0x8, 0x4, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}}, 0x0) 14:39:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x84, 0x24, &(0x7f0000000000)={0x0, @remote, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 14:39:38 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000100)=""/247, 0xf7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000200)) tkill(r0, 0x7) 14:39:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x1c, r1, 0x6ab2a6a3a1943b9d, 0x0, 0x0, {0x8}, [@TIPC_NLA_SOCK={0x8, 0x4, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}}, 0x0) 14:39:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x84, 0x24, &(0x7f0000000000)={0x0, @remote, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 14:39:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x4b, 0x2, [0x0, 0x0]}, 0xc) 14:39:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x84, 0x24, &(0x7f0000000000)={0x0, @remote, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 14:39:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x84, 0x24, &(0x7f0000000000)={0x0, @remote, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 14:39:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x4b, 0x2, [0x0, 0x0]}, 0xc) 14:39:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x0, @dev}, 0x80, 0x0}}, {{&(0x7f00000000c0)=@in6={0x2, 0x4e21, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000012c0)=[@txtime={{0x18}}], 0x18}}], 0x2, 0x0) 14:39:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x4b, 0x2, [0x0, 0x0]}, 0xc) 14:39:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x81}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x4b, 0x2, [0x0, 0x0]}, 0xc) 14:39:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x0, @dev}, 0x80, 0x0}}, {{&(0x7f00000000c0)=@in6={0x2, 0x4e21, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000012c0)=[@txtime={{0x18}}], 0x18}}], 0x2, 0x0) 14:39:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000200), 0x4) [ 56.684644][ T4123] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 56.699892][ T27] audit: type=1400 audit(1705070378.123:191): avc: denied { write } for pid=4121 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 14:39:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x0, @dev}, 0x80, 0x0}}, {{&(0x7f00000000c0)=@in6={0x2, 0x4e21, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000012c0)=[@txtime={{0x18}}], 0x18}}], 0x2, 0x0) 14:39:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000200), 0x4) 14:39:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x2f, 0x301, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 14:39:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xcc, 0x30, 0x1, 0x0, 0x0, {}, [{0xb8, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xcc}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r1}, 0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, 0x0, 0x4005) r3 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000280)={@ipv4={""/10, ""/2, @broadcast}, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1a, 0x2, 0x1, 0x9, 0x3300, 0x1, 0x3, '\x00', r4, r1, 0x3, 0x5, 0x5}, 0x48) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80d4) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x80000000}}, 0x1, 0x101}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x8000002}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x10001, 0x8, 0x8, 0x80, 0x1, 0x90, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) setsockopt$inet6_int(r6, 0x29, 0x3a, &(0x7f00000003c0)=0xe03, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x2200c041, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[], 0x10) sendto$inet6(r6, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x406f408, 0x0) 14:39:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000002140)=""/4092, &(0x7f0000001080)=0xffc) 14:39:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x0, @dev}, 0x80, 0x0}}, {{&(0x7f00000000c0)=@in6={0x2, 0x4e21, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000012c0)=[@txtime={{0x18}}], 0x18}}], 0x2, 0x0) 14:39:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x2f, 0x301, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 14:39:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000200), 0x4) 14:39:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000002140)=""/4092, &(0x7f0000001080)=0xffc) 14:39:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x19, 0x4, 0x4, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x5, 0x6, &(0x7f0000000240)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x8, 0xff1, &(0x7f0000001300)=""/4081}, 0x90) 14:39:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x2f, 0x301, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 14:39:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000200), 0x4) 14:39:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000002140)=""/4092, &(0x7f0000001080)=0xffc) 14:39:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x19, 0x4, 0x4, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x5, 0x6, &(0x7f0000000240)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x8, 0xff1, &(0x7f0000001300)=""/4081}, 0x90) 14:39:38 executing program 2: io_setup(0x5, &(0x7f0000000040)=0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080)='z', 0x1}]) 14:39:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x2f, 0x301, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 14:39:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000002140)=""/4092, &(0x7f0000001080)=0xffc) 14:39:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x19, 0x4, 0x4, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x5, 0x6, &(0x7f0000000240)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x8, 0xff1, &(0x7f0000001300)=""/4081}, 0x90) 14:39:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000000071002b000000000095000300"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 14:39:38 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:39:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x19, 0x4, 0x4, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x5, 0x6, &(0x7f0000000240)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x8, 0xff1, &(0x7f0000001300)=""/4081}, 0x90) 14:39:38 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 57.117351][ T27] audit: type=1400 audit(1705070378.533:192): avc: denied { read } for pid=4166 comm="syz-executor.2" path="socket:[6834]" dev="sockfs" ino=6834 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 14:39:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000000071002b000000000095000300"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 14:39:38 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000000071002b000000000095000300"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 14:39:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000000071002b000000000095000300"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 14:39:38 executing program 2: io_setup(0x5, &(0x7f0000000040)=0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080)='z', 0x1}]) 14:39:38 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:38 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:39:38 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:39:38 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:38 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:38 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:38 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:39 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:39 executing program 1: r0 = socket(0x1d, 0x3, 0x1) getsockopt$nfc_llcp(r0, 0x65, 0x5, 0x0, 0x20000002) 14:39:39 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:39 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:39 executing program 2: io_setup(0x5, &(0x7f0000000040)=0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080)='z', 0x1}]) 14:39:39 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:39 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:39 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:39 executing program 1: r0 = socket(0x1d, 0x3, 0x1) getsockopt$nfc_llcp(r0, 0x65, 0x5, 0x0, 0x20000002) 14:39:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x4c}}, 0x0) 14:39:39 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x80}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) 14:39:39 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) close(r0) 14:39:39 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x80}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) 14:39:39 executing program 1: r0 = socket(0x1d, 0x3, 0x1) getsockopt$nfc_llcp(r0, 0x65, 0x5, 0x0, 0x20000002) 14:39:39 executing program 2: io_setup(0x5, &(0x7f0000000040)=0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080)='z', 0x1}]) 14:39:39 executing program 1: r0 = socket(0x1d, 0x3, 0x1) getsockopt$nfc_llcp(r0, 0x65, 0x5, 0x0, 0x20000002) 14:39:39 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$getflags(r1, 0xb) 14:39:39 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x80}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) 14:39:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x4c}}, 0x0) 14:39:39 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@generic={&(0x7f0000000340)='\x00'}, 0x18) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x13, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x96, 0x0, &(0x7f00000000c0)) 14:39:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@ipv6_newnexthop={0x34, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @SEG6_LOCAL_ACTION={0x8}}, @NHA_OIF={0x8, 0x5, r2}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x8}]}, 0x34}}, 0x0) 14:39:39 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$getflags(r1, 0xb) 14:39:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x4c}}, 0x0) 14:39:39 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@generic={&(0x7f0000000340)='\x00'}, 0x18) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x13, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x96, 0x0, &(0x7f00000000c0)) 14:39:39 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x80}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) 14:39:39 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$getflags(r1, 0xb) 14:39:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESOCT, @ANYBLOB="9141dda87dfc7468514b9a72649500000000000000003f05000a0082828dced13389"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r1, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x14) 14:39:39 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@generic={&(0x7f0000000340)='\x00'}, 0x18) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x13, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x96, 0x0, &(0x7f00000000c0)) [ 58.001966][ T4247] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 14:39:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x4c}}, 0x0) 14:39:39 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$getflags(r1, 0xb) 14:39:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@ipv6_newnexthop={0x34, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @SEG6_LOCAL_ACTION={0x8}}, @NHA_OIF={0x8, 0x5, r2}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x8}]}, 0x34}}, 0x0) 14:39:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x14, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 14:39:39 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@generic={&(0x7f0000000340)='\x00'}, 0x18) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x13, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x96, 0x0, &(0x7f00000000c0)) 14:39:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socket(0xa, 0x3, 0x3a) syz_io_uring_setup(0x7667, &(0x7f0000000080)={0x0, 0x0, 0x13580}, 0x0, 0x0) syz_io_uring_setup(0x24f9, &(0x7f0000000080), 0x0, 0x0) syz_io_uring_setup(0x24fa, &(0x7f0000000080), 0x0, 0x0) socket(0x1e, 0x2, 0x0) pselect6(0x40, &(0x7f0000000180)={0x1ff}, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x24, 0x24, 0xf1d}, 0x24}}, 0x0) 14:39:39 executing program 1: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x6}, 0x20) 14:39:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x14, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 14:39:39 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000008c0)={0x53, 0x0, 0x1, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000006c0)='R', 0x0, 0x80000000, 0x0, 0x0, 0x0}) 14:39:39 executing program 1: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x6}, 0x20) [ 58.134315][ T4271] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 58.158702][ T27] audit: type=1400 audit(1705070379.573:193): avc: denied { map } for pid=4272 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7007 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 14:39:39 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000008c0)={0x53, 0x0, 0x1, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000006c0)='R', 0x0, 0x80000000, 0x0, 0x0, 0x0}) 14:39:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x14, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 14:39:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESOCT, @ANYBLOB="9141dda87dfc7468514b9a72649500000000000000003f05000a0082828dced13389"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r1, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x14) 14:39:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@ipv6_newnexthop={0x34, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @SEG6_LOCAL_ACTION={0x8}}, @NHA_OIF={0x8, 0x5, r2}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x8}]}, 0x34}}, 0x0) 14:39:39 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000008c0)={0x53, 0x0, 0x1, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000006c0)='R', 0x0, 0x80000000, 0x0, 0x0, 0x0}) 14:39:39 executing program 1: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x6}, 0x20) [ 58.183215][ T27] audit: type=1400 audit(1705070379.573:194): avc: denied { read write } for pid=4272 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7007 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 58.256910][ T27] audit: type=1400 audit(1705070379.593:195): avc: denied { read } for pid=4278 comm="syz-executor.3" name="sg0" dev="devtmpfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 58.271814][ T4294] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 14:39:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x14, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 14:39:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socket(0xa, 0x3, 0x3a) syz_io_uring_setup(0x7667, &(0x7f0000000080)={0x0, 0x0, 0x13580}, 0x0, 0x0) syz_io_uring_setup(0x24f9, &(0x7f0000000080), 0x0, 0x0) syz_io_uring_setup(0x24fa, &(0x7f0000000080), 0x0, 0x0) socket(0x1e, 0x2, 0x0) pselect6(0x40, &(0x7f0000000180)={0x1ff}, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x24, 0x24, 0xf1d}, 0x24}}, 0x0) 14:39:39 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000008c0)={0x53, 0x0, 0x1, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000006c0)='R', 0x0, 0x80000000, 0x0, 0x0, 0x0}) 14:39:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESOCT, @ANYBLOB="9141dda87dfc7468514b9a72649500000000000000003f05000a0082828dced13389"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r1, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x14) 14:39:39 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x1, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private0}}, @sadb_x_sa2={0x2, 0x13, 0xc}]}, 0x70}}, 0x0) 14:39:39 executing program 1: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x6}, 0x20) [ 58.280700][ T27] audit: type=1400 audit(1705070379.593:196): avc: denied { open } for pid=4278 comm="syz-executor.3" path="/dev/sg0" dev="devtmpfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 58.314119][ T27] audit: type=1400 audit(1705070379.593:197): avc: denied { ioctl } for pid=4278 comm="syz-executor.3" path="/dev/sg0" dev="devtmpfs" ino=111 ioctlcmd=0x2285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 14:39:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 14:39:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="7c3b6ac3cc3d156c576aa257dc745bd1ce0e78edddc8d3c73644df40fa871401738b1f47e527fdabee9648cd042a1b4345823ee681787192397d74b92d2f222abc7413e652bc932f702e55b10bedd622796cd76f03f7afc9ccb48fec27e0a426853438f2b22850383941d2672a7a8bc176f6c0ce0dd7bf498e31c1a71e0733116fc4d64fe12288", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) socket(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000180)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)={0x48, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x0}]}]}, 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r5, @ANYRESOCT=r7, @ANYRES64=r6, @ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r10], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) r11 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r10, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="00032cbd7000ffdbdf2505000000050038000100000008000600", @ANYRES32=0x0, @ANYBLOB="057c1bb78102fc5b5840c82203942edfa4a0136bec89456d3b11703ee797788d93227352bb325b2fb40f596c6aae9aa3d06b6fe6bc7f5b5c9e22b082e0d25834eb3e75009ce39892352979213e9cd251cd37c75fe9170bc4d5c0e4fefe9a2fa255bb287207fd9f94302689008ad7cbe6c14acb43f4948019e51735058a6521d18f5e60c495a22e2687ecd7517204b32f2310134b7dcc31ae454822d3f52c3b31e589e0ad8027815f58cd21773b118334fae0dda00abc326f485fd74d76c0f0ff507fa550d9e42be2d7f91298f7cd61f558b03a834d"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r11, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x40}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x5c}}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="3bb1ec56a3fe633706daa703116e10121929cecc2e244f4413d04f51dc48b87eb541760e8e48a09854d1a55385882a069ce0af5e8aa2523f598e0fac55809eee1178993a843b733e8ce4ef832f000000000000004f41dec653af1dc99c38f345f31fa4951acd389777a5719f4e612f2edf6df8a0e1fe090020969a517d7469c8f24183ae31fcc71bf29f2e9f206959037bc4f0ac0d0b574eb629e210", @ANYRES16=r11, @ANYBLOB="00022abd7000fbdbdf250e0000000800310003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r11, @ANYBLOB="014127bd7000ffdbdf00"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x804) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r11, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x48890}, 0x24000880) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r11, 0x200, 0x70bd29, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000010) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r11, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xf7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xac7b}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x8840) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000001a80)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="000026bd7000ffdbdf250600000008103c000300000008003a001343ffff080032000200000008000b000700000005002f0002000000003200c61680000500380000000000eaeeb8bf7dfd2b3e1d24381ba17d2a751c01c98115f57bb700000000000d62034300000000"], 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40001) 14:39:39 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x1, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private0}}, @sadb_x_sa2={0x2, 0x13, 0xc}]}, 0x70}}, 0x0) 14:39:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socket(0xa, 0x3, 0x3a) syz_io_uring_setup(0x7667, &(0x7f0000000080)={0x0, 0x0, 0x13580}, 0x0, 0x0) syz_io_uring_setup(0x24f9, &(0x7f0000000080), 0x0, 0x0) syz_io_uring_setup(0x24fa, &(0x7f0000000080), 0x0, 0x0) socket(0x1e, 0x2, 0x0) pselect6(0x40, &(0x7f0000000180)={0x1ff}, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x24, 0x24, 0xf1d}, 0x24}}, 0x0) 14:39:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@ipv6_newnexthop={0x34, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @SEG6_LOCAL_ACTION={0x8}}, @NHA_OIF={0x8, 0x5, r2}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x8}]}, 0x34}}, 0x0) 14:39:39 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x1, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private0}}, @sadb_x_sa2={0x2, 0x13, 0xc}]}, 0x70}}, 0x0) 14:39:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 14:39:39 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x1, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private0}}, @sadb_x_sa2={0x2, 0x13, 0xc}]}, 0x70}}, 0x0) 14:39:39 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(0x0) rt_tgsigqueueinfo(r0, r1, 0x1100, &(0x7f0000000000)={0x0, 0x0, 0xffffffc4}) 14:39:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 14:39:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x28}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000004000000000000000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x20, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x2814e}}, 0x20}}, 0x0) [ 58.476693][ T4321] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 58.492593][ T4328] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 14:39:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socket(0xa, 0x3, 0x3a) syz_io_uring_setup(0x7667, &(0x7f0000000080)={0x0, 0x0, 0x13580}, 0x0, 0x0) syz_io_uring_setup(0x24f9, &(0x7f0000000080), 0x0, 0x0) syz_io_uring_setup(0x24fa, &(0x7f0000000080), 0x0, 0x0) socket(0x1e, 0x2, 0x0) pselect6(0x40, &(0x7f0000000180)={0x1ff}, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x24, 0x24, 0xf1d}, 0x24}}, 0x0) 14:39:39 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(0x0) rt_tgsigqueueinfo(r0, r1, 0x1100, &(0x7f0000000000)={0x0, 0x0, 0xffffffc4}) [ 58.559733][ T4339] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 14:39:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 14:39:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESOCT, @ANYBLOB="9141dda87dfc7468514b9a72649500000000000000003f05000a0082828dced13389"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r1, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x14) 14:39:40 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0xe, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x39}]}, &(0x7f0000000000)='syzkaller\x00', 0x5}, 0x90) 14:39:40 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(0x0) rt_tgsigqueueinfo(r0, r1, 0x1100, &(0x7f0000000000)={0x0, 0x0, 0xffffffc4}) 14:39:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="a000000010003b0e2a1a86eb2636037f00000000", @ANYRES32=r1, @ANYBLOB="020000000000800080001200080001007674693674000200600004"], 0xa0}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}]}, 0x58}}, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) [ 58.613449][ T4339] 8021q: adding VLAN 0 to HW filter on device bond1 [ 58.635867][ T4339] bond1: entered promiscuous mode 14:39:40 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0xe, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x39}]}, &(0x7f0000000000)='syzkaller\x00', 0x5}, 0x90) 14:39:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x28}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000004000000000000000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x20, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x2814e}}, 0x20}}, 0x0) 14:39:40 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(0x0) rt_tgsigqueueinfo(r0, r1, 0x1100, &(0x7f0000000000)={0x0, 0x0, 0xffffffc4}) 14:39:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x28}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000004000000000000000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x20, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x2814e}}, 0x20}}, 0x0) [ 58.669050][ T4353] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 58.703046][ T4353] Zero length message leads to an empty skb 14:39:40 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0xe, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x39}]}, &(0x7f0000000000)='syzkaller\x00', 0x5}, 0x90) 14:39:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000006c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_ENCAP_DPORT={0x6}]}}}]}, 0x44}}, 0x0) 14:39:40 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0xe, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x39}]}, &(0x7f0000000000)='syzkaller\x00', 0x5}, 0x90) 14:39:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="a000000010003b0e2a1a86eb2636037f00000000", @ANYRES32=r1, @ANYBLOB="020000000000800080001200080001007674693674000200600004"], 0xa0}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}]}, 0x58}}, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) 14:39:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000006c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_ENCAP_DPORT={0x6}]}}}]}, 0x44}}, 0x0) [ 58.740101][ T4364] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 58.772337][ T4364] 8021q: adding VLAN 0 to HW filter on device bond1 14:39:40 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x9b375000) [ 58.808983][ T4362] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 14:39:40 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x9b375000) 14:39:40 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x9b375000) [ 58.852830][ T27] audit: type=1400 audit(1705070380.273:198): avc: denied { map } for pid=4378 comm="syz-executor.5" path="/dev/sg0" dev="devtmpfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 58.892550][ T4362] 8021q: adding VLAN 0 to HW filter on device bond2 14:39:40 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x9b375000) 14:39:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000006c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_ENCAP_DPORT={0x6}]}}}]}, 0x44}}, 0x0) 14:39:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="a000000010003b0e2a1a86eb2636037f00000000", @ANYRES32=r1, @ANYBLOB="020000000000800080001200080001007674693674000200600004"], 0xa0}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}]}, 0x58}}, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) [ 58.906992][ T4376] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 58.916536][ T4364] bond1: entered promiscuous mode [ 58.999486][ T4389] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 14:39:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="7c3b6ac3cc3d156c576aa257dc745bd1ce0e78edddc8d3c73644df40fa871401738b1f47e527fdabee9648cd042a1b4345823ee681787192397d74b92d2f222abc7413e652bc932f702e55b10bedd622796cd76f03f7afc9ccb48fec27e0a426853438f2b22850383941d2672a7a8bc176f6c0ce0dd7bf498e31c1a71e0733116fc4d64fe12288", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) socket(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000180)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)={0x48, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x0}]}]}, 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r5, @ANYRESOCT=r7, @ANYRES64=r6, @ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r10], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) r11 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r10, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="00032cbd7000ffdbdf2505000000050038000100000008000600", @ANYRES32=0x0, @ANYBLOB="057c1bb78102fc5b5840c82203942edfa4a0136bec89456d3b11703ee797788d93227352bb325b2fb40f596c6aae9aa3d06b6fe6bc7f5b5c9e22b082e0d25834eb3e75009ce39892352979213e9cd251cd37c75fe9170bc4d5c0e4fefe9a2fa255bb287207fd9f94302689008ad7cbe6c14acb43f4948019e51735058a6521d18f5e60c495a22e2687ecd7517204b32f2310134b7dcc31ae454822d3f52c3b31e589e0ad8027815f58cd21773b118334fae0dda00abc326f485fd74d76c0f0ff507fa550d9e42be2d7f91298f7cd61f558b03a834d"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r11, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x40}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x5c}}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="3bb1ec56a3fe633706daa703116e10121929cecc2e244f4413d04f51dc48b87eb541760e8e48a09854d1a55385882a069ce0af5e8aa2523f598e0fac55809eee1178993a843b733e8ce4ef832f000000000000004f41dec653af1dc99c38f345f31fa4951acd389777a5719f4e612f2edf6df8a0e1fe090020969a517d7469c8f24183ae31fcc71bf29f2e9f206959037bc4f0ac0d0b574eb629e210", @ANYRES16=r11, @ANYBLOB="00022abd7000fbdbdf250e0000000800310003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r11, @ANYBLOB="014127bd7000ffdbdf00"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x804) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r11, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x48890}, 0x24000880) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r11, 0x200, 0x70bd29, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000010) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r11, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xf7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xac7b}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x8840) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000001a80)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="000026bd7000ffdbdf250600000008103c000300000008003a001343ffff080032000200000008000b000700000005002f0002000000003200c61680000500380000000000eaeeb8bf7dfd2b3e1d24381ba17d2a751c01c98115f57bb700000000000d62034300000000"], 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40001) 14:39:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x28}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000004000000000000000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x20, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x2814e}}, 0x20}}, 0x0) 14:39:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000006c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_ENCAP_DPORT={0x6}]}}}]}, 0x44}}, 0x0) 14:39:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x28}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000004000000000000000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x20, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x2814e}}, 0x20}}, 0x0) 14:39:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) 14:39:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="a000000010003b0e2a1a86eb2636037f00000000", @ANYRES32=r1, @ANYBLOB="020000000000800080001200080001007674693674000200600004"], 0xa0}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}]}, 0x58}}, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) [ 59.279013][ T4337] syz-executor.1 (4337) used greatest stack depth: 10496 bytes left [ 59.300426][ T4399] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 59.315800][ T4400] loop5: detected capacity change from 0 to 2048 [ 59.319710][ T4399] 8021q: adding VLAN 0 to HW filter on device bond3 14:39:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="7c3b6ac3cc3d156c576aa257dc745bd1ce0e78edddc8d3c73644df40fa871401738b1f47e527fdabee9648cd042a1b4345823ee681787192397d74b92d2f222abc7413e652bc932f702e55b10bedd622796cd76f03f7afc9ccb48fec27e0a426853438f2b22850383941d2672a7a8bc176f6c0ce0dd7bf498e31c1a71e0733116fc4d64fe12288", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) socket(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000180)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)={0x48, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x0}]}]}, 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r5, @ANYRESOCT=r7, @ANYRES64=r6, @ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r10], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) r11 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r10, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="00032cbd7000ffdbdf2505000000050038000100000008000600", @ANYRES32=0x0, @ANYBLOB="057c1bb78102fc5b5840c82203942edfa4a0136bec89456d3b11703ee797788d93227352bb325b2fb40f596c6aae9aa3d06b6fe6bc7f5b5c9e22b082e0d25834eb3e75009ce39892352979213e9cd251cd37c75fe9170bc4d5c0e4fefe9a2fa255bb287207fd9f94302689008ad7cbe6c14acb43f4948019e51735058a6521d18f5e60c495a22e2687ecd7517204b32f2310134b7dcc31ae454822d3f52c3b31e589e0ad8027815f58cd21773b118334fae0dda00abc326f485fd74d76c0f0ff507fa550d9e42be2d7f91298f7cd61f558b03a834d"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r11, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x40}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x5c}}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="3bb1ec56a3fe633706daa703116e10121929cecc2e244f4413d04f51dc48b87eb541760e8e48a09854d1a55385882a069ce0af5e8aa2523f598e0fac55809eee1178993a843b733e8ce4ef832f000000000000004f41dec653af1dc99c38f345f31fa4951acd389777a5719f4e612f2edf6df8a0e1fe090020969a517d7469c8f24183ae31fcc71bf29f2e9f206959037bc4f0ac0d0b574eb629e210", @ANYRES16=r11, @ANYBLOB="00022abd7000fbdbdf250e0000000800310003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r11, @ANYBLOB="014127bd7000ffdbdf00"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x804) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r11, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x48890}, 0x24000880) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r11, 0x200, 0x70bd29, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000010) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r11, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xf7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xac7b}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x8840) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000001a80)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="000026bd7000ffdbdf250600000008103c000300000008003a001343ffff080032000200000008000b000700000005002f0002000000003200c61680000500380000000000eaeeb8bf7dfd2b3e1d24381ba17d2a751c01c98115f57bb700000000000d62034300000000"], 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40001) [ 59.330228][ T4398] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 59.339525][ T4396] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 59.355866][ T4396] 8021q: adding VLAN 0 to HW filter on device bond2 [ 59.356104][ T4400] loop5: p1 p2 p3 [ 59.375757][ T4399] bond3: entered promiscuous mode 14:39:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="7c3b6ac3cc3d156c576aa257dc745bd1ce0e78edddc8d3c73644df40fa871401738b1f47e527fdabee9648cd042a1b4345823ee681787192397d74b92d2f222abc7413e652bc932f702e55b10bedd622796cd76f03f7afc9ccb48fec27e0a426853438f2b22850383941d2672a7a8bc176f6c0ce0dd7bf498e31c1a71e0733116fc4d64fe12288", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) socket(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000180)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)={0x48, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x0}]}]}, 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r5, @ANYRESOCT=r7, @ANYRES64=r6, @ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r10], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) r11 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r10, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="00032cbd7000ffdbdf2505000000050038000100000008000600", @ANYRES32=0x0, @ANYBLOB="057c1bb78102fc5b5840c82203942edfa4a0136bec89456d3b11703ee797788d93227352bb325b2fb40f596c6aae9aa3d06b6fe6bc7f5b5c9e22b082e0d25834eb3e75009ce39892352979213e9cd251cd37c75fe9170bc4d5c0e4fefe9a2fa255bb287207fd9f94302689008ad7cbe6c14acb43f4948019e51735058a6521d18f5e60c495a22e2687ecd7517204b32f2310134b7dcc31ae454822d3f52c3b31e589e0ad8027815f58cd21773b118334fae0dda00abc326f485fd74d76c0f0ff507fa550d9e42be2d7f91298f7cd61f558b03a834d"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r11, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x40}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x5c}}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="3bb1ec56a3fe633706daa703116e10121929cecc2e244f4413d04f51dc48b87eb541760e8e48a09854d1a55385882a069ce0af5e8aa2523f598e0fac55809eee1178993a843b733e8ce4ef832f000000000000004f41dec653af1dc99c38f345f31fa4951acd389777a5719f4e612f2edf6df8a0e1fe090020969a517d7469c8f24183ae31fcc71bf29f2e9f206959037bc4f0ac0d0b574eb629e210", @ANYRES16=r11, @ANYBLOB="00022abd7000fbdbdf250e0000000800310003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r11, @ANYBLOB="014127bd7000ffdbdf00"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x804) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r11, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x48890}, 0x24000880) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r11, 0x200, 0x70bd29, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000010) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r11, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xf7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xac7b}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x8840) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000001a80)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="000026bd7000ffdbdf250600000008103c000300000008003a001343ffff080032000200000008000b000700000005002f0002000000003200c61680000500380000000000eaeeb8bf7dfd2b3e1d24381ba17d2a751c01c98115f57bb700000000000d62034300000000"], 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40001) 14:39:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x28}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000004000000000000000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x20, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x2814e}}, 0x20}}, 0x0) 14:39:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x28}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c00000010008506000004000000000000000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x20, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x2814e}}, 0x20}}, 0x0) [ 59.401805][ T4396] bond2: entered promiscuous mode [ 59.405836][ T2764] loop5: p1 p2 p3 [ 59.443986][ T4410] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 59.454398][ T4413] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 59.477866][ T4413] 8021q: adding VLAN 0 to HW filter on device bond4 [ 59.485897][ T4414] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 14:39:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000400)={0xa}, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000080)="eb", 0xfef4, 0x44, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 59.501151][ T4414] 8021q: adding VLAN 0 to HW filter on device bond3 [ 59.510080][ T4419] bond3: entered promiscuous mode [ 59.527985][ T4413] bond4: entered promiscuous mode 14:39:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000400)={0xa}, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000080)="eb", 0xfef4, 0x44, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:39:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GENEVE_COLLECT_METADATA={0x4}, @IFLA_GENEVE_TTL={0x5, 0x3, 0x7b}, @IFLA_GENEVE_DF={0x5}]}}}]}, 0x48}}, 0x0) 14:39:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000400)={0xa}, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000080)="eb", 0xfef4, 0x44, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:39:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GENEVE_COLLECT_METADATA={0x4}, @IFLA_GENEVE_TTL={0x5, 0x3, 0x7b}, @IFLA_GENEVE_DF={0x5}]}}}]}, 0x48}}, 0x0) 14:39:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000400)={0xa}, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000080)="eb", 0xfef4, 0x44, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:39:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GENEVE_COLLECT_METADATA={0x4}, @IFLA_GENEVE_TTL={0x5, 0x3, 0x7b}, @IFLA_GENEVE_DF={0x5}]}}}]}, 0x48}}, 0x0) 14:39:41 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000003070000000000040000f195"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x30, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x0, 0x0}, 0x8) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0)=r1, 0x4) close(r2) 14:39:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GENEVE_COLLECT_METADATA={0x4}, @IFLA_GENEVE_TTL={0x5, 0x3, 0x7b}, @IFLA_GENEVE_DF={0x5}]}}}]}, 0x48}}, 0x0) 14:39:41 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000003070000000000040000f195"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x30, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x0, 0x0}, 0x8) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0)=r1, 0x4) close(r2) 14:39:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0xb8, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x90, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @masq={{0x9}, @val={0x4}}}, {0x18, 0x1, 0x0, 0x1, @byteorder={{0xe}, @val={0x4}}}, {0x60, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xfff}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xc4}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x1f8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x12c}}, 0x0) 14:39:41 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000003070000000000040000f195"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x30, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x0, 0x0}, 0x8) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0)=r1, 0x4) close(r2) 14:39:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0xb8, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x90, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @masq={{0x9}, @val={0x4}}}, {0x18, 0x1, 0x0, 0x1, @byteorder={{0xe}, @val={0x4}}}, {0x60, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xfff}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xc4}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x1f8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x12c}}, 0x0) 14:39:41 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000003070000000000040000f195"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x30, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x0, 0x0}, 0x8) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0)=r1, 0x4) close(r2) 14:39:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0xb8, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x90, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @masq={{0x9}, @val={0x4}}}, {0x18, 0x1, 0x0, 0x1, @byteorder={{0xe}, @val={0x4}}}, {0x60, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xfff}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xc4}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x1f8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x12c}}, 0x0) 14:39:41 executing program 3: iopl(0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='net_prio.prioidx\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x11, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 14:39:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0xb8, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x90, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @masq={{0x9}, @val={0x4}}}, {0x18, 0x1, 0x0, 0x1, @byteorder={{0xe}, @val={0x4}}}, {0x60, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xfff}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xc4}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x1f8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x12c}}, 0x0) 14:39:41 executing program 3: iopl(0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='net_prio.prioidx\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x11, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 14:39:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="00001800ff0f0000000000000000850000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x40305839, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x1c, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xba}, [@tail_call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0xb1}, @tail_call, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000300)='syzkaller\x00', 0x3, 0x60, &(0x7f0000000480)=""/96, 0x40e00, 0x0, '\x00', 0x0, 0x32, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x5, 0x0, 0x7}, 0x10, r7, r4, 0x8, 0x0, &(0x7f0000000840)=[{0x2, 0x0, 0xb, 0x5}, {0x4, 0x3, 0x7, 0x7}, {0x1, 0x0, 0x0, 0xa}, {0x5, 0x2, 0x10, 0x2}, {0x0, 0x3, 0xb, 0xa}, {0x4, 0x0, 0x0, 0x5}, {0x1, 0x5}, {0x2, 0x0, 0xf}]}, 0x90) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(r8, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000140)=0xfffffffffffffe01) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 14:39:41 executing program 3: iopl(0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='net_prio.prioidx\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x11, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 14:39:41 executing program 3: iopl(0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='net_prio.prioidx\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x11, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 14:39:41 executing program 3: utimes(&(0x7f0000000040)='./file0\x00', 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 14:39:41 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="7c3b6ac3cc3d156c576aa257dc745bd1ce0e78edddc8d3c73644df40fa871401738b1f47e527fdabee9648cd042a1b4345823ee681787192397d74b92d2f222abc7413e652bc932f702e55b10bedd622796cd76f03f7afc9ccb48fec27e0a426853438f2b22850383941d2672a7a8bc176f6c0ce0dd7bf498e31c1a71e0733116fc4d64fe12288", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) socket(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000180)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)={0x48, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x0}]}]}, 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r5, @ANYRESOCT=r7, @ANYRES64=r6, @ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r10], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) r11 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r10, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="00032cbd7000ffdbdf2505000000050038000100000008000600", @ANYRES32=0x0, @ANYBLOB="057c1bb78102fc5b5840c82203942edfa4a0136bec89456d3b11703ee797788d93227352bb325b2fb40f596c6aae9aa3d06b6fe6bc7f5b5c9e22b082e0d25834eb3e75009ce39892352979213e9cd251cd37c75fe9170bc4d5c0e4fefe9a2fa255bb287207fd9f94302689008ad7cbe6c14acb43f4948019e51735058a6521d18f5e60c495a22e2687ecd7517204b32f2310134b7dcc31ae454822d3f52c3b31e589e0ad8027815f58cd21773b118334fae0dda00abc326f485fd74d76c0f0ff507fa550d9e42be2d7f91298f7cd61f558b03a834d"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r11, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x40}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x5c}}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="3bb1ec56a3fe633706daa703116e10121929cecc2e244f4413d04f51dc48b87eb541760e8e48a09854d1a55385882a069ce0af5e8aa2523f598e0fac55809eee1178993a843b733e8ce4ef832f000000000000004f41dec653af1dc99c38f345f31fa4951acd389777a5719f4e612f2edf6df8a0e1fe090020969a517d7469c8f24183ae31fcc71bf29f2e9f206959037bc4f0ac0d0b574eb629e210", @ANYRES16=r11, @ANYBLOB="00022abd7000fbdbdf250e0000000800310003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r11, @ANYBLOB="014127bd7000ffdbdf00"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x804) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r11, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x48890}, 0x24000880) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r11, 0x200, 0x70bd29, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000010) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r11, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xf7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xac7b}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x8840) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000001a80)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="000026bd7000ffdbdf250600000008103c000300000008003a001343ffff080032000200000008000b000700000005002f0002000000003200c61680000500380000000000eaeeb8bf7dfd2b3e1d24381ba17d2a751c01c98115f57bb700000000000d62034300000000"], 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40001) 14:39:41 executing program 3: utimes(&(0x7f0000000040)='./file0\x00', 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 14:39:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="00001800ff0f0000000000000000850000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x40305839, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x1c, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xba}, [@tail_call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0xb1}, @tail_call, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000300)='syzkaller\x00', 0x3, 0x60, &(0x7f0000000480)=""/96, 0x40e00, 0x0, '\x00', 0x0, 0x32, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x5, 0x0, 0x7}, 0x10, r7, r4, 0x8, 0x0, &(0x7f0000000840)=[{0x2, 0x0, 0xb, 0x5}, {0x4, 0x3, 0x7, 0x7}, {0x1, 0x0, 0x0, 0xa}, {0x5, 0x2, 0x10, 0x2}, {0x0, 0x3, 0xb, 0xa}, {0x4, 0x0, 0x0, 0x5}, {0x1, 0x5}, {0x2, 0x0, 0xf}]}, 0x90) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(r8, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000140)=0xfffffffffffffe01) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 14:39:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$eJzs2z9oE1gcB/BfqkHQwcXJSR0cDjlQHM2gkkRFIUS7yA0KiogZjghC5AKCDm3gWpqhdOxSCln6Z2qaoVNLC51L6dCj0KHLHe1S6NIcpe/29voHhM8HHj/ee9+8X35DxgQ/tZ74p9vtZiKie+n4n+5t5QtPb5Qell9FZA4ei9//rP56cJNJif9evZX262k/Nnq507/zJNtae7l7+818oyfdf0vryni798TDceYmcgtXv/+oFgdquY+rxfpm38ryi8ntfLn9vNGcepZ9/C7lFlO9mOrnqMXX+BRvoxKVeB/VU+o/0tq4u3+92Jr58GCv0Bmcu5dypRPOedT+X24OvW7WH92ZvjZ8vza7VN66cJir/I9fFwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA528it3D1+49qcaCW+7harG/2rSy/mNzOl9vPG82pZ9nH71JuMdWLqX6OWnyNT/E2KlGJ91E9pf4jrY27+9eLrZkPD/YKncG5eylXOuGcR+3/5ebQ62b90Z3pa8P3a7NL5a0Lh7nKpTP6AgAAAAAAAAAAAAAAAAAAABAR+cLTG6WH5VcRmfgtIn75+4+eg/Nu+r97JuVupbqezsdGL3f6d55kW2svd2+/mW/8lc6/pXVlvN177sNwbP8GAAD//22glRo=") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) 14:39:41 executing program 3: utimes(&(0x7f0000000040)='./file0\x00', 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 14:39:41 executing program 3: utimes(&(0x7f0000000040)='./file0\x00', 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) [ 60.204601][ T4477] loop5: detected capacity change from 0 to 2048 [ 60.271341][ T4477] loop5: p1 p2 p3 14:39:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="7c3b6ac3cc3d156c576aa257dc745bd1ce0e78edddc8d3c73644df40fa871401738b1f47e527fdabee9648cd042a1b4345823ee681787192397d74b92d2f222abc7413e652bc932f702e55b10bedd622796cd76f03f7afc9ccb48fec27e0a426853438f2b22850383941d2672a7a8bc176f6c0ce0dd7bf498e31c1a71e0733116fc4d64fe12288", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) socket(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000180)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)={0x48, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x0}]}]}, 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r5, @ANYRESOCT=r7, @ANYRES64=r6, @ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r10], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) r11 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r10, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="00032cbd7000ffdbdf2505000000050038000100000008000600", @ANYRES32=0x0, @ANYBLOB="057c1bb78102fc5b5840c82203942edfa4a0136bec89456d3b11703ee797788d93227352bb325b2fb40f596c6aae9aa3d06b6fe6bc7f5b5c9e22b082e0d25834eb3e75009ce39892352979213e9cd251cd37c75fe9170bc4d5c0e4fefe9a2fa255bb287207fd9f94302689008ad7cbe6c14acb43f4948019e51735058a6521d18f5e60c495a22e2687ecd7517204b32f2310134b7dcc31ae454822d3f52c3b31e589e0ad8027815f58cd21773b118334fae0dda00abc326f485fd74d76c0f0ff507fa550d9e42be2d7f91298f7cd61f558b03a834d"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r11, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x40}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x5c}}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="3bb1ec56a3fe633706daa703116e10121929cecc2e244f4413d04f51dc48b87eb541760e8e48a09854d1a55385882a069ce0af5e8aa2523f598e0fac55809eee1178993a843b733e8ce4ef832f000000000000004f41dec653af1dc99c38f345f31fa4951acd389777a5719f4e612f2edf6df8a0e1fe090020969a517d7469c8f24183ae31fcc71bf29f2e9f206959037bc4f0ac0d0b574eb629e210", @ANYRES16=r11, @ANYBLOB="00022abd7000fbdbdf250e0000000800310003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r11, @ANYBLOB="014127bd7000ffdbdf00"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x804) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r11, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x48890}, 0x24000880) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r11, 0x200, 0x70bd29, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000010) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r11, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xf7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xac7b}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x8840) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000001a80)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="000026bd7000ffdbdf250600000008103c000300000008003a001343ffff080032000200000008000b000700000005002f0002000000003200c61680000500380000000000eaeeb8bf7dfd2b3e1d24381ba17d2a751c01c98115f57bb700000000000d62034300000000"], 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40001) 14:39:41 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="7c3b6ac3cc3d156c576aa257dc745bd1ce0e78edddc8d3c73644df40fa871401738b1f47e527fdabee9648cd042a1b4345823ee681787192397d74b92d2f222abc7413e652bc932f702e55b10bedd622796cd76f03f7afc9ccb48fec27e0a426853438f2b22850383941d2672a7a8bc176f6c0ce0dd7bf498e31c1a71e0733116fc4d64fe12288", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) socket(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000180)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)={0x48, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x0}]}]}, 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r5, @ANYRESOCT=r7, @ANYRES64=r6, @ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r10], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) r11 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r10, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="00032cbd7000ffdbdf2505000000050038000100000008000600", @ANYRES32=0x0, @ANYBLOB="057c1bb78102fc5b5840c82203942edfa4a0136bec89456d3b11703ee797788d93227352bb325b2fb40f596c6aae9aa3d06b6fe6bc7f5b5c9e22b082e0d25834eb3e75009ce39892352979213e9cd251cd37c75fe9170bc4d5c0e4fefe9a2fa255bb287207fd9f94302689008ad7cbe6c14acb43f4948019e51735058a6521d18f5e60c495a22e2687ecd7517204b32f2310134b7dcc31ae454822d3f52c3b31e589e0ad8027815f58cd21773b118334fae0dda00abc326f485fd74d76c0f0ff507fa550d9e42be2d7f91298f7cd61f558b03a834d"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r11, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x40}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x5c}}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="3bb1ec56a3fe633706daa703116e10121929cecc2e244f4413d04f51dc48b87eb541760e8e48a09854d1a55385882a069ce0af5e8aa2523f598e0fac55809eee1178993a843b733e8ce4ef832f000000000000004f41dec653af1dc99c38f345f31fa4951acd389777a5719f4e612f2edf6df8a0e1fe090020969a517d7469c8f24183ae31fcc71bf29f2e9f206959037bc4f0ac0d0b574eb629e210", @ANYRES16=r11, @ANYBLOB="00022abd7000fbdbdf250e0000000800310003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r11, @ANYBLOB="014127bd7000ffdbdf00"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x804) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r11, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x48890}, 0x24000880) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r11, 0x200, 0x70bd29, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000010) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r11, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xf7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xac7b}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x8840) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000001a80)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="000026bd7000ffdbdf250600000008103c000300000008003a001343ffff080032000200000008000b000700000005002f0002000000003200c61680000500380000000000eaeeb8bf7dfd2b3e1d24381ba17d2a751c01c98115f57bb700000000000d62034300000000"], 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40001) 14:39:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 60.299431][ C1] hrtimer: interrupt took 32501 ns [ 60.360328][ T4484] loop3: detected capacity change from 0 to 2048 [ 60.400070][ T4484] loop3: p1 p2 p3 [ 60.416111][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 60.416123][ T27] audit: type=1400 audit(1705070381.833:200): avc: denied { write } for pid=4481 comm="syz-executor.3" name="loop3p1" dev="devtmpfs" ino=506 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 14:39:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="00001800ff0f0000000000000000850000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x40305839, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x1c, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xba}, [@tail_call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0xb1}, @tail_call, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000300)='syzkaller\x00', 0x3, 0x60, &(0x7f0000000480)=""/96, 0x40e00, 0x0, '\x00', 0x0, 0x32, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x5, 0x0, 0x7}, 0x10, r7, r4, 0x8, 0x0, &(0x7f0000000840)=[{0x2, 0x0, 0xb, 0x5}, {0x4, 0x3, 0x7, 0x7}, {0x1, 0x0, 0x0, 0xa}, {0x5, 0x2, 0x10, 0x2}, {0x0, 0x3, 0xb, 0xa}, {0x4, 0x0, 0x0, 0x5}, {0x1, 0x5}, {0x2, 0x0, 0xf}]}, 0x90) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(r8, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000140)=0xfffffffffffffe01) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) [ 60.445651][ T27] audit: type=1400 audit(1705070381.833:201): avc: denied { open } for pid=4481 comm="syz-executor.3" path="/dev/loop3p1" dev="devtmpfs" ino=506 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 14:39:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="00001800ff0f0000000000000000850000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x40305839, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x1c, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xba}, [@tail_call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @call={0x85, 0x0, 0x0, 0xb1}, @tail_call, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000300)='syzkaller\x00', 0x3, 0x60, &(0x7f0000000480)=""/96, 0x40e00, 0x0, '\x00', 0x0, 0x32, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x5, 0x0, 0x7}, 0x10, r7, r4, 0x8, 0x0, &(0x7f0000000840)=[{0x2, 0x0, 0xb, 0x5}, {0x4, 0x3, 0x7, 0x7}, {0x1, 0x0, 0x0, 0xa}, {0x5, 0x2, 0x10, 0x2}, {0x0, 0x3, 0xb, 0xa}, {0x4, 0x0, 0x0, 0x5}, {0x1, 0x5}, {0x2, 0x0, 0xf}]}, 0x90) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(r8, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000140)=0xfffffffffffffe01) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 14:39:42 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 60.799134][ T4496] loop4: detected capacity change from 0 to 2048 [ 60.859250][ T4496] loop4: p1 p2 p3 14:39:42 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="7c3b6ac3cc3d156c576aa257dc745bd1ce0e78edddc8d3c73644df40fa871401738b1f47e527fdabee9648cd042a1b4345823ee681787192397d74b92d2f222abc7413e652bc932f702e55b10bedd622796cd76f03f7afc9ccb48fec27e0a426853438f2b22850383941d2672a7a8bc176f6c0ce0dd7bf498e31c1a71e0733116fc4d64fe12288", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) socket(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000180)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)={0x48, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x0}]}]}, 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r5, @ANYRESOCT=r7, @ANYRES64=r6, @ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r10], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) r11 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r10, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="00032cbd7000ffdbdf2505000000050038000100000008000600", @ANYRES32=0x0, @ANYBLOB="057c1bb78102fc5b5840c82203942edfa4a0136bec89456d3b11703ee797788d93227352bb325b2fb40f596c6aae9aa3d06b6fe6bc7f5b5c9e22b082e0d25834eb3e75009ce39892352979213e9cd251cd37c75fe9170bc4d5c0e4fefe9a2fa255bb287207fd9f94302689008ad7cbe6c14acb43f4948019e51735058a6521d18f5e60c495a22e2687ecd7517204b32f2310134b7dcc31ae454822d3f52c3b31e589e0ad8027815f58cd21773b118334fae0dda00abc326f485fd74d76c0f0ff507fa550d9e42be2d7f91298f7cd61f558b03a834d"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r11, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x40}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x5c}}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="3bb1ec56a3fe633706daa703116e10121929cecc2e244f4413d04f51dc48b87eb541760e8e48a09854d1a55385882a069ce0af5e8aa2523f598e0fac55809eee1178993a843b733e8ce4ef832f000000000000004f41dec653af1dc99c38f345f31fa4951acd389777a5719f4e612f2edf6df8a0e1fe090020969a517d7469c8f24183ae31fcc71bf29f2e9f206959037bc4f0ac0d0b574eb629e210", @ANYRES16=r11, @ANYBLOB="00022abd7000fbdbdf250e0000000800310003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r11, @ANYBLOB="014127bd7000ffdbdf00"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x804) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r11, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x48890}, 0x24000880) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r11, 0x200, 0x70bd29, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000010) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r11, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xf7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xac7b}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x8840) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000001a80)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="000026bd7000ffdbdf250600000008103c000300000008003a001343ffff080032000200000008000b000700000005002f0002000000003200c61680000500380000000000eaeeb8bf7dfd2b3e1d24381ba17d2a751c01c98115f57bb700000000000d62034300000000"], 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40001) 14:39:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 61.096219][ T4502] loop5: detected capacity change from 0 to 2048 14:39:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) 14:39:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="7c3b6ac3cc3d156c576aa257dc745bd1ce0e78edddc8d3c73644df40fa871401738b1f47e527fdabee9648cd042a1b4345823ee681787192397d74b92d2f222abc7413e652bc932f702e55b10bedd622796cd76f03f7afc9ccb48fec27e0a426853438f2b22850383941d2672a7a8bc176f6c0ce0dd7bf498e31c1a71e0733116fc4d64fe12288", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) socket(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000180)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)={0x48, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x0}]}]}, 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r5, @ANYRESOCT=r7, @ANYRES64=r6, @ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r10], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) r11 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r10, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="00032cbd7000ffdbdf2505000000050038000100000008000600", @ANYRES32=0x0, @ANYBLOB="057c1bb78102fc5b5840c82203942edfa4a0136bec89456d3b11703ee797788d93227352bb325b2fb40f596c6aae9aa3d06b6fe6bc7f5b5c9e22b082e0d25834eb3e75009ce39892352979213e9cd251cd37c75fe9170bc4d5c0e4fefe9a2fa255bb287207fd9f94302689008ad7cbe6c14acb43f4948019e51735058a6521d18f5e60c495a22e2687ecd7517204b32f2310134b7dcc31ae454822d3f52c3b31e589e0ad8027815f58cd21773b118334fae0dda00abc326f485fd74d76c0f0ff507fa550d9e42be2d7f91298f7cd61f558b03a834d"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r11, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x40}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x5c}}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="3bb1ec56a3fe633706daa703116e10121929cecc2e244f4413d04f51dc48b87eb541760e8e48a09854d1a55385882a069ce0af5e8aa2523f598e0fac55809eee1178993a843b733e8ce4ef832f000000000000004f41dec653af1dc99c38f345f31fa4951acd389777a5719f4e612f2edf6df8a0e1fe090020969a517d7469c8f24183ae31fcc71bf29f2e9f206959037bc4f0ac0d0b574eb629e210", @ANYRES16=r11, @ANYBLOB="00022abd7000fbdbdf250e0000000800310003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r11, @ANYBLOB="014127bd7000ffdbdf00"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x804) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r11, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x48890}, 0x24000880) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r11, 0x200, 0x70bd29, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000010) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r11, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xf7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xac7b}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x8840) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000001a80)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="000026bd7000ffdbdf250600000008103c000300000008003a001343ffff080032000200000008000b000700000005002f0002000000003200c61680000500380000000000eaeeb8bf7dfd2b3e1d24381ba17d2a751c01c98115f57bb700000000000d62034300000000"], 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40001) [ 61.149475][ T4502] loop5: p1 p2 p3 14:39:42 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="7c3b6ac3cc3d156c576aa257dc745bd1ce0e78edddc8d3c73644df40fa871401738b1f47e527fdabee9648cd042a1b4345823ee681787192397d74b92d2f222abc7413e652bc932f702e55b10bedd622796cd76f03f7afc9ccb48fec27e0a426853438f2b22850383941d2672a7a8bc176f6c0ce0dd7bf498e31c1a71e0733116fc4d64fe12288", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) socket(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000180)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)={0x48, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x0}]}]}, 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000280)={0xa, 0x2, 0x0, @loopback, 0x9}, 0x1c) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7800000024000b0f000000000000000060000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00040048000200000000008600020000000000000100000000ffffffff"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendto$inet6(r5, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5dac14e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xadf29f33fb903ae1, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmsg(r5, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000840)=[{&(0x7f0000000040)=""/50, 0xfffffe72}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000780)=""/129, 0x80}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/121, 0x79}, {&(0x7f0000000400)=""/183, 0xb7}], 0x6}, 0x40000110) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r5, @ANYRESOCT=r7, @ANYRES64=r6, @ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r10], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x40448d2) r11 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r10, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30cff28cd98764d6}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="00032cbd7000ffdbdf2505000000050038000100000008000600", @ANYRES32=0x0, @ANYBLOB="057c1bb78102fc5b5840c82203942edfa4a0136bec89456d3b11703ee797788d93227352bb325b2fb40f596c6aae9aa3d06b6fe6bc7f5b5c9e22b082e0d25834eb3e75009ce39892352979213e9cd251cd37c75fe9170bc4d5c0e4fefe9a2fa255bb287207fd9f94302689008ad7cbe6c14acb43f4948019e51735058a6521d18f5e60c495a22e2687ecd7517204b32f2310134b7dcc31ae454822d3f52c3b31e589e0ad8027815f58cd21773b118334fae0dda00abc326f485fd74d76c0f0ff507fa550d9e42be2d7f91298f7cd61f558b03a834d"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8080) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r11, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x40}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x5c}}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="3bb1ec56a3fe633706daa703116e10121929cecc2e244f4413d04f51dc48b87eb541760e8e48a09854d1a55385882a069ce0af5e8aa2523f598e0fac55809eee1178993a843b733e8ce4ef832f000000000000004f41dec653af1dc99c38f345f31fa4951acd389777a5719f4e612f2edf6df8a0e1fe090020969a517d7469c8f24183ae31fcc71bf29f2e9f206959037bc4f0ac0d0b574eb629e210", @ANYRES16=r11, @ANYBLOB="00022abd7000fbdbdf250e0000000800310003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r11, @ANYBLOB="014127bd7000ffdbdf00"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x804) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r11, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x48890}, 0x24000880) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r11, 0x200, 0x70bd29, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000010) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r11, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xf7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xac7b}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x8840) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000001a80)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="000026bd7000ffdbdf250600000008103c000300000008003a001343ffff080032000200000008000b000700000005002f0002000000003200c61680000500380000000000eaeeb8bf7dfd2b3e1d24381ba17d2a751c01c98115f57bb700000000000d62034300000000"], 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40001) [ 61.236751][ T4509] loop3: detected capacity change from 0 to 2048 [ 61.289525][ T4509] loop3: p1 p2 p3 [ 61.301822][ T2764] loop3: p1 p2 p3 14:39:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 61.687070][ T4514] loop4: detected capacity change from 0 to 2048 [ 61.722120][ T4514] loop4: p1 p2 p3 14:39:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 61.864431][ T4517] loop1: detected capacity change from 0 to 2048 14:39:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$eJzs2z9oE1gcB/BfqkHQwcXJSR0cDjlQHM2gkkRFIUS7yA0KiogZjghC5AKCDm3gWpqhdOxSCln6Z2qaoVNLC51L6dCj0KHLHe1S6NIcpe/29voHhM8HHj/ee9+8X35DxgQ/tZ74p9vtZiKie+n4n+5t5QtPb5Qell9FZA4ei9//rP56cJNJif9evZX262k/Nnq507/zJNtae7l7+818oyfdf0vryni798TDceYmcgtXv/+oFgdquY+rxfpm38ryi8ntfLn9vNGcepZ9/C7lFlO9mOrnqMXX+BRvoxKVeB/VU+o/0tq4u3+92Jr58GCv0Bmcu5dypRPOedT+X24OvW7WH92ZvjZ8vza7VN66cJir/I9fFwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA528it3D1+49qcaCW+7harG/2rSy/mNzOl9vPG82pZ9nH71JuMdWLqX6OWnyNT/E2KlGJ91E9pf4jrY27+9eLrZkPD/YKncG5eylXOuGcR+3/5ebQ62b90Z3pa8P3a7NL5a0Lh7nKpTP6AgAAAAAAAAAAAAAAAAAAABAR+cLTG6WH5VcRmfgtIn75+4+eg/Nu+r97JuVupbqezsdGL3f6d55kW2svd2+/mW/8lc6/pXVlvN177sNwbP8GAAD//22glRo=") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 61.919447][ T4517] loop1: p1 p2 p3 14:39:43 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$eJzs2z9oE1gcB/BfqkHQwcXJSR0cDjlQHM2gkkRFIUS7yA0KiogZjghC5AKCDm3gWpqhdOxSCln6Z2qaoVNLC51L6dCj0KHLHe1S6NIcpe/29voHhM8HHj/ee9+8X35DxgQ/tZ74p9vtZiKie+n4n+5t5QtPb5Qell9FZA4ei9//rP56cJNJif9evZX262k/Nnq507/zJNtae7l7+818oyfdf0vryni798TDceYmcgtXv/+oFgdquY+rxfpm38ryi8ntfLn9vNGcepZ9/C7lFlO9mOrnqMXX+BRvoxKVeB/VU+o/0tq4u3+92Jr58GCv0Bmcu5dypRPOedT+X24OvW7WH92ZvjZ8vza7VN66cJir/I9fFwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA528it3D1+49qcaCW+7harG/2rSy/mNzOl9vPG82pZ9nH71JuMdWLqX6OWnyNT/E2KlGJ91E9pf4jrY27+9eLrZkPD/YKncG5eylXOuGcR+3/5ebQ62b90Z3pa8P3a7NL5a0Lh7nKpTP6AgAAAAAAAAAAAAAAAAAAABAR+cLTG6WH5VcRmfgtIn75+4+eg/Nu+r97JuVupbqezsdGL3f6d55kW2svd2+/mW/8lc6/pXVlvN177sNwbP8GAAD//22glRo=") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) 14:39:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 62.016372][ T4520] loop5: detected capacity change from 0 to 2048 14:39:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 62.061408][ T4520] loop5: p1 p2 p3 [ 62.073878][ T4522] loop0: detected capacity change from 0 to 2048 [ 62.088011][ T2764] loop5: p1 p2 p3 [ 62.093210][ T4524] loop2: detected capacity change from 0 to 2048 [ 62.141609][ T4522] loop0: p1 p2 p3 [ 62.146460][ T4524] loop2: p1 p2 p3 [ 62.185337][ T4527] loop3: detected capacity change from 0 to 2048 [ 62.229913][ T4527] loop3: p1 p2 p3 [ 62.240666][ T2764] loop3: p1 p2 p3 14:39:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 62.519764][ T2764] loop0: p1 p2 p3 [ 62.580132][ T4532] loop4: detected capacity change from 0 to 2048 [ 62.620869][ T4532] loop4: p1 p2 p3 14:39:44 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$eJzs2z9oE1gcB/BfqkHQwcXJSR0cDjlQHM2gkkRFIUS7yA0KiogZjghC5AKCDm3gWpqhdOxSCln6Z2qaoVNLC51L6dCj0KHLHe1S6NIcpe/29voHhM8HHj/ee9+8X35DxgQ/tZ74p9vtZiKie+n4n+5t5QtPb5Qell9FZA4ei9//rP56cJNJif9evZX262k/Nnq507/zJNtae7l7+818oyfdf0vryni798TDceYmcgtXv/+oFgdquY+rxfpm38ryi8ntfLn9vNGcepZ9/C7lFlO9mOrnqMXX+BRvoxKVeB/VU+o/0tq4u3+92Jr58GCv0Bmcu5dypRPOedT+X24OvW7WH92ZvjZ8vza7VN66cJir/I9fFwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA528it3D1+49qcaCW+7harG/2rSy/mNzOl9vPG82pZ9nH71JuMdWLqX6OWnyNT/E2KlGJ91E9pf4jrY27+9eLrZkPD/YKncG5eylXOuGcR+3/5ebQ62b90Z3pa8P3a7NL5a0Lh7nKpTP6AgAAAAAAAAAAAAAAAAAAABAR+cLTG6WH5VcRmfgtIn75+4+eg/Nu+r97JuVupbqezsdGL3f6d55kW2svd2+/mW/8lc6/pXVlvN177sNwbP8GAAD//22glRo=") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="3a1c00000000000000ab5bc31f38869d426e62a9a8b90d896f1b367ca3f1e7d1eab32c064d8825350bca55adeb1f81ce04d399c4c0c8f9f4c52aaa43e8b53d37df24727a7e740d625089ea687a5060f4b77d4a4d4816a6ac8116d52065b04f475ff603e2e7bbb2070dfb7ad16bde667e8ceea83cc22916a46b8ef496961cad3a2b20bfdc221728a0a61adcce6bca7b372e9af924c7ffda97fe06a8a6eb6cb6a59dc05677a3b15a19e7a262fcfad0fac4a0e3c8ed990001000730000000020a2f0000010000000100000087fa000000000000bd000000000008003f000000000000000300000000000000000000000000dfac7b600b2c535f27eb3a"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 62.699045][ T2764] loop0: p1 p2 p3 [ 62.761241][ T4535] loop1: detected capacity change from 0 to 2048 [ 62.799908][ T4535] loop1: p1 p2 p3 14:39:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$eJzs2z9oE1gcB/BfqkHQwcXJSR0cDjlQHM2gkkRFIUS7yA0KiogZjghC5AKCDm3gWpqhdOxSCln6Z2qaoVNLC51L6dCj0KHLHe1S6NIcpe/29voHhM8HHj/ee9+8X35DxgQ/tZ74p9vtZiKie+n4n+5t5QtPb5Qell9FZA4ei9//rP56cJNJif9evZX262k/Nnq507/zJNtae7l7+818oyfdf0vryni798TDceYmcgtXv/+oFgdquY+rxfpm38ryi8ntfLn9vNGcepZ9/C7lFlO9mOrnqMXX+BRvoxKVeB/VU+o/0tq4u3+92Jr58GCv0Bmcu5dypRPOedT+X24OvW7WH92ZvjZ8vza7VN66cJir/I9fFwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA528it3D1+49qcaCW+7harG/2rSy/mNzOl9vPG82pZ9nH71JuMdWLqX6OWnyNT/E2KlGJ91E9pf4jrY27+9eLrZkPD/YKncG5eylXOuGcR+3/5ebQ62b90Z3pa8P3a7NL5a0Lh7nKpTP6AgAAAAAAAAAAAAAAAAAAABAR+cLTG6WH5VcRmfgtIn75+4+eg/Nu+r97JuVupbqezsdGL3f6d55kW2svd2+/mW/8lc6/pXVlvN177sNwbP8GAAD//22glRo=") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 62.850057][ T2764] loop0: p1 p2 p3 14:39:44 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 62.898540][ T2764] loop0: p1 p2 p3 14:39:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="3a1c00000000000000ab5bc31f38869d426e62a9a8b90d896f1b367ca3f1e7d1eab32c064d8825350bca55adeb1f81ce04d399c4c0c8f9f4c52aaa43e8b53d37df24727a7e740d625089ea687a5060f4b77d4a4d4816a6ac8116d52065b04f475ff603e2e7bbb2070dfb7ad16bde667e8ceea83cc22916a46b8ef496961cad3a2b20bfdc221728a0a61adcce6bca7b372e9af924c7ffda97fe06a8a6eb6cb6a59dc05677a3b15a19e7a262fcfad0fac4a0e3c8ed990001000730000000020a2f0000010000000100000087fa000000000000bd000000000008003f000000000000000300000000000000000000000000dfac7b600b2c535f27eb3a"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 62.921729][ T2764] loop0: p1 p2 p3 [ 62.925291][ T4538] loop5: detected capacity change from 0 to 2048 [ 62.945405][ T2764] loop0: p1 p2 p3 [ 62.961053][ T2764] loop0: p1 p2 p3 14:39:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 62.975484][ T4538] loop5: p1 p2 p3 [ 63.019446][ T2764] loop5: p1 p2 p3 [ 63.029725][ T4542] loop2: detected capacity change from 0 to 2048 [ 63.035823][ T2764] loop0: p1 p2 p3 [ 63.080446][ T4542] loop2: p1 p2 p3 [ 63.094744][ T4546] loop3: detected capacity change from 0 to 2048 [ 63.141323][ T4546] loop3: p1 p2 p3 14:39:44 executing program 4: utimes(&(0x7f0000000040)='./file0\x00', 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) [ 63.412521][ T2764] loop0: p1 p2 p3 14:39:44 executing program 4: utimes(&(0x7f0000000040)='./file0\x00', 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 14:39:44 executing program 4: utimes(&(0x7f0000000040)='./file0\x00', 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 14:39:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=@newqdisc={0x48, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x18, 0x2, [@TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x2}, @TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0x1}]}}]}, 0x48}}, 0x0) 14:39:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=@newqdisc={0x48, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x18, 0x2, [@TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x2}, @TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0x1}]}}]}, 0x48}}, 0x0) 14:39:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=@newqdisc={0x48, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x18, 0x2, [@TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x2}, @TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0x1}]}}]}, 0x48}}, 0x0) [ 63.516317][ T4558] __nla_validate_parse: 1 callbacks suppressed [ 63.516341][ T4558] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 63.553075][ T4560] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 14:39:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$eJzs2z9oE1gcB/BfqkHQwcXJSR0cDjlQHM2gkkRFIUS7yA0KiogZjghC5AKCDm3gWpqhdOxSCln6Z2qaoVNLC51L6dCj0KHLHe1S6NIcpe/29voHhM8HHj/ee9+8X35DxgQ/tZ74p9vtZiKie+n4n+5t5QtPb5Qell9FZA4ei9//rP56cJNJif9evZX262k/Nnq507/zJNtae7l7+818oyfdf0vryni798TDceYmcgtXv/+oFgdquY+rxfpm38ryi8ntfLn9vNGcepZ9/C7lFlO9mOrnqMXX+BRvoxKVeB/VU+o/0tq4u3+92Jr58GCv0Bmcu5dypRPOedT+X24OvW7WH92ZvjZ8vza7VN66cJir/I9fFwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA528it3D1+49qcaCW+7harG/2rSy/mNzOl9vPG82pZ9nH71JuMdWLqX6OWnyNT/E2KlGJ91E9pf4jrY27+9eLrZkPD/YKncG5eylXOuGcR+3/5ebQ62b90Z3pa8P3a7NL5a0Lh7nKpTP6AgAAAAAAAAAAAAAAAAAAABAR+cLTG6WH5VcRmfgtIn75+4+eg/Nu+r97JuVupbqezsdGL3f6d55kW2svd2+/mW/8lc6/pXVlvN177sNwbP8GAAD//22glRo=") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) 14:39:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=@newqdisc={0x48, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x18, 0x2, [@TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x2}, @TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0x1}]}}]}, 0x48}}, 0x0) [ 63.584669][ T4562] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 63.598538][ T2764] loop0: p1 p2 p3 14:39:45 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8832, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) madvise(&(0x7f00000ef000/0x3000)=nil, 0x3000, 0x4) [ 63.631410][ T4564] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 63.670433][ T4566] loop1: detected capacity change from 0 to 2048 [ 63.699838][ T4566] loop1: p1 p2 p3 14:39:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$eJzs2z9oE1gcB/BfqkHQwcXJSR0cDjlQHM2gkkRFIUS7yA0KiogZjghC5AKCDm3gWpqhdOxSCln6Z2qaoVNLC51L6dCj0KHLHe1S6NIcpe/29voHhM8HHj/ee9+8X35DxgQ/tZ74p9vtZiKie+n4n+5t5QtPb5Qell9FZA4ei9//rP56cJNJif9evZX262k/Nnq507/zJNtae7l7+818oyfdf0vryni798TDceYmcgtXv/+oFgdquY+rxfpm38ryi8ntfLn9vNGcepZ9/C7lFlO9mOrnqMXX+BRvoxKVeB/VU+o/0tq4u3+92Jr58GCv0Bmcu5dypRPOedT+X24OvW7WH92ZvjZ8vza7VN66cJir/I9fFwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA528it3D1+49qcaCW+7harG/2rSy/mNzOl9vPG82pZ9nH71JuMdWLqX6OWnyNT/E2KlGJ91E9pf4jrY27+9eLrZkPD/YKncG5eylXOuGcR+3/5ebQ62b90Z3pa8P3a7NL5a0Lh7nKpTP6AgAAAAAAAAAAAAAAAAAAABAR+cLTG6WH5VcRmfgtIn75+4+eg/Nu+r97JuVupbqezsdGL3f6d55kW2svd2+/mW/8lc6/pXVlvN177sNwbP8GAAD//22glRo=") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) 14:39:45 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="3a1c00000000000000ab5bc31f38869d426e62a9a8b90d896f1b367ca3f1e7d1eab32c064d8825350bca55adeb1f81ce04d399c4c0c8f9f4c52aaa43e8b53d37df24727a7e740d625089ea687a5060f4b77d4a4d4816a6ac8116d52065b04f475ff603e2e7bbb2070dfb7ad16bde667e8ceea83cc22916a46b8ef496961cad3a2b20bfdc221728a0a61adcce6bca7b372e9af924c7ffda97fe06a8a6eb6cb6a59dc05677a3b15a19e7a262fcfad0fac4a0e3c8ed990001000730000000020a2f0000010000000100000087fa000000000000bd000000000008003f000000000000000300000000000000000000000000dfac7b600b2c535f27eb3a"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 63.765157][ T2764] loop0: p1 p2 p3 [ 63.795427][ T2764] loop0: p1 p2 p3 14:39:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 63.819917][ T2764] loop0: p1 p2 p3 14:39:45 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8832, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) madvise(&(0x7f00000ef000/0x3000)=nil, 0x3000, 0x4) 14:39:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 63.912216][ T4574] loop5: detected capacity change from 0 to 2048 [ 63.930860][ T2764] loop0: p1 p2 p3 [ 63.963836][ T2764] loop0: p1 p2 p3 [ 63.964413][ T4578] loop2: detected capacity change from 0 to 2048 [ 63.980473][ T4574] loop5: p1 p2 p3 [ 64.024285][ T4578] loop2: p1 p2 p3 [ 64.048935][ T4582] loop3: detected capacity change from 0 to 2048 [ 64.100987][ T4582] loop3: p1 p2 p3 14:39:45 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8832, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) madvise(&(0x7f00000ef000/0x3000)=nil, 0x3000, 0x4) 14:39:45 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x8832, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) madvise(&(0x7f00000ef000/0x3000)=nil, 0x3000, 0x4) 14:39:45 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000040000000000080000100850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)={&(0x7f00000021c0)=@newnexthop={0x18, 0x1c, 0x529}, 0x18}}, 0x0) 14:39:45 executing program 4: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 14:39:45 executing program 4: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 14:39:45 executing program 4: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 14:39:45 executing program 1: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 14:39:45 executing program 4: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) [ 64.503967][ T2764] loop0: p1 p2 p3 14:39:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000007, 0x12, r0, 0x0) ftruncate(r0, 0x8001) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/5, 0x214000, 0x800}, 0x20) 14:39:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000007, 0x12, r0, 0x0) ftruncate(r0, 0x8001) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/5, 0x214000, 0x800}, 0x20) 14:39:46 executing program 1: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 14:39:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000007, 0x12, r0, 0x0) ftruncate(r0, 0x8001) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/5, 0x214000, 0x800}, 0x20) 14:39:46 executing program 1: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 14:39:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000007, 0x12, r0, 0x0) ftruncate(r0, 0x8001) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/5, 0x214000, 0x800}, 0x20) 14:39:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 14:39:46 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000040)=0x3, 0x2) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0xfffc, @local}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = socket$igmp6(0xa, 0x3, 0x3a) getsockopt$MRT6(r2, 0x3a, 0x1, 0x0, &(0x7f0000000080)) 14:39:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 14:39:46 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r0, 0x8108551b, &(0x7f0000000040)=@usbdevfs_connect) 14:39:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) [ 64.674564][ T2764] loop0: p1 p2 p3 14:39:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 14:39:46 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000040)=0x3, 0x2) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0xfffc, @local}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = socket$igmp6(0xa, 0x3, 0x3a) getsockopt$MRT6(r2, 0x3a, 0x1, 0x0, &(0x7f0000000080)) 14:39:46 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r0, 0x8108551b, &(0x7f0000000040)=@usbdevfs_connect) 14:39:46 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r0, 0x8108551b, &(0x7f0000000040)=@usbdevfs_connect) 14:39:46 executing program 1: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000040)=0x3, 0x2) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0xfffc, @local}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = socket$igmp6(0xa, 0x3, 0x3a) getsockopt$MRT6(r2, 0x3a, 0x1, 0x0, &(0x7f0000000080)) 14:39:46 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r0, 0x8108551b, &(0x7f0000000040)=@usbdevfs_connect) 14:39:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) [ 64.713193][ T27] audit: type=1400 audit(1705070386.133:202): avc: denied { write } for pid=4622 comm="syz-executor.4" name="001" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 64.741714][ T2764] loop0: p1 p2 p3 14:39:46 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000040)=0x3, 0x2) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0xfffc, @local}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = socket$igmp6(0xa, 0x3, 0x3a) getsockopt$MRT6(r2, 0x3a, 0x1, 0x0, &(0x7f0000000080)) 14:39:46 executing program 1: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000040)=0x3, 0x2) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0xfffc, @local}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = socket$igmp6(0xa, 0x3, 0x3a) getsockopt$MRT6(r2, 0x3a, 0x1, 0x0, &(0x7f0000000080)) 14:39:46 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r0, 0x8108551b, &(0x7f0000000040)=@usbdevfs_connect) [ 64.788788][ T2764] loop0: p1 p2 p3 14:39:46 executing program 1: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000040)=0x3, 0x2) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0xfffc, @local}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = socket$igmp6(0xa, 0x3, 0x3a) getsockopt$MRT6(r2, 0x3a, 0x1, 0x0, &(0x7f0000000080)) 14:39:46 executing program 4: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x9}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x9e}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 64.830332][ T2764] loop0: p1 p2 p3 14:39:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8001) syz_read_part_table(0x5bb, &(0x7f00000005c0)="$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") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r3, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) open(&(0x7f0000000480)='./file0\x00', 0x200900, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e24, 0x7fffffff, @private2, 0x8}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x5, @private2, 0x8}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x8000, @loopback, 0x5}, @in={0x2, 0x4e20, @rand_addr=0x64010100}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0xe) r5 = socket(0x2, 0x6, 0x0) getsockopt$nfc_llcp(r5, 0x10d, 0x0, 0x0, 0xf0ff1f00000000) sendmsg$NFT_MSG_GETGEN(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40041}, 0x404c814) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0xd, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x8) pwrite64(r0, 0x0, 0x0, 0x0) r8 = socket(0xa, 0x1, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e22, 0x4, @local, 0x5}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10}, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000e80)=ANY=[@ANYBLOB="3a1c00000000000000ab5bc31f38869d426e62a9a8b90d896f1b367ca3f1e7d1eab32c064d8825350bca55adeb1f81ce04d399c4c0c8f9f4c52aaa43e8b53d37df24727a7e740d625089ea687a5060f4b77d4a4d4816a6ac8116d52065b04f475ff603e2e7bbb2070dfb7ad16bde667e8ceea83cc22916a46b8ef496961cad3a2b20bfdc221728a0a61adcce6bca7b372e9af924c7ffda97fe06a8a6eb6cb6a59dc05677a3b15a19e7a262fcfad0fac4a0e3c8ed990001000730000000020a2f0000010000000100000087fa000000000000bd000000000008003f000000000000000300000000000000000000000000dfac7b600b2c535f27eb3a"], 0xf0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x6, 0x76be, 0xda93, 0x4, 0x5}) bind$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r10, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x81}}, 0x0, 0x0, 0x80000001, 0x70, 0x80, 0x3ff}, &(0x7f00000002c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001440)={r7, 0x5}, &(0x7f0000001480)=0x8) 14:39:46 executing program 0: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000040)=0x3, 0x2) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0xfffc, @local}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = socket$igmp6(0xa, 0x3, 0x3a) getsockopt$MRT6(r2, 0x3a, 0x1, 0x0, &(0x7f0000000080)) 14:39:46 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r0, 0x8108551b, &(0x7f0000000040)=@usbdevfs_connect) 14:39:46 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_IOCTL(r0, 0x8108551b, &(0x7f0000000040)=@usbdevfs_connect) 14:39:46 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000080000000c00110022001995"], &(0x7f0000001f80)=""/237, 0x26, 0xed, 0xa}, 0x20) 14:39:46 executing program 4: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x9}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x9e}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 64.871064][ T4649] capability: warning: `syz-executor.4' uses deprecated v2 capabilities in a way that may be insecure 14:39:46 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sync() 14:39:46 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000080000000c00110022001995"], &(0x7f0000001f80)=""/237, 0x26, 0xed, 0xa}, 0x20) 14:39:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3fffffff404}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r2, 0x6628) 14:39:46 executing program 4: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x9}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x9e}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 64.930819][ T4644] loop5: detected capacity change from 0 to 2048 [ 64.942623][ T4296] udevd[4296]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory [ 64.955936][ T3177] udevd[3177]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 64.968694][ T3401] udevd[3401]: inotify_add_watch(7, /dev/loop0p3, 10) failed: No such file or directory 14:39:46 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000080000000c00110022001995"], &(0x7f0000001f80)=""/237, 0x26, 0xed, 0xa}, 0x20) 14:39:46 executing program 4: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x9}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x9e}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 65.030007][ T4296] udevd[4296]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory [ 65.034934][ T3115] udevd[3115]: inotify_add_watch(7, /dev/loop0p3, 10) failed: No such file or directory [ 65.042484][ T4661] loop3: detected capacity change from 0 to 2048 [ 65.049881][ T3401] udevd[3401]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory 14:39:46 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000080000000c00110022001995"], &(0x7f0000001f80)=""/237, 0x26, 0xed, 0xa}, 0x20) [ 65.077084][ T4644] loop5: p1 p2 p3 [ 65.089270][ T4661] loop3: p1 p2 p3 [ 65.108688][ T3115] udevd[3115]: inotify_add_watch(7, /dev/loop0p3, 10) failed: No such file or directory [ 65.108793][ T4669] udevd[4669]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory 14:39:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 14:39:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0xe, &(0x7f0000001040)={0x0}, 0x10) 14:39:46 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sync() [ 65.135470][ T3401] udevd[3401]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 65.171982][ T2764] loop3: p1 p2 p3 14:39:46 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sync() [ 65.219276][ T4296] udevd[4296]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory 14:39:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0xe, &(0x7f0000001040)={0x0}, 0x10) 14:39:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3fffffff404}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r2, 0x6628) 14:39:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3fffffff404}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r2, 0x6628) 14:39:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 14:39:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3fffffff404}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r2, 0x6628) 14:39:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 65.571828][ T48] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 65.651607][ T48] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 14:39:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 14:39:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3fffffff404}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r2, 0x6628) [ 65.713782][ T48] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 65.814382][ T48] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 14:39:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000003da1e4a3a041baf67c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd780000000080000000000000004c16bad1e6223c3e6278d869836ab05a87d3a1153d5bab"], 0x1, 0x793, &(0x7f0000001700)="$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") r0 = open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) ftruncate(r0, 0x0) [ 65.972835][ T27] audit: type=1400 audit(1705070387.393:203): avc: denied { search } for pid=2802 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 65.994299][ T27] audit: type=1400 audit(1705070387.393:204): avc: denied { read } for pid=2802 comm="dhcpcd" name="n25" dev="tmpfs" ino=3616 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 14:39:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 66.022503][ T48] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.086962][ T4713] loop3: detected capacity change from 0 to 2048 [ 66.098649][ T4713] EXT4-fs: Ignoring removed oldalloc option [ 66.128255][ T27] audit: type=1400 audit(1705070387.393:205): avc: denied { open } for pid=2802 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=3616 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 66.151258][ T27] audit: type=1400 audit(1705070387.393:206): avc: denied { getattr } for pid=2802 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=3616 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 66.174449][ T27] audit: type=1400 audit(1705070387.463:207): avc: denied { read } for pid=4711 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 66.197413][ T27] audit: type=1400 audit(1705070387.463:208): avc: denied { open } for pid=4711 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 14:39:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3fffffff404}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r2, 0x6628) [ 66.222353][ T27] audit: type=1400 audit(1705070387.463:209): avc: denied { getattr } for pid=4711 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 66.288717][ T48] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.308796][ T4713] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 66.389021][ T27] audit: type=1400 audit(1705070387.703:210): avc: denied { write } for pid=4710 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=341 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 66.412047][ T27] audit: type=1400 audit(1705070387.703:211): avc: denied { add_name } for pid=4710 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 14:39:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000003da1e4a3a041baf67c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd780000000080000000000000004c16bad1e6223c3e6278d869836ab05a87d3a1153d5bab"], 0x1, 0x793, &(0x7f0000001700)="$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") r0 = open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) ftruncate(r0, 0x0) [ 66.434559][ T27] audit: type=1400 audit(1705070387.703:212): avc: denied { create } for pid=4710 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 66.462066][ T48] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.513024][ T48] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.524478][ T3089] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 14:39:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 14:39:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000003da1e4a3a041baf67c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd780000000080000000000000004c16bad1e6223c3e6278d869836ab05a87d3a1153d5bab"], 0x1, 0x793, &(0x7f0000001700)="$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") r0 = open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) ftruncate(r0, 0x0) [ 66.641848][ T4745] loop3: detected capacity change from 0 to 2048 [ 66.649852][ T4745] EXT4-fs: Ignoring removed oldalloc option [ 66.663999][ T4745] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 14:39:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3fffffff404}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r2, 0x6628) [ 66.702813][ T3089] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 66.847289][ T4760] loop3: detected capacity change from 0 to 2048 [ 66.886650][ T4760] EXT4-fs: Ignoring removed oldalloc option 14:39:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000003da1e4a3a041baf67c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd780000000080000000000000004c16bad1e6223c3e6278d869836ab05a87d3a1153d5bab"], 0x1, 0x793, &(0x7f0000001700)="$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") r0 = open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) ftruncate(r0, 0x0) 14:39:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000003da1e4a3a041baf67c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd780000000080000000000000004c16bad1e6223c3e6278d869836ab05a87d3a1153d5bab"], 0x1, 0x793, &(0x7f0000001700)="$eJzs3c1rXFUbAPDnTpKmb9r3TV4QbF0FBA2UTkyNrYKLigsRLBR0bTtMpqFmkimZSWlCoBYR3AhaXAi66dqPunPrx1b/Bd2ISEvVtFhxISN3PjqTZiadtvloze8Htz3n3jM595l77zln5h7mBrBjjab/ZCL2R8R7ScRwY30SEQO1VH/E0Xq5myvL+XRJolp99bekVubGynI+2l6T2tPI7IuIb96OOJBZW295cWkmVywW5hv58crsmfHy4tLB07O56cJ0Ye7wxOTkoSPPHBncuFj/+H5p79X3X3ry86N/vfXo5Xe/TeJo7G1sa49jo4zGaOM9GUjfwlVe3OjKtlmy3TvAPUkvzb76VR77Yzj6aqne9F4SAHiQnI+IKgCwwyT6fwDYYZrfA9xYWc6nS/X89n4fsdWuvRARu+vxN+9v1rf0N+7Z7a7dBx26kay635FExMgG1D8aER9/+fqn6RKbdB8SoJM3L0TEyZHRZvvfan+SNXMW6nqfkPFUD2VGb8tr/2DrfJWOf55tjf9a11/m1vgnOox/Bjtcu/diNGJXe37t9Z+5sgHVdJWO/54faM1tu9kWf8NIXyP339qYbyA5dbpYSNu2/0XEWAwMpvmJdeoYu/739VUr+lrJ9vHf7xff+CStP/2/VSJzpf+2JncqV8ndb9xN1y5EPNbfKf7k1vFPuox/j/dYx8vPvfNRt21p/Gm8zWV1/Js/q6x6KeKJ6Bx/U7Le/MTD47XTYbx5UnTwxU8fDnWrv/34p0taf/OzwFZIj//Q+vGPJO3zNct3X8d3l4a/7rbtzvF3Pv93Ja/V0s3G41yuUpmfiNiVvLJ2/aHWa5v5Zvk0/rHHO1//653/6WfCkz3G33/118/uPf7NlcY/dVfH/+4Tl2/O9HWrv7fjP1lLjTXW9NL+9bqD9/PeAQAAAAAAAAAAAAAAAAAAAAAAAECvMhGxN5JM9lY6k8lm68/wfiSGMsVSuXLgVGlhbipqz8oeiYFM86cuh9t+D3Wi8Xv4zfyh2/JPR8T/I+KDwf/U8tl8qTi13cEDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQMOeLs//T/0yuN17BwBsmt13LHG9sCU7AgBsmTv3/wDAv43+HwB2Hv0/AOw8+n8A2Hn0/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGyy48eOpUv1z5XlfJqfOru4MFM6e3CqUJ7Jzi7ks/nS/JnsdKk0XSxk86XZtpf+0OnvFUulM5Mxt3BuvFIoV8bLi0snZksLc5UTp2dz04UThYEtiwwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeldeXJrJFYuFeYmHJVEdrh+6B2V/Nj/x88Ef961X5qLTeOMT290yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwc/gkAAP//skMoxA==") r0 = open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) ftruncate(r0, 0x0) [ 66.934521][ T4760] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 67.016428][ T3089] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 67.029184][ T4781] loop4: detected capacity change from 0 to 2048 [ 67.036773][ T4781] EXT4-fs: Ignoring removed oldalloc option 14:39:48 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clock_getres(0xffffffea, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) memfd_secret(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) dup3(r0, r1, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 14:39:48 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clock_getres(0xffffffea, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) memfd_secret(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) dup3(r0, r1, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) [ 67.081320][ T4781] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 67.095739][ T4786] loop3: detected capacity change from 0 to 2048 [ 67.116236][ T4786] EXT4-fs: Ignoring removed oldalloc option 14:39:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000003da1e4a3a041baf67c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd780000000080000000000000004c16bad1e6223c3e6278d869836ab05a87d3a1153d5bab"], 0x1, 0x793, &(0x7f0000001700)="$eJzs3c1rXFUbAPDnTpKmb9r3TV4QbF0FBA2UTkyNrYKLigsRLBR0bTtMpqFmkimZSWlCoBYR3AhaXAi66dqPunPrx1b/Bd2ISEvVtFhxISN3PjqTZiadtvloze8Htz3n3jM595l77zln5h7mBrBjjab/ZCL2R8R7ScRwY30SEQO1VH/E0Xq5myvL+XRJolp99bekVubGynI+2l6T2tPI7IuIb96OOJBZW295cWkmVywW5hv58crsmfHy4tLB07O56cJ0Ye7wxOTkoSPPHBncuFj/+H5p79X3X3ry86N/vfXo5Xe/TeJo7G1sa49jo4zGaOM9GUjfwlVe3OjKtlmy3TvAPUkvzb76VR77Yzj6aqne9F4SAHiQnI+IKgCwwyT6fwDYYZrfA9xYWc6nS/X89n4fsdWuvRARu+vxN+9v1rf0N+7Z7a7dBx26kay635FExMgG1D8aER9/+fqn6RKbdB8SoJM3L0TEyZHRZvvfan+SNXMW6nqfkPFUD2VGb8tr/2DrfJWOf55tjf9a11/m1vgnOox/Bjtcu/diNGJXe37t9Z+5sgHVdJWO/54faM1tu9kWf8NIXyP339qYbyA5dbpYSNu2/0XEWAwMpvmJdeoYu/739VUr+lrJ9vHf7xff+CStP/2/VSJzpf+2JncqV8ndb9xN1y5EPNbfKf7k1vFPuox/j/dYx8vPvfNRt21p/Gm8zWV1/Js/q6x6KeKJ6Bx/U7Le/MTD47XTYbx5UnTwxU8fDnWrv/34p0taf/OzwFZIj//Q+vGPJO3zNct3X8d3l4a/7rbtzvF3Pv93Ja/V0s3G41yuUpmfiNiVvLJ2/aHWa5v5Zvk0/rHHO1//653/6WfCkz3G33/118/uPf7NlcY/dVfH/+4Tl2/O9HWrv7fjP1lLjTXW9NL+9bqD9/PeAQAAAAAAAAAAAAAAAAAAAAAAAECvMhGxN5JM9lY6k8lm68/wfiSGMsVSuXLgVGlhbipqz8oeiYFM86cuh9t+D3Wi8Xv4zfyh2/JPR8T/I+KDwf/U8tl8qTi13cEDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQMOeLs//T/0yuN17BwBsmt13LHG9sCU7AgBsmTv3/wDAv43+HwB2Hv0/AOw8+n8A2Hn0/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGyy48eOpUv1z5XlfJqfOru4MFM6e3CqUJ7Jzi7ks/nS/JnsdKk0XSxk86XZtpf+0OnvFUulM5Mxt3BuvFIoV8bLi0snZksLc5UTp2dz04UThYEtiwwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeldeXJrJFYuFeYmHJVEdrh+6B2V/Nj/x88Ef961X5qLTeOMT290yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwc/gkAAP//skMoxA==") r0 = open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) ftruncate(r0, 0x0) 14:39:48 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clock_getres(0xffffffea, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) memfd_secret(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) dup3(r0, r1, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 14:39:48 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clock_getres(0xffffffea, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) memfd_secret(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) dup3(r0, r1, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 14:39:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0xe, &(0x7f0000001040)={0x0}, 0x10) 14:39:48 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clock_getres(0xffffffea, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) memfd_secret(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) dup3(r0, r1, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) [ 67.142110][ T4786] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 67.165680][ T3117] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 14:39:48 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0xfffffffffffffed8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x58}}, 0x0) [ 67.226160][ T3089] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 14:39:48 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0xfffffffffffffed8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x58}}, 0x0) 14:39:48 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0xfffffffffffffed8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x58}}, 0x0) 14:39:48 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clock_getres(0xffffffea, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) memfd_secret(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) dup3(r0, r1, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) [ 67.304177][ T4811] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 67.317758][ T4813] loop4: detected capacity change from 0 to 2048 [ 67.338613][ T4821] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 67.340386][ T4813] EXT4-fs: Ignoring removed oldalloc option 14:39:48 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clock_getres(0xffffffea, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) memfd_secret(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) dup3(r0, r1, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) [ 67.391909][ T4825] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 67.407473][ T48] hsr_slave_0: left promiscuous mode 14:39:48 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0xfffffffffffffed8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x58}}, 0x0) 14:39:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010021001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendto$packet(r0, &(0x7f0000000240)="04180800571688ca", 0x5dc, 0x0, &(0x7f0000000040)={0x11, 0x8100, r4, 0x1, 0x0, 0x6, @remote}, 0x14) [ 67.434513][ T4813] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 67.446722][ T48] hsr_slave_1: left promiscuous mode [ 67.459475][ T48] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 67.466899][ T48] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 67.476968][ T48] batman_adv: batadv0: Interface deactivated: batadv_slave_1 14:39:48 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sync() [ 67.484440][ T48] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 67.495495][ T48] bridge_slave_1: left allmulticast mode [ 67.501197][ T48] bridge_slave_1: left promiscuous mode [ 67.506016][ T4846] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.0'. [ 67.506926][ T48] bridge0: port 2(bridge_slave_1) entered disabled state 14:39:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x2, 0x5a1}, 0x9c) 14:39:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 14:39:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="626172726965722c6e6f6175746f5f64615f616c6c6f632c64696f726561645f6e6f6c6f636b2c6f6c64616c6c6f632c00f501293add424f5564620d31dee986aff91abc6b72c5b14976ae8b78588d3ba5770ee190db0262b8ea08c96bf8d5dea39cef09030000003da1e4a3a041baf67c4e4b28548319386220177fa31c1149bab68ff80268443c615b5c036e6b39b692fbf13a7ff3e3bb4e4dff4eec118e2954a5fe289294828f4d8dab342c5703875045d660d6063c9927a0db22b43b5dca660491be34af04d4396ef68f94b304432cdd780000000080000000000000004c16bad1e6223c3e6278d869836ab05a87d3a1153d5bab"], 0x1, 0x793, &(0x7f0000001700)="$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") r0 = open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) ftruncate(r0, 0x0) [ 67.558042][ T48] bridge_slave_0: left allmulticast mode [ 67.563754][ T48] bridge_slave_0: left promiscuous mode [ 67.569491][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.588635][ T48] hsr_slave_0: left promiscuous mode 14:39:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x2, 0x5a1}, 0x9c) 14:39:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x2, 0x5a1}, 0x9c) [ 67.605007][ T48] hsr_slave_1: left promiscuous mode [ 67.606172][ T3117] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 67.619669][ T48] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 67.627085][ T48] batman_adv: batadv0: Removing interface: batadv_slave_0 14:39:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x2, 0x5a1}, 0x9c) 14:39:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f00000001c0)=[{0x20, 0x0, 0x0, 0x8}, {0x6}]}) [ 67.652863][ T48] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 67.660335][ T48] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 67.685707][ T4861] loop4: detected capacity change from 0 to 2048 14:39:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f00000001c0)=[{0x20, 0x0, 0x0, 0x8}, {0x6}]}) [ 67.706405][ T48] bridge_slave_1: left allmulticast mode [ 67.712161][ T48] bridge_slave_1: left promiscuous mode [ 67.717865][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.733666][ T48] bridge_slave_0: left allmulticast mode [ 67.739435][ T48] bridge_slave_0: left promiscuous mode [ 67.740313][ T4861] EXT4-fs: Ignoring removed oldalloc option [ 67.745054][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.765781][ T48] veth1_macvtap: left promiscuous mode [ 67.771351][ T48] veth0_macvtap: left promiscuous mode [ 67.773051][ T4861] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 67.777236][ T48] veth1_vlan: left promiscuous mode [ 67.794587][ T48] veth0_vlan: left promiscuous mode [ 67.807910][ T48] veth1_macvtap: left promiscuous mode 14:39:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f00000001c0)=[{0x20, 0x0, 0x0, 0x8}, {0x6}]}) 14:39:49 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000d00)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() r1 = accept4(0xffffffffffffffff, &(0x7f0000000400)=@rc={0x1f, @fixed}, &(0x7f0000000380)=0x80, 0x0) kcmp(0xffffffffffffffff, r0, 0x6, 0xffffffffffffffff, r1) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x0, &(0x7f0000001740)=0x6) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') connect$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_clone(0x40005080, &(0x7f0000001440), 0x0, &(0x7f0000001540), &(0x7f0000001580), 0x0) ioprio_set$pid(0x2, r2, 0x4000) 14:39:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f00000001c0)=[{0x20, 0x0, 0x0, 0x8}, {0x6}]}) [ 67.813662][ T48] veth0_macvtap: left promiscuous mode [ 67.819247][ T48] veth1_vlan: left promiscuous mode [ 67.824560][ T48] veth0_vlan: left promiscuous mode [ 67.831275][ T3117] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 14:39:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0xc, &(0x7f0000000040)=0x8, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, 0x12, 0x1, 0x0, 0x0, {0x0, 0x3}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x24}}, 0x0) 14:39:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'vlan0\x00', &(0x7f0000000000)=@ethtool_perm_addr={0x17}}) [ 68.039170][ T48] team0 (unregistering): Port device team_slave_1 removed [ 68.049755][ T48] team0 (unregistering): Port device team_slave_0 removed [ 68.059553][ T48] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 68.071416][ T48] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 68.101991][ T48] bond0 (unregistering): Released all slaves [ 68.167951][ T48] team0 (unregistering): Port device team_slave_1 removed [ 68.178379][ T48] team0 (unregistering): Port device team_slave_0 removed [ 68.188635][ T48] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 68.200520][ T48] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 68.232122][ T48] bond0 (unregistering): Released all slaves 14:39:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010021001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendto$packet(r0, &(0x7f0000000240)="04180800571688ca", 0x5dc, 0x0, &(0x7f0000000040)={0x11, 0x8100, r4, 0x1, 0x0, 0x6, @remote}, 0x14) [ 68.280192][ T4847] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 14:39:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'vlan0\x00', &(0x7f0000000000)=@ethtool_perm_addr={0x17}}) 14:39:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0xc, &(0x7f0000000040)=0x8, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, 0x12, 0x1, 0x0, 0x0, {0x0, 0x3}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x24}}, 0x0) 14:39:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'vlan0\x00', &(0x7f0000000000)=@ethtool_perm_addr={0x17}}) 14:39:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010021001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendto$packet(r0, &(0x7f0000000240)="04180800571688ca", 0x5dc, 0x0, &(0x7f0000000040)={0x11, 0x8100, r4, 0x1, 0x0, 0x6, @remote}, 0x14) 14:39:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0xc, &(0x7f0000000040)=0x8, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, 0x12, 0x1, 0x0, 0x0, {0x0, 0x3}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x24}}, 0x0) [ 68.394743][ T4904] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 14:39:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'vlan0\x00', &(0x7f0000000000)=@ethtool_perm_addr={0x17}}) 14:39:49 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000d00)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() r1 = accept4(0xffffffffffffffff, &(0x7f0000000400)=@rc={0x1f, @fixed}, &(0x7f0000000380)=0x80, 0x0) kcmp(0xffffffffffffffff, r0, 0x6, 0xffffffffffffffff, r1) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x0, &(0x7f0000001740)=0x6) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') connect$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_clone(0x40005080, &(0x7f0000001440), 0x0, &(0x7f0000001540), &(0x7f0000001580), 0x0) ioprio_set$pid(0x2, r2, 0x4000) 14:39:49 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000d00)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() r1 = accept4(0xffffffffffffffff, &(0x7f0000000400)=@rc={0x1f, @fixed}, &(0x7f0000000380)=0x80, 0x0) kcmp(0xffffffffffffffff, r0, 0x6, 0xffffffffffffffff, r1) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x0, &(0x7f0000001740)=0x6) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') connect$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_clone(0x40005080, &(0x7f0000001440), 0x0, &(0x7f0000001540), &(0x7f0000001580), 0x0) ioprio_set$pid(0x2, r2, 0x4000) [ 68.596220][ T4815] chnl_net:caif_netlink_parms(): no params data found [ 68.665708][ T4815] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.672993][ T4815] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.680959][ T4815] bridge_slave_0: entered allmulticast mode [ 68.687813][ T4815] bridge_slave_0: entered promiscuous mode [ 68.722743][ T4815] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.729855][ T4815] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.742787][ T4815] bridge_slave_1: entered allmulticast mode [ 68.753697][ T4815] bridge_slave_1: entered promiscuous mode [ 68.780022][ T4815] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.790597][ T4815] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.801894][ T4857] chnl_net:caif_netlink_parms(): no params data found [ 68.827242][ T4815] team0: Port device team_slave_0 added [ 68.834799][ T4815] team0: Port device team_slave_1 added [ 68.878582][ T4815] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.885562][ T4815] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.911723][ T4815] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.936058][ T4857] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.943223][ T4857] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.954059][ T4857] bridge_slave_0: entered allmulticast mode [ 68.960881][ T4857] bridge_slave_0: entered promiscuous mode [ 68.971384][ T4815] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.978371][ T4815] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.004688][ T4815] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.015782][ T4857] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.022859][ T4857] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.031106][ T4857] bridge_slave_1: entered allmulticast mode [ 69.037359][ T4857] bridge_slave_1: entered promiscuous mode [ 69.060187][ T4857] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.088747][ T4857] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.104067][ T4815] hsr_slave_0: entered promiscuous mode [ 69.110499][ T4815] hsr_slave_1: entered promiscuous mode [ 69.136183][ T4857] team0: Port device team_slave_0 added [ 69.143649][ T4857] team0: Port device team_slave_1 added [ 69.164074][ T4857] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.171067][ T4857] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.197052][ T4857] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.208314][ T4857] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.215282][ T4857] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.241473][ T4857] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.289125][ T4857] hsr_slave_0: entered promiscuous mode [ 69.295234][ T4857] hsr_slave_1: entered promiscuous mode [ 69.301137][ T4857] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 69.308699][ T4857] Cannot create hsr debugfs directory [ 69.747504][ T4815] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 69.756093][ T4815] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 69.769592][ T4815] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 69.778305][ T4815] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 69.838411][ T4815] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.850603][ T4815] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.864085][ T3132] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.871359][ T3132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.919034][ T4815] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 69.929518][ T4815] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 69.948500][ T3136] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.955592][ T3136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.066897][ T4815] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.099816][ T4857] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 70.116612][ T4857] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 70.125297][ T4857] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 70.137694][ T4857] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 70.192813][ T4815] veth0_vlan: entered promiscuous mode [ 70.218997][ T4815] veth1_vlan: entered promiscuous mode [ 70.235102][ T4815] veth0_macvtap: entered promiscuous mode [ 70.258870][ T4857] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.268290][ T4815] veth1_macvtap: entered promiscuous mode [ 70.286198][ T4815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 70.296670][ T4815] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.306543][ T4815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 70.317054][ T4815] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.326879][ T4815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 70.337405][ T4815] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.347196][ T4815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 70.357791][ T4815] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.369779][ T4815] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 70.380921][ T4815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 70.391617][ T4815] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.401455][ T4815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 70.411919][ T4815] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.421795][ T4815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 70.432267][ T4815] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.442087][ T4815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 70.452576][ T4815] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.463835][ T4815] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 70.473095][ T4857] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.487154][ T4815] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.496173][ T4815] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.505000][ T4815] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.513807][ T4815] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.532288][ T3260] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.539416][ T3260] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.558263][ T3170] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.565402][ T3170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.587985][ T4857] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 14:39:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0xe, &(0x7f0000001040)={0x0}, 0x10) 14:39:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0xc, &(0x7f0000000040)=0x8, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, 0x12, 0x1, 0x0, 0x0, {0x0, 0x3}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x24}}, 0x0) 14:39:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010021001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendto$packet(r0, &(0x7f0000000240)="04180800571688ca", 0x5dc, 0x0, &(0x7f0000000040)={0x11, 0x8100, r4, 0x1, 0x0, 0x6, @remote}, 0x14) 14:39:52 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000d00)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() r1 = accept4(0xffffffffffffffff, &(0x7f0000000400)=@rc={0x1f, @fixed}, &(0x7f0000000380)=0x80, 0x0) kcmp(0xffffffffffffffff, r0, 0x6, 0xffffffffffffffff, r1) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x0, &(0x7f0000001740)=0x6) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') connect$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_clone(0x40005080, &(0x7f0000001440), 0x0, &(0x7f0000001540), &(0x7f0000001580), 0x0) ioprio_set$pid(0x2, r2, 0x4000) 14:39:52 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000d00)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() r1 = accept4(0xffffffffffffffff, &(0x7f0000000400)=@rc={0x1f, @fixed}, &(0x7f0000000380)=0x80, 0x0) kcmp(0xffffffffffffffff, r0, 0x6, 0xffffffffffffffff, r1) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x0, &(0x7f0000001740)=0x6) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') connect$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_clone(0x40005080, &(0x7f0000001440), 0x0, &(0x7f0000001540), &(0x7f0000001580), 0x0) ioprio_set$pid(0x2, r2, 0x4000) [ 70.663300][ T4857] 8021q: adding VLAN 0 to HW filter on device batadv0 14:39:52 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010021001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendto$packet(r0, &(0x7f0000000240)="04180800571688ca", 0x5dc, 0x0, &(0x7f0000000040)={0x11, 0x8100, r4, 0x1, 0x0, 0x6, @remote}, 0x14) 14:39:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0xe, &(0x7f0000001040)={0x0}, 0x10) [ 70.707758][ T5126] __nla_validate_parse: 1 callbacks suppressed [ 70.707769][ T5126] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 70.745432][ T5130] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 14:39:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000100)=""/126, 0x7e}, {0x0}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000700)=""/71, 0x47}], 0x6) getpeername$unix(r1, &(0x7f00000026c0)=ANY=[@ANYBLOB="e66a"], &(0x7f00000001c0)=0x103f) r2 = msgget(0x3, 0x30) msgsnd(r2, &(0x7f0000001b00)=ANY=[@ANYRESOCT=r1], 0x107, 0x0) msgsnd(r0, &(0x7f0000001b40)={0x1, "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"}, 0x13d, 0x800) msgrcv(r0, &(0x7f0000000900)={0x0, ""/4096}, 0x1008, 0xffffffffffffffff, 0x2000) msgget(0x2, 0x52e) 14:39:52 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010021001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendto$packet(r0, &(0x7f0000000240)="04180800571688ca", 0x5dc, 0x0, &(0x7f0000000040)={0x11, 0x8100, r4, 0x1, 0x0, 0x6, @remote}, 0x14) [ 70.870081][ T5152] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 70.928904][ T4857] veth0_vlan: entered promiscuous mode [ 70.947976][ T4857] veth1_vlan: entered promiscuous mode [ 70.975734][ T4857] veth0_macvtap: entered promiscuous mode [ 70.992624][ T4857] veth1_macvtap: entered promiscuous mode [ 71.004138][ T4857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 71.014673][ T4857] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.024504][ T4857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 71.034940][ T4857] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.044798][ T4857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 71.055310][ T4857] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.065151][ T4857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 71.075580][ T4857] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.085514][ T4857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 71.095969][ T4857] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.107067][ T4857] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 71.121538][ T4857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 71.132079][ T4857] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.142023][ T4857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 71.152583][ T4857] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.162662][ T4857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 71.173146][ T4857] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.182967][ T4857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 71.193397][ T4857] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.203297][ T4857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 71.213952][ T4857] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.226343][ T4857] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 71.240632][ T4857] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.249465][ T4857] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.258357][ T4857] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.267106][ T4857] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 14:39:52 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sync() 14:39:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) sigaltstack(0x0, 0x0) 14:39:52 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000d00)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() r1 = accept4(0xffffffffffffffff, &(0x7f0000000400)=@rc={0x1f, @fixed}, &(0x7f0000000380)=0x80, 0x0) kcmp(0xffffffffffffffff, r0, 0x6, 0xffffffffffffffff, r1) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x0, &(0x7f0000001740)=0x6) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') connect$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_clone(0x40005080, &(0x7f0000001440), 0x0, &(0x7f0000001540), &(0x7f0000001580), 0x0) ioprio_set$pid(0x2, r2, 0x4000) 14:39:52 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000050423eeffffffffffff02000000", @ANYRES32=r4, @ANYBLOB="01000000010021001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendto$packet(r0, &(0x7f0000000240)="04180800571688ca", 0x5dc, 0x0, &(0x7f0000000040)={0x11, 0x8100, r4, 0x1, 0x0, 0x6, @remote}, 0x14) 14:39:52 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000d00)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() r1 = accept4(0xffffffffffffffff, &(0x7f0000000400)=@rc={0x1f, @fixed}, &(0x7f0000000380)=0x80, 0x0) kcmp(0xffffffffffffffff, r0, 0x6, 0xffffffffffffffff, r1) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x0, &(0x7f0000001740)=0x6) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') connect$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_clone(0x40005080, &(0x7f0000001440), 0x0, &(0x7f0000001540), &(0x7f0000001580), 0x0) ioprio_set$pid(0x2, r2, 0x4000) [ 71.392883][ T5217] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 71.402431][ T27] kauditd_printk_skb: 16 callbacks suppressed [ 71.402441][ T27] audit: type=1326 audit(1705070392.823:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5214 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ac6319d29 code=0x7ffc0000 [ 71.432775][ T27] audit: type=1326 audit(1705070392.823:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5214 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ac6319d29 code=0x7ffc0000 [ 71.462494][ T27] audit: type=1326 audit(1705070392.883:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5214 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=131 compat=0 ip=0x7f7ac6319d29 code=0x7ffc0000 14:39:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={'\x00', 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 14:39:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) sync_file_range(r0, 0x0, 0x0, 0x0) 14:39:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={'\x00', 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 14:39:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={'\x00', 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 14:39:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) sync_file_range(r0, 0x0, 0x0, 0x0) [ 71.486345][ T27] audit: type=1326 audit(1705070392.883:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5214 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ac6319d29 code=0x7ffc0000 [ 71.510179][ T27] audit: type=1326 audit(1705070392.883:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5214 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ac6319d29 code=0x7ffc0000 [ 71.546981][ T27] audit: type=1326 audit(1705070392.953:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5227 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e5106ed29 code=0x7ffc0000 [ 71.570928][ T27] audit: type=1326 audit(1705070392.953:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5227 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e5106ed29 code=0x7ffc0000 14:39:52 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) read(r0, &(0x7f0000000140)=""/137, 0x89) 14:39:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={'\x00', 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xffffffffffffffff}) [ 71.595015][ T27] audit: type=1326 audit(1705070392.953:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5227 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=277 compat=0 ip=0x7f0e5106ed29 code=0x7ffc0000 [ 71.618937][ T27] audit: type=1326 audit(1705070392.953:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5227 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e5106ed29 code=0x7ffc0000 14:39:53 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) read(r0, &(0x7f0000000140)=""/137, 0x89) 14:39:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000100)=""/126, 0x7e}, {0x0}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000700)=""/71, 0x47}], 0x6) getpeername$unix(r1, &(0x7f00000026c0)=ANY=[@ANYBLOB="e66a"], &(0x7f00000001c0)=0x103f) r2 = msgget(0x3, 0x30) msgsnd(r2, &(0x7f0000001b00)=ANY=[@ANYRESOCT=r1], 0x107, 0x0) msgsnd(r0, &(0x7f0000001b40)={0x1, "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"}, 0x13d, 0x800) msgrcv(r0, &(0x7f0000000900)={0x0, ""/4096}, 0x1008, 0xffffffffffffffff, 0x2000) msgget(0x2, 0x52e) 14:39:53 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000100)=""/126, 0x7e}, {0x0}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000700)=""/71, 0x47}], 0x6) getpeername$unix(r1, &(0x7f00000026c0)=ANY=[@ANYBLOB="e66a"], &(0x7f00000001c0)=0x103f) r2 = msgget(0x3, 0x30) msgsnd(r2, &(0x7f0000001b00)=ANY=[@ANYRESOCT=r1], 0x107, 0x0) msgsnd(r0, &(0x7f0000001b40)={0x1, "d577a0f1b55d40de92ce05f2148950092f35d5ade543c2e4251bcb32f02a4bff9dd478c1be726a51e302e16c6477cafe3be5feddb3802341be47d5788ea28fe01bcabbc896e693a2dc9c2719a5a7cc02b129a218cce33a7d4f2484a641ed0df6a538e610a3578a7f44126f69a8d99974556a9f33c2689450ecccc386c5b02de7fba562a34e7f102c4f861d62d4dc76ede826d2c00e4ee6d1f68d2af2b9d42a6c0bb375d3b57d9730009e0e9ee912b7196f0022f1c82528e471eea347dd45b0ad7655a5cf3a7fea1b1a0d35b50b490cc27624261977a7b11d9b0a440860644050e8b67c0d4921f2ee950a4bf5507e43d1dcf6ab60d77e4e904664e6d7d93009752264ab69bf744dba4095b9c3d0091e84a8d0497343f033c5ec94bb4017643e3c6c13e01006084beaf2e1a2b3bf829670dd8b085dc7"}, 0x13d, 0x800) msgrcv(r0, &(0x7f0000000900)={0x0, ""/4096}, 0x1008, 0xffffffffffffffff, 0x2000) msgget(0x2, 0x52e) [ 71.647088][ T27] audit: type=1326 audit(1705070393.063:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5234 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0e5106ed29 code=0x7ffc0000 14:39:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) sync_file_range(r0, 0x0, 0x0, 0x0) 14:39:53 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) read(r0, &(0x7f0000000140)=""/137, 0x89) 14:39:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) sync_file_range(r0, 0x0, 0x0, 0x0) 14:39:53 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) read(r0, &(0x7f0000000140)=""/137, 0x89) 14:39:53 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000100)=""/126, 0x7e}, {0x0}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000700)=""/71, 0x47}], 0x6) getpeername$unix(r1, &(0x7f00000026c0)=ANY=[@ANYBLOB="e66a"], &(0x7f00000001c0)=0x103f) r2 = msgget(0x3, 0x30) msgsnd(r2, &(0x7f0000001b00)=ANY=[@ANYRESOCT=r1], 0x107, 0x0) msgsnd(r0, &(0x7f0000001b40)={0x1, "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"}, 0x13d, 0x800) msgrcv(r0, &(0x7f0000000900)={0x0, ""/4096}, 0x1008, 0xffffffffffffffff, 0x2000) msgget(0x2, 0x52e) 14:39:53 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) read(r0, &(0x7f0000000140)=""/137, 0x89) 14:39:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x3, 0x300, 0x0) 14:39:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x804) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000240), 0x24, 0x0) 14:39:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x804) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000240), 0x24, 0x0) 14:39:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x3, 0x300, 0x0) 14:39:53 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) read(r0, &(0x7f0000000140)=""/137, 0x89) 14:39:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x804) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000240), 0x24, 0x0) 14:39:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x3, 0x300, 0x0) 14:39:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x804) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000240), 0x24, 0x0) 14:39:53 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) read(r0, &(0x7f0000000140)=""/137, 0x89) 14:39:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x3, 0x300, 0x0) 14:39:53 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x101002) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000040)={0x0, 0xfffffffffffffffd}) 14:39:53 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x0, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast1}, @loopback]}, 0x28) 14:39:53 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x101002) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000040)={0x0, 0xfffffffffffffffd}) 14:39:53 executing program 0: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) 14:39:53 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x0, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast1}, @loopback]}, 0x28) 14:39:53 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x101002) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000040)={0x0, 0xfffffffffffffffd}) 14:39:53 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x101002) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000040)={0x0, 0xfffffffffffffffd}) 14:39:53 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x0, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast1}, @loopback]}, 0x28) [ 72.094395][ T5318] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5318 comm=syz-executor.0 14:39:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_OKEY={0x8}, @IFLA_VTI_IKEY={0x8}]]}}}]}, 0x40}}, 0x0) 14:39:53 executing program 0: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) 14:39:53 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x0, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast1}, @loopback]}, 0x28) 14:39:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_OKEY={0x8}, @IFLA_VTI_IKEY={0x8}]]}}}]}, 0x40}}, 0x0) 14:39:53 executing program 2: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) 14:39:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_OKEY={0x8}, @IFLA_VTI_IKEY={0x8}]]}}}]}, 0x40}}, 0x0) [ 72.242283][ T5344] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5344 comm=syz-executor.0 [ 72.264637][ T5349] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5349 comm=syz-executor.2 14:39:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_OKEY={0x8}, @IFLA_VTI_IKEY={0x8}]]}}}]}, 0x40}}, 0x0) 14:39:54 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000100)=""/126, 0x7e}, {0x0}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000700)=""/71, 0x47}], 0x6) getpeername$unix(r1, &(0x7f00000026c0)=ANY=[@ANYBLOB="e66a"], &(0x7f00000001c0)=0x103f) r2 = msgget(0x3, 0x30) msgsnd(r2, &(0x7f0000001b00)=ANY=[@ANYRESOCT=r1], 0x107, 0x0) msgsnd(r0, &(0x7f0000001b40)={0x1, "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"}, 0x13d, 0x800) msgrcv(r0, &(0x7f0000000900)={0x0, ""/4096}, 0x1008, 0xffffffffffffffff, 0x2000) msgget(0x2, 0x52e) 14:39:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000100)=""/126, 0x7e}, {0x0}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000700)=""/71, 0x47}], 0x6) getpeername$unix(r1, &(0x7f00000026c0)=ANY=[@ANYBLOB="e66a"], &(0x7f00000001c0)=0x103f) r2 = msgget(0x3, 0x30) msgsnd(r2, &(0x7f0000001b00)=ANY=[@ANYRESOCT=r1], 0x107, 0x0) msgsnd(r0, &(0x7f0000001b40)={0x1, "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"}, 0x13d, 0x800) msgrcv(r0, &(0x7f0000000900)={0x0, ""/4096}, 0x1008, 0xffffffffffffffff, 0x2000) msgget(0x2, 0x52e) 14:39:54 executing program 4: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) 14:39:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) 14:39:54 executing program 0: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) [ 72.601730][ T5377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5377 comm=syz-executor.0 [ 72.602508][ T5374] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5374 comm=syz-executor.2 [ 72.617879][ T5376] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5376 comm=syz-executor.4 14:39:54 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000100)=""/126, 0x7e}, {0x0}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000700)=""/71, 0x47}], 0x6) getpeername$unix(r1, &(0x7f00000026c0)=ANY=[@ANYBLOB="e66a"], &(0x7f00000001c0)=0x103f) r2 = msgget(0x3, 0x30) msgsnd(r2, &(0x7f0000001b00)=ANY=[@ANYRESOCT=r1], 0x107, 0x0) msgsnd(r0, &(0x7f0000001b40)={0x1, "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"}, 0x13d, 0x800) msgrcv(r0, &(0x7f0000000900)={0x0, ""/4096}, 0x1008, 0xffffffffffffffff, 0x2000) msgget(0x2, 0x52e) 14:39:54 executing program 0: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) 14:39:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="020026bd7000fcdbdf250e0000001400028004000400080001000200000004000400b80001800d0001007564703a73797a32000000004400028008000400090000000800030000040000080002000500000008000200ff00000008000300060000000800030066030000080002007f000000080001001d0000000d0001a7f7d3514ed0af9c3200000000080003007f000000380004001400010002004e217f0000010000000000000000200002000a004e210000508001fc000000000000000000000000005ad87b24495e09ac01007564703a73797a3200000000a80001800d00010075647064f0bbd1be3a73797a30000000001c0002800800040001000100080001001f000000080004003a6d827b08000300000000100c00008008000300f90000000800040002000000080004002000000018c4fc006574683a76657468305f746f5f626174616476001c000280080002000100010008000100040000000800010005000000100001006574683a697036746e6c30000d0001007564703a73797a3100000000e40001801000010069623a6d6163766c616e30001500010069623a76657468305f746f5f626f6e64000000002c0004001400010002004e21ac14143e00000000000000001400020002004e210a01010200000000000000000d0001007564703a73797a3000000000080003000000000024000280080001001000000008000300070000000800020007000000080000090008000038000400200001000a004e2100020000fe800000000000000000000000000015000800001400020002004e210a01010000000000000000001600010069623a6261746164765f736c6176655f31000000040007"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) [ 72.698969][ T5382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5382 comm=syz-executor.0 14:39:54 executing program 4: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) [ 72.751638][ T5386] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5386 comm=syz-executor.2 14:39:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) 14:39:54 executing program 0: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) [ 72.808080][ T5390] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5390 comm=syz-executor.4 [ 72.854877][ T5393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5393 comm=syz-executor.0 14:39:54 executing program 4: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) 14:39:54 executing program 0: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) 14:39:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) 14:39:54 executing program 4: r0 = syz_open_procfs$pagemap(0x0, &(0x7f0000000080)) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f00000001c0)={0x60, 0x0, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f00000000c0)=[{}], 0x300}) 14:39:54 executing program 4: r0 = syz_open_procfs$pagemap(0x0, &(0x7f0000000080)) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f00000001c0)={0x60, 0x0, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f00000000c0)=[{}], 0x300}) 14:39:54 executing program 4: r0 = syz_open_procfs$pagemap(0x0, &(0x7f0000000080)) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f00000001c0)={0x60, 0x0, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f00000000c0)=[{}], 0x300}) 14:39:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) 14:39:54 executing program 0: r0 = socket(0x10, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f0000000000000000000000005a017c63d7b182fa8d9e48200138382dc7ae32dc3acb646ef04bab2f1c11866dc95be55a01a1cff1c12a9c3bd2fa2cd36b9909c8f444d36ae09522d741ce24808663cb657a8988adabaff3549636d5b37f7b158d22c15d05ebcbee", 0x77) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="70020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r1 = syz_open_dev$vcsa(&(0x7f0000000500), 0x6, 0x48a00) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setsig(r2, 0xa, 0x21) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r3, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close_range(r3, r4, 0x2) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) close(r5) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b00)={0x304, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7f}}}}, [@NL80211_ATTR_REKEY_DATA={0x94, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf21}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x471}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="53ba5ebeb7c34d4d4a0b7c10602eeda0e0146757df71db4e39afd41510b9e70a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c5cbdf131033a210"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5355fe7b09e07ede"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fdaae4aa0f9fb9c107d093563b56d76f43d0eda34996315"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ee01daad987a72d78875d5eae4d45fa3"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="297780314287a188c36692f72412f345"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e061c91090085ec9"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ddfd4a1d482eb8d1e7326dc8fa3c97b1a278c9d6731a0cee6dc18a26d87f2077"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ff1149d34d658bd8"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="8d93cf1b4cc1eb5a8ff394bebd8f6cf712ce688b3e2b7402"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xad}]}, @NL80211_ATTR_REKEY_DATA={0x5c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="862e8dcba7f05c3bcf4316858aba26ed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe9bb}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="9814e7dbbca4a030641add4644ac52b966d5a39196f97acc560af37ee8fb0462"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1f}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x78, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c0f4221f873e01b435c9e1d2d9f09e1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5b17d0b3618b5748"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1a24ace1f9b87562d9ee9a24711df508"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="2092800e2e522c15e8035314a5db0f6f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c7c3623a80b9b500458bd8c184f115e5"}]}, @NL80211_ATTR_REKEY_DATA={0xc, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xfffffffe}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b635462292fba282d9598db0910eb4c7"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="77e22ef905dd278e04fb9aaf9277b6b7"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="8b96c85ac3edca614c3dc02aeb3a3174d812d6368b4b5a364d72fbfed6f87179"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "2c93c267a8a58731"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="c58b9377ca303470646b7c73e437440c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="49635e7028e311ee474829fa8cb8dbeb"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x200}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2f8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="503bab3f9a6c09aa2ff01367edc8b2127354963a4887858e23a8444b46bc17ee"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5cb79ab467a618a1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d53d6a2b7ef8b75d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7df3437d20989acbbe5e28f71e73bcc9"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="48584fbfdf9ffa6a43dc06ae2c2b8383"}]}]}, 0x304}}, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) 14:39:54 executing program 4: r0 = syz_open_procfs$pagemap(0x0, &(0x7f0000000080)) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f00000001c0)={0x60, 0x0, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f00000000c0)=[{}], 0x300}) 14:39:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000100000000000001e5ff0000100000000000000001000084060000000000000001"], 0x0, 0x42}, 0x20) 14:39:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000100000000000001e5ff0000100000000000000001000084060000000000000001"], 0x0, 0x42}, 0x20) 14:39:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x16}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd0}}, 0x0) 14:39:54 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, 0xffffffffffffffff) 14:39:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000100000000000001e5ff0000100000000000000001000084060000000000000001"], 0x0, 0x42}, 0x20) 14:39:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x16}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd0}}, 0x0) 14:39:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000100000000000001e5ff0000100000000000000001000084060000000000000001"], 0x0, 0x42}, 0x20) 14:39:54 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, 0xffffffffffffffff) 14:39:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x16}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd0}}, 0x0) 14:39:54 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, 0xffffffffffffffff) 14:39:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x16}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xd0}}, 0x0) 14:39:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=@ipv6_newrule={0x70, 0x20, 0x1, 0x0, 0x25dfdbfb, {0xa, 0x10, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@FRA_DST={0x14, 0x1, @private1}, @FIB_RULE_POLICY=@FRA_TABLE={0x8}, @FRA_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @dev}}, @FIB_RULE_POLICY=@FRA_FWMARK={0x8, 0xa, 0x400}, @FRA_SRC={0x14, 0x2, @empty}, @FIB_RULE_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e20, 0x4e21}}]}, 0x70}}, 0x0) 14:39:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=@ipv6_newrule={0x70, 0x20, 0x1, 0x0, 0x25dfdbfb, {0xa, 0x10, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@FRA_DST={0x14, 0x1, @private1}, @FIB_RULE_POLICY=@FRA_TABLE={0x8}, @FRA_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @dev}}, @FIB_RULE_POLICY=@FRA_FWMARK={0x8, 0xa, 0x400}, @FRA_SRC={0x14, 0x2, @empty}, @FIB_RULE_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e20, 0x4e21}}]}, 0x70}}, 0x0) 14:39:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000100)=""/126, 0x7e}, {0x0}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000700)=""/71, 0x47}], 0x6) getpeername$unix(r1, &(0x7f00000026c0)=ANY=[@ANYBLOB="e66a"], &(0x7f00000001c0)=0x103f) r2 = msgget(0x3, 0x30) msgsnd(r2, &(0x7f0000001b00)=ANY=[@ANYRESOCT=r1], 0x107, 0x0) msgsnd(r0, &(0x7f0000001b40)={0x1, "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"}, 0x13d, 0x800) msgrcv(r0, &(0x7f0000000900)={0x0, ""/4096}, 0x1008, 0xffffffffffffffff, 0x2000) msgget(0x2, 0x52e) 14:39:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x2b}, 0x10) 14:39:54 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000001c80)=ANY=[@ANYBLOB="ffffffffffffaaaa39be59f6c23d05566a7b4106aaaaaabb86dd60000000000000000000678100000000000000000000000000000000b0e2f39a9645f2de0a77ccf2e9d7a404b12fd28177d61e7bcceb18548337a9005d169670c55eaf3561bd7e982ca921dde37b4c46bfcfa2bcc96c005c369619f997f0787be5db9a48e2d5c5f3c6100fca81e1beb5f5ee96ba1861cbf4693e430444a851207b879d745c685274c5699758b060c9ddb687188fde15d29932b77830d9a410f73478d215a1802e91b0fe6dca500ac999a89066d309ec346230b7a548ce8deceaad22b0dd1c179ccf7dec36c509af01e72e7eafdba1b2fb0ef5137390d0a600674678e2e06c091931718105fae17fd1fde619af49f9906538"], 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000100)=""/126, 0x7e}, {0x0}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000700)=""/71, 0x47}], 0x6) getpeername$unix(r1, &(0x7f00000026c0)=ANY=[@ANYBLOB="e66a"], &(0x7f00000001c0)=0x103f) r2 = msgget(0x3, 0x30) msgsnd(r2, &(0x7f0000001b00)=ANY=[@ANYRESOCT=r1], 0x107, 0x0) msgsnd(r0, &(0x7f0000001b40)={0x1, "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"}, 0x13d, 0x800) msgrcv(r0, &(0x7f0000000900)={0x0, ""/4096}, 0x1008, 0xffffffffffffffff, 0x2000) msgget(0x2, 0x52e) 14:39:54 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, 0xffffffffffffffff) 14:39:54 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], 0x0) r0 = msgget$private(0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) readv(r1, &(0x7f0000000540)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000100)=""/126, 0x7e}, {0x0}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000700)=""/71, 0x47}], 0x6) getpeername$unix(r1, &(0x7f00000026c0)=ANY=[@ANYBLOB="e66a"], &(0x7f00000001c0)=0x103f) r2 = msgget(0x3, 0x30) msgsnd(r2, &(0x7f0000001b00)=ANY=[@ANYRESOCT=r1], 0x107, 0x0) msgsnd(r0, &(0x7f0000001b40)={0x1, "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"}, 0x13d, 0x800) msgrcv(r0, &(0x7f0000000900)={0x0, ""/4096}, 0x1008, 0xffffffffffffffff, 0x2000) msgget(0x2, 0x52e) 14:39:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=@ipv6_newrule={0x70, 0x20, 0x1, 0x0, 0x25dfdbfb, {0xa, 0x10, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@FRA_DST={0x14, 0x1, @private1}, @FIB_RULE_POLICY=@FRA_TABLE={0x8}, @FRA_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @dev}}, @FIB_RULE_POLICY=@FRA_FWMARK={0x8, 0xa, 0x400}, @FRA_SRC={0x14, 0x2, @empty}, @FIB_RULE_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e20, 0x4e21}}]}, 0x70}}, 0x0) 14:39:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x2b}, 0x10) 14:39:54 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8}]}}]}, 0x78}}, 0x0) 14:39:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=@ipv6_newrule={0x70, 0x20, 0x1, 0x0, 0x25dfdbfb, {0xa, 0x10, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@FRA_DST={0x14, 0x1, @private1}, @FIB_RULE_POLICY=@FRA_TABLE={0x8}, @FRA_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @dev}}, @FIB_RULE_POLICY=@FRA_FWMARK={0x8, 0xa, 0x400}, @FRA_SRC={0x14, 0x2, @empty}, @FIB_RULE_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e20, 0x4e21}}]}, 0x70}}, 0x0) 14:39:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x2b}, 0x10) 14:39:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b44, &(0x7f0000000000)=""/166) 14:39:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b44, &(0x7f0000000000)=""/166) 14:39:55 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8}]}}]}, 0x78}}, 0x0) 14:39:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x2b}, 0x10) [ 73.562854][ T5457] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 14:39:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b44, &(0x7f0000000000)=""/166) 14:39:55 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8}]}}]}, 0x78}}, 0x0) 14:39:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b44, &(0x7f0000000000)=""/166) 14:39:55 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8}]}}]}, 0x78}}, 0x0) 14:39:55 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8}]}}]}, 0x78}}, 0x0) [ 73.651467][ T5477] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 73.662804][ T5472] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 14:39:55 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8}]}}]}, 0x78}}, 0x0) 14:39:55 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8}]}}]}, 0x78}}, 0x0) 14:39:55 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8}]}}]}, 0x78}}, 0x0) 14:39:55 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8}]}}]}, 0x78}}, 0x0) [ 73.701653][ T5482] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 73.716093][ T5483] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 73.725762][ T5485] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 14:39:55 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x7ffffffff000, 0x3, &(0x7f0000ffe000/0x2000)=nil) 14:39:55 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x7ffffffff000, 0x3, &(0x7f0000ffe000/0x2000)=nil) 14:39:55 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4c, 0x2, [@TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}, @TCA_BPF_FD={0x8}]}}]}, 0x78}}, 0x0) 14:39:55 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x7ffffffff000, 0x3, &(0x7f0000ffe000/0x2000)=nil) 14:39:55 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x401, @none, 0x0, 0x2}, 0xe) 14:39:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xf, 0x4, 0x8, 0x101}, 0x48) bpf$BPF_GET_MAP_INFO(0x10, &(0x7f0000000140)={r0, 0x5, 0x0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x10012, r1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@ifindex, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:39:55 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x7ffffffff000, 0x3, &(0x7f0000ffe000/0x2000)=nil) 14:39:55 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x401, @none, 0x0, 0x2}, 0xe) 14:39:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) 14:39:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xf, 0x4, 0x8, 0x101}, 0x48) bpf$BPF_GET_MAP_INFO(0x10, &(0x7f0000000140)={r0, 0x5, 0x0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x10012, r1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@ifindex, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:39:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000080", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000003580)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000084000000010000000000000044"], 0x30}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) 14:39:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) 14:39:55 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fstat(0xffffffffffffffff, 0x0) 14:39:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) 14:39:55 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x401, @none, 0x0, 0x2}, 0xe) 14:39:55 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fstat(0xffffffffffffffff, 0x0) 14:39:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xf, 0x4, 0x8, 0x101}, 0x48) bpf$BPF_GET_MAP_INFO(0x10, &(0x7f0000000140)={r0, 0x5, 0x0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x10012, r1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@ifindex, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:39:55 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x2}]}, &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000380)=""/4096}, 0x90) 14:39:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) 14:39:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xf, 0x4, 0x8, 0x101}, 0x48) bpf$BPF_GET_MAP_INFO(0x10, &(0x7f0000000140)={r0, 0x5, 0x0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x10012, r1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@ifindex, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:39:55 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x401, @none, 0x0, 0x2}, 0xe) 14:39:55 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fstat(0xffffffffffffffff, 0x0) 14:39:55 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x2}]}, &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000380)=""/4096}, 0x90) 14:39:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x58, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x30, 0x8, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}, {0x4}]}]}, 0x58}}, 0x0) 14:39:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000011c0)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newaddr={0x48, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LABEL={0x14, 0xb, 'gretap0\x00'}, @IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x2}}]}, 0x48}}, 0x0) 14:39:55 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x2}]}, &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000380)=""/4096}, 0x90) 14:39:55 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x7, 0x8, &(0x7f0000000180)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xae}, {0x7, 0x0, 0xb, 0x9}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 14:39:55 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fstat(0xffffffffffffffff, 0x0) 14:39:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x58, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x30, 0x8, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}, {0x4}]}]}, 0x58}}, 0x0) 14:39:55 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x2}]}, &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000380)=""/4096}, 0x90) 14:39:55 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8000003d) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 14:39:55 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x7, 0x8, &(0x7f0000000180)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xae}, {0x7, 0x0, 0xb, 0x9}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 14:39:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x58, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x30, 0x8, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}, {0x4}]}]}, 0x58}}, 0x0) 14:39:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000011c0)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newaddr={0x48, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LABEL={0x14, 0xb, 'gretap0\x00'}, @IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x2}}]}, 0x48}}, 0x0) 14:39:55 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) [ 74.510034][ T5542] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 14:39:56 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x7, 0x8, &(0x7f0000000180)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xae}, {0x7, 0x0, 0xb, 0x9}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 14:39:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x58, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x30, 0x8, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}]}, {0x4}]}]}, 0x58}}, 0x0) 14:39:56 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8000003d) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 14:39:56 executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x7, 0x8, &(0x7f0000000180)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xae}, {0x7, 0x0, 0xb, 0x9}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 14:39:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@newlink={0x38, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4048b}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000440)={0x2, 0x0, @private}, 0x10, &(0x7f0000000500)=[{&(0x7f00000004c0)="9e01", 0x2}], 0x1, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @local}}}], 0x20}, 0x0) 14:39:56 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8000003d) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 14:39:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000011c0)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newaddr={0x48, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LABEL={0x14, 0xb, 'gretap0\x00'}, @IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x2}}]}, 0x48}}, 0x0) [ 74.596509][ T5563] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 74.654309][ T5575] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 14:39:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000080", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000003580)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000084000000010000000000000044"], 0x30}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) 14:39:56 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) 14:39:56 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) 14:39:56 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8000003d) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 14:39:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000011c0)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newaddr={0x48, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LABEL={0x14, 0xb, 'gretap0\x00'}, @IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x2}}]}, 0x48}}, 0x0) 14:39:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@newlink={0x38, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4048b}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000440)={0x2, 0x0, @private}, 0x10, &(0x7f0000000500)=[{&(0x7f00000004c0)="9e01", 0x2}], 0x1, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @local}}}], 0x20}, 0x0) 14:39:56 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) 14:39:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@newlink={0x38, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4048b}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000440)={0x2, 0x0, @private}, 0x10, &(0x7f0000000500)=[{&(0x7f00000004c0)="9e01", 0x2}], 0x1, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @local}}}], 0x20}, 0x0) 14:39:56 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x11}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x4b) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000240)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) [ 75.167081][ T5584] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 14:39:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000080", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000003580)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000084000000010000000000000044"], 0x30}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) 14:39:56 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) 14:39:56 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) 14:39:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@newlink={0x38, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4048b}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000440)={0x2, 0x0, @private}, 0x10, &(0x7f0000000500)=[{&(0x7f00000004c0)="9e01", 0x2}], 0x1, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @local}}}], 0x20}, 0x0) 14:39:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@newlink={0x38, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4048b}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000440)={0x2, 0x0, @private}, 0x10, &(0x7f0000000500)=[{&(0x7f00000004c0)="9e01", 0x2}], 0x1, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @local}}}], 0x20}, 0x0) 14:39:56 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) 14:39:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@newlink={0x38, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4048b}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000440)={0x2, 0x0, @private}, 0x10, &(0x7f0000000500)=[{&(0x7f00000004c0)="9e01", 0x2}], 0x1, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @local}}}], 0x20}, 0x0) 14:39:56 executing program 5: syz_emit_ethernet(0x106, &(0x7f0000000680)={@link_local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, '9#=', 0xd0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, @ipv4={'\x00', '\xff\xff', @private}, {[], "441907c0fd635d343357d93097b95be11dac3285705186ff9824dffadf23bb6e21a93a187bf94864ecddf9f2ab1f9b5b8182cfd165726a1185c9e9b9c3f0017d17b34bfb148cb3cded3af574873366e987792003181c408de9ed95d7676c6e29933fe62fdc0682d89f0bb429041c65c254f7ad8644bf3907629dd7e7b77c112f42a47933ac395bbd55c1566d36b1348a80ff3b9c7e7cd667ae6efe0d10e9e1c37e9700fa98202772a24ec4b5ef2951eaabeb0104da473fa2714de95ec4e8d22e544b4a39a7609864128fb9046e7f2d3f"}}}}}, 0x0) 14:39:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000080", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000003580)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000084000000010000000000000044"], 0x30}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) 14:39:56 executing program 5: syz_emit_ethernet(0x106, &(0x7f0000000680)={@link_local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, '9#=', 0xd0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, @ipv4={'\x00', '\xff\xff', @private}, {[], "441907c0fd635d343357d93097b95be11dac3285705186ff9824dffadf23bb6e21a93a187bf94864ecddf9f2ab1f9b5b8182cfd165726a1185c9e9b9c3f0017d17b34bfb148cb3cded3af574873366e987792003181c408de9ed95d7676c6e29933fe62fdc0682d89f0bb429041c65c254f7ad8644bf3907629dd7e7b77c112f42a47933ac395bbd55c1566d36b1348a80ff3b9c7e7cd667ae6efe0d10e9e1c37e9700fa98202772a24ec4b5ef2951eaabeb0104da473fa2714de95ec4e8d22e544b4a39a7609864128fb9046e7f2d3f"}}}}}, 0x0) 14:39:56 executing program 2: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000000)={@ifindex, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 14:39:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8f}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 14:39:56 executing program 2: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000000)={@ifindex, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 14:39:56 executing program 5: syz_emit_ethernet(0x106, &(0x7f0000000680)={@link_local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, '9#=', 0xd0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, @ipv4={'\x00', '\xff\xff', @private}, {[], "441907c0fd635d343357d93097b95be11dac3285705186ff9824dffadf23bb6e21a93a187bf94864ecddf9f2ab1f9b5b8182cfd165726a1185c9e9b9c3f0017d17b34bfb148cb3cded3af574873366e987792003181c408de9ed95d7676c6e29933fe62fdc0682d89f0bb429041c65c254f7ad8644bf3907629dd7e7b77c112f42a47933ac395bbd55c1566d36b1348a80ff3b9c7e7cd667ae6efe0d10e9e1c37e9700fa98202772a24ec4b5ef2951eaabeb0104da473fa2714de95ec4e8d22e544b4a39a7609864128fb9046e7f2d3f"}}}}}, 0x0) 14:39:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8f}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 14:39:56 executing program 5: syz_emit_ethernet(0x106, &(0x7f0000000680)={@link_local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, '9#=', 0xd0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, @ipv4={'\x00', '\xff\xff', @private}, {[], "441907c0fd635d343357d93097b95be11dac3285705186ff9824dffadf23bb6e21a93a187bf94864ecddf9f2ab1f9b5b8182cfd165726a1185c9e9b9c3f0017d17b34bfb148cb3cded3af574873366e987792003181c408de9ed95d7676c6e29933fe62fdc0682d89f0bb429041c65c254f7ad8644bf3907629dd7e7b77c112f42a47933ac395bbd55c1566d36b1348a80ff3b9c7e7cd667ae6efe0d10e9e1c37e9700fa98202772a24ec4b5ef2951eaabeb0104da473fa2714de95ec4e8d22e544b4a39a7609864128fb9046e7f2d3f"}}}}}, 0x0) 14:39:56 executing program 2: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000000)={@ifindex, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 14:39:56 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'macvtap0\x00', &(0x7f00000001c0)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "058aeb"}}) 14:39:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8f}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 14:39:56 executing program 2: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000000)={@ifindex, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 14:39:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@newlink={0x38, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4048b}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000440)={0x2, 0x0, @private}, 0x10, &(0x7f0000000500)=[{&(0x7f00000004c0)="9e01", 0x2}], 0x1, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @local}}}], 0x20}, 0x0) 14:39:56 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'macvtap0\x00', &(0x7f00000001c0)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "058aeb"}}) 14:39:56 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'macvtap0\x00', &(0x7f00000001c0)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "058aeb"}}) 14:39:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, 0x7, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x7, 0x2, 'syz2\x00'}]}, 0x2c}}, 0x0) 14:39:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8f}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 14:39:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, 0x7, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x7, 0x2, 'syz2\x00'}]}, 0x2c}}, 0x0) 14:39:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, 0x7, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x7, 0x2, 'syz2\x00'}]}, 0x2c}}, 0x0) 14:39:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, 0x7, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x7, 0x2, 'syz2\x00'}]}, 0x2c}}, 0x0) 14:39:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, 0x7, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x7, 0x2, 'syz2\x00'}]}, 0x2c}}, 0x0) 14:39:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, 0x7, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x7, 0x2, 'syz2\x00'}]}, 0x2c}}, 0x0) 14:39:57 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'macvtap0\x00', &(0x7f00000001c0)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "058aeb"}}) 14:39:57 executing program 2: ioperm(0x0, 0x9, 0x8000000000000001) prctl$PR_SET_ENDIAN(0x1a, 0x1) 14:39:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, 0x7, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x7, 0x2, 'syz2\x00'}]}, 0x2c}}, 0x0) 14:39:57 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) membarrier(0x2, 0x0) 14:39:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, 0x0, 0x0) 14:39:57 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x11}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x4b) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000240)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) 14:39:57 executing program 2: ioperm(0x0, 0x9, 0x8000000000000001) prctl$PR_SET_ENDIAN(0x1a, 0x1) 14:39:57 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) membarrier(0x2, 0x0) 14:39:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, 0x0, 0x0) 14:39:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, 0x0, 0x0) [ 76.111002][ T5667] __nla_validate_parse: 10 callbacks suppressed [ 76.111016][ T5667] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 14:39:57 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) membarrier(0x2, 0x0) 14:39:57 executing program 2: ioperm(0x0, 0x9, 0x8000000000000001) prctl$PR_SET_ENDIAN(0x1a, 0x1) 14:39:57 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x11}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x4b) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000240)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) 14:39:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, 0x0, 0x0) 14:39:57 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x11}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x4b) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000240)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) 14:39:57 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000080)=@ipv6_newnexthop={0x34, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWTUNNEL_IP_FLAGS={0x6}}, @NHA_OIF={0x8, 0x5, r3}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x8}]}, 0x34}}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000180)={0xb, {'syz1\x00', 'syz0\x00', 'syz1\x00'}}, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x24000000) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 14:39:57 executing program 2: ioperm(0x0, 0x9, 0x8000000000000001) prctl$PR_SET_ENDIAN(0x1a, 0x1) 14:39:57 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) membarrier(0x2, 0x0) 14:39:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f00000043c0)=[{{0x0, 0x17, 0x0}}], 0x300, 0xc00e, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000026006702"], 0x28}}, 0x0) 14:39:57 executing program 2: sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 14:39:57 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000080)=@ipv6_newnexthop={0x34, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWTUNNEL_IP_FLAGS={0x6}}, @NHA_OIF={0x8, 0x5, r3}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x8}]}, 0x34}}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000180)={0xb, {'syz1\x00', 'syz0\x00', 'syz1\x00'}}, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x24000000) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 76.251955][ T5698] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 14:39:57 executing program 2: sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 76.292831][ T5702] RDS: rds_bind could not find a transport for fe88::103, load rds_tcp or rds_rdma? [ 76.320130][ T5709] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 76.329714][ T5710] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 14:39:57 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000080)=@ipv6_newnexthop={0x34, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWTUNNEL_IP_FLAGS={0x6}}, @NHA_OIF={0x8, 0x5, r3}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x8}]}, 0x34}}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000180)={0xb, {'syz1\x00', 'syz0\x00', 'syz1\x00'}}, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x24000000) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 14:39:57 executing program 2: sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 76.347764][ T5711] RDS: rds_bind could not find a transport for fe88::103, load rds_tcp or rds_rdma? [ 76.351197][ T5700] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 76.378154][ T5715] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 14:39:57 executing program 2: sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 14:39:57 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000080)=@ipv6_newnexthop={0x34, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWTUNNEL_IP_FLAGS={0x6}}, @NHA_OIF={0x8, 0x5, r3}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x8}]}, 0x34}}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000180)={0xb, {'syz1\x00', 'syz0\x00', 'syz1\x00'}}, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x24000000) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 14:39:57 executing program 5: sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 76.392209][ T5700] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 76.401504][ T5717] RDS: rds_bind could not find a transport for fe88::103, load rds_tcp or rds_rdma? [ 76.401811][ T5700] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 76.422007][ T5700] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 76.432602][ T5700] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 14:39:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f00000043c0)=[{{0x0, 0x17, 0x0}}], 0x300, 0xc00e, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000026006702"], 0x28}}, 0x0) 14:39:57 executing program 2: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000280), 0x1, 0x1c6, &(0x7f00000002c0)="$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") 14:39:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x1f, 0xa81, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x3, 0xf, &(0x7f00000001c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x6c}}}, &(0x7f0000000000)='GPL\x00'}, 0x90) [ 76.472117][ T5721] RDS: rds_bind could not find a transport for fe88::103, load rds_tcp or rds_rdma? [ 76.496737][ T5729] loop2: detected capacity change from 0 to 128 14:39:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x1f, 0xa81, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x3, 0xf, &(0x7f00000001c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x6c}}}, &(0x7f0000000000)='GPL\x00'}, 0x90) 14:39:57 executing program 5: sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 14:39:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x1f, 0xa81, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x3, 0xf, &(0x7f00000001c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x6c}}}, &(0x7f0000000000)='GPL\x00'}, 0x90) 14:39:58 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f00000043c0)=[{{0x0, 0x17, 0x0}}], 0x300, 0xc00e, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000026006702"], 0x28}}, 0x0) [ 76.522075][ T5728] RDS: rds_bind could not find a transport for fe88::106, load rds_tcp or rds_rdma? 14:39:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x1f, 0xa81, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x3, 0xf, &(0x7f00000001c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x6c}}}, &(0x7f0000000000)='GPL\x00'}, 0x90) 14:39:58 executing program 5: sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 14:39:58 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0}, 0x90) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000580)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x1d0, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@CONNSECMARK={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev, @multicast1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000380)) [ 76.584052][ T5739] RDS: rds_bind could not find a transport for fe88::106, load rds_tcp or rds_rdma? [ 76.622886][ T27] kauditd_printk_skb: 23 callbacks suppressed [ 76.622920][ T27] audit: type=1400 audit(1705070398.043:262): avc: denied { read } for pid=5750 comm="syz-executor.2" name="ptp0" dev="devtmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 76.653412][ T27] audit: type=1400 audit(1705070398.043:263): avc: denied { open } for pid=5750 comm="syz-executor.2" path="/dev/ptp0" dev="devtmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 76.677202][ T27] audit: type=1400 audit(1705070398.043:264): avc: denied { ioctl } for pid=5750 comm="syz-executor.2" path="/dev/ptp0" dev="devtmpfs" ino=220 ioctlcmd=0x3d0c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 76.680951][ T5751] RDS: rds_bind could not find a transport for fe88::106, load rds_tcp or rds_rdma? 14:39:58 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x11}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x4b) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000240)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) 14:39:58 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0}, 0x90) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000580)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x1d0, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@CONNSECMARK={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev, @multicast1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000380)) 14:39:58 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f00000043c0)=[{{0x0, 0x17, 0x0}}], 0x300, 0xc00e, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000026006702"], 0x28}}, 0x0) 14:39:58 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0}, 0x90) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000580)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x1d0, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@CONNSECMARK={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev, @multicast1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000380)) 14:39:58 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0}, 0x90) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000580)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x1d0, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@CONNSECMARK={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev, @multicast1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000380)) 14:39:58 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0}, 0x90) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000580)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x1d0, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@CONNSECMARK={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev, @multicast1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000380)) 14:39:58 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0}, 0x90) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000580)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x1d0, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@CONNSECMARK={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev, @multicast1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000380)) 14:39:58 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x11}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x4b) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000240)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) 14:39:58 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0}, 0x90) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000580)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x1d0, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@CONNSECMARK={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev, @multicast1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000380)) 14:39:58 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x11}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x4b) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000240)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) 14:39:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x6c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x20}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x6c}}, 0x0) 14:39:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 14:39:58 executing program 2: r0 = socket(0x2a, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) 14:39:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x6c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x20}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x6c}}, 0x0) 14:39:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 77.094289][ T27] audit: type=1400 audit(1705070398.513:265): avc: denied { create } for pid=5781 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 14:39:58 executing program 2: r0 = socket(0x2a, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) 14:39:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 14:39:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x6c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x20}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x6c}}, 0x0) 14:39:58 executing program 2: r0 = socket(0x2a, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) [ 77.123642][ T27] audit: type=1400 audit(1705070398.533:266): avc: denied { ioctl } for pid=5781 comm="syz-executor.2" path="socket:[12651]" dev="sockfs" ino=12651 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 14:39:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 14:39:58 executing program 2: r0 = socket(0x2a, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) 14:39:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x6c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x20}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x6c}}, 0x0) 14:39:58 executing program 4: keyctl$clear(0xf, 0xfffffffffffffffb) 14:39:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)=@ipv4_getnexthop={0x2c, 0x6a, 0x1569cf6ffd566e61, 0x0, 0x0, {}, [@NHA_OIF={0x8}, @NHA_MASTER={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}}, 0x0) 14:39:58 executing program 5: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:39:58 executing program 4: keyctl$clear(0xf, 0xfffffffffffffffb) 14:39:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)=@ipv4_getnexthop={0x2c, 0x6a, 0x1569cf6ffd566e61, 0x0, 0x0, {}, [@NHA_OIF={0x8}, @NHA_MASTER={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}}, 0x0) 14:39:58 executing program 4: keyctl$clear(0xf, 0xfffffffffffffffb) 14:39:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)=@ipv4_getnexthop={0x2c, 0x6a, 0x1569cf6ffd566e61, 0x0, 0x0, {}, [@NHA_OIF={0x8}, @NHA_MASTER={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}}, 0x0) [ 77.236355][ T27] audit: type=1400 audit(1705070398.653:267): avc: denied { setattr } for pid=5805 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 14:39:58 executing program 4: keyctl$clear(0xf, 0xfffffffffffffffb) 14:39:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)=@ipv4_getnexthop={0x2c, 0x6a, 0x1569cf6ffd566e61, 0x0, 0x0, {}, [@NHA_OIF={0x8}, @NHA_MASTER={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}}, 0x0) 14:39:58 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000180)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='b 7:*\t\nz'], 0xa) 14:39:59 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x11}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x4b) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000240)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) 14:39:59 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000180)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='b 7:*\t\nz'], 0xa) 14:39:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto, @typedef={0x2, 0x0, 0x0, 0x4}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x5f, 0x0, 0x61]}}, 0x0, 0x52}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 14:39:59 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000180)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='b 7:*\t\nz'], 0xa) 14:39:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto, @typedef={0x2, 0x0, 0x0, 0x4}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x5f, 0x0, 0x61]}}, 0x0, 0x52}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 14:39:59 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000180)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='b 7:*\t\nz'], 0xa) 14:39:59 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, 0x0, 0x4e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xfffd, 0xc0, 0x7, 0xf1}]}) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r6 = getpid() r7 = open(&(0x7f0000000640)='./file2\x00', 0x0, 0x40) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000380)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYRES8=r6], 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) write$cgroup_pid(r7, &(0x7f00000000c0)=r8, 0x12) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sendfile(r3, r5, 0x0, 0x5) tee(r0, r2, 0x3, 0x0) vmsplice(r0, &(0x7f0000000680)=[{&(0x7f0000000000)='*', 0x1}], 0x1, 0x2) 14:39:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto, @typedef={0x2, 0x0, 0x0, 0x4}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x5f, 0x0, 0x61]}}, 0x0, 0x52}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 14:39:59 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, 0x0, 0x4e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xfffd, 0xc0, 0x7, 0xf1}]}) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r6 = getpid() r7 = open(&(0x7f0000000640)='./file2\x00', 0x0, 0x40) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000380)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYRES8=r6], 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) write$cgroup_pid(r7, &(0x7f00000000c0)=r8, 0x12) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sendfile(r3, r5, 0x0, 0x5) tee(r0, r2, 0x3, 0x0) vmsplice(r0, &(0x7f0000000680)=[{&(0x7f0000000000)='*', 0x1}], 0x1, 0x2) 14:39:59 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x11}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x4b) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000240)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) 14:39:59 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x11}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x4b) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000240)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) 14:39:59 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, 0x0, 0x4e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xfffd, 0xc0, 0x7, 0xf1}]}) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r6 = getpid() r7 = open(&(0x7f0000000640)='./file2\x00', 0x0, 0x40) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000380)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYRES8=r6], 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) write$cgroup_pid(r7, &(0x7f00000000c0)=r8, 0x12) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sendfile(r3, r5, 0x0, 0x5) tee(r0, r2, 0x3, 0x0) vmsplice(r0, &(0x7f0000000680)=[{&(0x7f0000000000)='*', 0x1}], 0x1, 0x2) 14:39:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto, @typedef={0x2, 0x0, 0x0, 0x4}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x5f, 0x0, 0x61]}}, 0x0, 0x52}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 14:39:59 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, 0x0, 0x4e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xfffd, 0xc0, 0x7, 0xf1}]}) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r6 = getpid() r7 = open(&(0x7f0000000640)='./file2\x00', 0x0, 0x40) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000380)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYRES8=r6], 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) write$cgroup_pid(r7, &(0x7f00000000c0)=r8, 0x12) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sendfile(r3, r5, 0x0, 0x5) tee(r0, r2, 0x3, 0x0) vmsplice(r0, &(0x7f0000000680)=[{&(0x7f0000000000)='*', 0x1}], 0x1, 0x2) 14:39:59 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, 0x0, 0x4e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xfffd, 0xc0, 0x7, 0xf1}]}) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r6 = getpid() r7 = open(&(0x7f0000000640)='./file2\x00', 0x0, 0x40) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000380)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYRES8=r6], 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) write$cgroup_pid(r7, &(0x7f00000000c0)=r8, 0x12) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sendfile(r3, r5, 0x0, 0x5) tee(r0, r2, 0x3, 0x0) vmsplice(r0, &(0x7f0000000680)=[{&(0x7f0000000000)='*', 0x1}], 0x1, 0x2) 14:39:59 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 14:39:59 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, 0x0, 0x4e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xfffd, 0xc0, 0x7, 0xf1}]}) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r6 = getpid() r7 = open(&(0x7f0000000640)='./file2\x00', 0x0, 0x40) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000380)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYRES8=r6], 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) write$cgroup_pid(r7, &(0x7f00000000c0)=r8, 0x12) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sendfile(r3, r5, 0x0, 0x5) tee(r0, r2, 0x3, 0x0) vmsplice(r0, &(0x7f0000000680)=[{&(0x7f0000000000)='*', 0x1}], 0x1, 0x2) 14:39:59 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 14:39:59 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 14:39:59 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, 0x0, 0x4e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xfffd, 0xc0, 0x7, 0xf1}]}) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r6 = getpid() r7 = open(&(0x7f0000000640)='./file2\x00', 0x0, 0x40) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000380)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYRES8=r6], 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) write$cgroup_pid(r7, &(0x7f00000000c0)=r8, 0x12) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sendfile(r3, r5, 0x0, 0x5) tee(r0, r2, 0x3, 0x0) vmsplice(r0, &(0x7f0000000680)=[{&(0x7f0000000000)='*', 0x1}], 0x1, 0x2) [ 78.019605][ T27] audit: type=1400 audit(1705070399.443:268): avc: denied { setopt } for pid=5859 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 14:39:59 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="05000000d77a303352c9a24cfb0fe8f3", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="37eb290aca"], 0x20000600}}, 0x0) 14:39:59 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 14:39:59 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="05000000d77a303352c9a24cfb0fe8f3", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="37eb290aca"], 0x20000600}}, 0x0) 14:39:59 executing program 5: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:39:59 executing program 2: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:39:59 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="05000000d77a303352c9a24cfb0fe8f3", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="37eb290aca"], 0x20000600}}, 0x0) 14:39:59 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="05000000d77a303352c9a24cfb0fe8f3", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="37eb290aca"], 0x20000600}}, 0x0) 14:39:59 executing program 4: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:40:00 executing program 0: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:40:00 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f0000000440)='\r\x00elinu\xef\xe3elinux\x00\x96\xf6\x03\n#*\xac\x05\xce\xf8D\\\x9a\xe6[]L+\xf6\v\xe8\xf2\xd3\b\x15\n\xb8F!Q9o\x1f#\xbdt\r\xfb\"\x18%\xfdM\xaf_t\xd2\xdcJ\x10\a1\xf0\xe4\xe3R\x95\xee\xe4\xbab\x1a\xdf\xb1\xbdU\xd7Lo\xe7\xac\x81\x10k\xce-\xf5@\xbb\x9d;\xe8\xf6\xffQ\x04\xaai\x92k\x1b;\xddM\xa2\xe1-\x0e\xd8\xde\x00\xff\x18\xdd\bL\xfb\xa2.\xb6{\xb5\x85#\x88\xdc\xf0\xfd\x04\xf1\xc4 \xdeV\x80q\xf7\x04\xf5\x85T\x1f\xc2S]*\xc9lw\xd3J\xc5\xe8\x02\xcb\xbbAHxr\xac\xb77F\xdf\x1c\xcb\xd4\xce\x88L\xf1\xf9[\x98\xd4+pTx\x95\xb5\x1b]x\x1a\x95\xe1\x856\xe7`83\xb7n#\xe0\xc1_\xec\xba\xdezthU\xe3\a\x8b\xc5\x86woo\xbcnq-\x90/\xed\xff\xad+\x03\x10\t\xda\xfd\xa2\xd0\xef4\n%\xf1\xd8u\xedt\xc1-\x16\x86\x85\xb4\x96\x02\x1bI<\x1e\xbd\x1c\xd0\x19\x96h\xc3\x14\xfb\xf7\x10\xee\x91\x9e\x01G\xbf', 0x6e93ebbbcc0884f2, 0x0, 0x0) r1 = epoll_create1(0x0) mq_timedsend(r0, 0x0, 0x0, 0x4e, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) mq_notify(r0, &(0x7f0000000000)) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 14:40:00 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x541b, 0x0) 14:40:00 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f0000000440)='\r\x00elinu\xef\xe3elinux\x00\x96\xf6\x03\n#*\xac\x05\xce\xf8D\\\x9a\xe6[]L+\xf6\v\xe8\xf2\xd3\b\x15\n\xb8F!Q9o\x1f#\xbdt\r\xfb\"\x18%\xfdM\xaf_t\xd2\xdcJ\x10\a1\xf0\xe4\xe3R\x95\xee\xe4\xbab\x1a\xdf\xb1\xbdU\xd7Lo\xe7\xac\x81\x10k\xce-\xf5@\xbb\x9d;\xe8\xf6\xffQ\x04\xaai\x92k\x1b;\xddM\xa2\xe1-\x0e\xd8\xde\x00\xff\x18\xdd\bL\xfb\xa2.\xb6{\xb5\x85#\x88\xdc\xf0\xfd\x04\xf1\xc4 \xdeV\x80q\xf7\x04\xf5\x85T\x1f\xc2S]*\xc9lw\xd3J\xc5\xe8\x02\xcb\xbbAHxr\xac\xb77F\xdf\x1c\xcb\xd4\xce\x88L\xf1\xf9[\x98\xd4+pTx\x95\xb5\x1b]x\x1a\x95\xe1\x856\xe7`83\xb7n#\xe0\xc1_\xec\xba\xdezthU\xe3\a\x8b\xc5\x86woo\xbcnq-\x90/\xed\xff\xad+\x03\x10\t\xda\xfd\xa2\xd0\xef4\n%\xf1\xd8u\xedt\xc1-\x16\x86\x85\xb4\x96\x02\x1bI<\x1e\xbd\x1c\xd0\x19\x96h\xc3\x14\xfb\xf7\x10\xee\x91\x9e\x01G\xbf', 0x6e93ebbbcc0884f2, 0x0, 0x0) r1 = epoll_create1(0x0) mq_timedsend(r0, 0x0, 0x0, 0x4e, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) mq_notify(r0, &(0x7f0000000000)) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 14:40:00 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f0000000440)='\r\x00elinu\xef\xe3elinux\x00\x96\xf6\x03\n#*\xac\x05\xce\xf8D\\\x9a\xe6[]L+\xf6\v\xe8\xf2\xd3\b\x15\n\xb8F!Q9o\x1f#\xbdt\r\xfb\"\x18%\xfdM\xaf_t\xd2\xdcJ\x10\a1\xf0\xe4\xe3R\x95\xee\xe4\xbab\x1a\xdf\xb1\xbdU\xd7Lo\xe7\xac\x81\x10k\xce-\xf5@\xbb\x9d;\xe8\xf6\xffQ\x04\xaai\x92k\x1b;\xddM\xa2\xe1-\x0e\xd8\xde\x00\xff\x18\xdd\bL\xfb\xa2.\xb6{\xb5\x85#\x88\xdc\xf0\xfd\x04\xf1\xc4 \xdeV\x80q\xf7\x04\xf5\x85T\x1f\xc2S]*\xc9lw\xd3J\xc5\xe8\x02\xcb\xbbAHxr\xac\xb77F\xdf\x1c\xcb\xd4\xce\x88L\xf1\xf9[\x98\xd4+pTx\x95\xb5\x1b]x\x1a\x95\xe1\x856\xe7`83\xb7n#\xe0\xc1_\xec\xba\xdezthU\xe3\a\x8b\xc5\x86woo\xbcnq-\x90/\xed\xff\xad+\x03\x10\t\xda\xfd\xa2\xd0\xef4\n%\xf1\xd8u\xedt\xc1-\x16\x86\x85\xb4\x96\x02\x1bI<\x1e\xbd\x1c\xd0\x19\x96h\xc3\x14\xfb\xf7\x10\xee\x91\x9e\x01G\xbf', 0x6e93ebbbcc0884f2, 0x0, 0x0) r1 = epoll_create1(0x0) mq_timedsend(r0, 0x0, 0x0, 0x4e, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) mq_notify(r0, &(0x7f0000000000)) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 14:40:00 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x541b, 0x0) 14:40:00 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x541b, 0x0) 14:40:00 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f0000000440)='\r\x00elinu\xef\xe3elinux\x00\x96\xf6\x03\n#*\xac\x05\xce\xf8D\\\x9a\xe6[]L+\xf6\v\xe8\xf2\xd3\b\x15\n\xb8F!Q9o\x1f#\xbdt\r\xfb\"\x18%\xfdM\xaf_t\xd2\xdcJ\x10\a1\xf0\xe4\xe3R\x95\xee\xe4\xbab\x1a\xdf\xb1\xbdU\xd7Lo\xe7\xac\x81\x10k\xce-\xf5@\xbb\x9d;\xe8\xf6\xffQ\x04\xaai\x92k\x1b;\xddM\xa2\xe1-\x0e\xd8\xde\x00\xff\x18\xdd\bL\xfb\xa2.\xb6{\xb5\x85#\x88\xdc\xf0\xfd\x04\xf1\xc4 \xdeV\x80q\xf7\x04\xf5\x85T\x1f\xc2S]*\xc9lw\xd3J\xc5\xe8\x02\xcb\xbbAHxr\xac\xb77F\xdf\x1c\xcb\xd4\xce\x88L\xf1\xf9[\x98\xd4+pTx\x95\xb5\x1b]x\x1a\x95\xe1\x856\xe7`83\xb7n#\xe0\xc1_\xec\xba\xdezthU\xe3\a\x8b\xc5\x86woo\xbcnq-\x90/\xed\xff\xad+\x03\x10\t\xda\xfd\xa2\xd0\xef4\n%\xf1\xd8u\xedt\xc1-\x16\x86\x85\xb4\x96\x02\x1bI<\x1e\xbd\x1c\xd0\x19\x96h\xc3\x14\xfb\xf7\x10\xee\x91\x9e\x01G\xbf', 0x6e93ebbbcc0884f2, 0x0, 0x0) r1 = epoll_create1(0x0) mq_timedsend(r0, 0x0, 0x0, 0x4e, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) mq_notify(r0, &(0x7f0000000000)) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 14:40:00 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x541b, 0x0) [ 78.840299][ T27] audit: type=1400 audit(1705070400.263:269): avc: denied { read } for pid=5904 comm="syz-executor.3" name="ppp" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 78.863750][ T27] audit: type=1400 audit(1705070400.263:270): avc: denied { open } for pid=5904 comm="syz-executor.3" path="/dev/ppp" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 14:40:00 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f0000000440)='\r\x00elinu\xef\xe3elinux\x00\x96\xf6\x03\n#*\xac\x05\xce\xf8D\\\x9a\xe6[]L+\xf6\v\xe8\xf2\xd3\b\x15\n\xb8F!Q9o\x1f#\xbdt\r\xfb\"\x18%\xfdM\xaf_t\xd2\xdcJ\x10\a1\xf0\xe4\xe3R\x95\xee\xe4\xbab\x1a\xdf\xb1\xbdU\xd7Lo\xe7\xac\x81\x10k\xce-\xf5@\xbb\x9d;\xe8\xf6\xffQ\x04\xaai\x92k\x1b;\xddM\xa2\xe1-\x0e\xd8\xde\x00\xff\x18\xdd\bL\xfb\xa2.\xb6{\xb5\x85#\x88\xdc\xf0\xfd\x04\xf1\xc4 \xdeV\x80q\xf7\x04\xf5\x85T\x1f\xc2S]*\xc9lw\xd3J\xc5\xe8\x02\xcb\xbbAHxr\xac\xb77F\xdf\x1c\xcb\xd4\xce\x88L\xf1\xf9[\x98\xd4+pTx\x95\xb5\x1b]x\x1a\x95\xe1\x856\xe7`83\xb7n#\xe0\xc1_\xec\xba\xdezthU\xe3\a\x8b\xc5\x86woo\xbcnq-\x90/\xed\xff\xad+\x03\x10\t\xda\xfd\xa2\xd0\xef4\n%\xf1\xd8u\xedt\xc1-\x16\x86\x85\xb4\x96\x02\x1bI<\x1e\xbd\x1c\xd0\x19\x96h\xc3\x14\xfb\xf7\x10\xee\x91\x9e\x01G\xbf', 0x6e93ebbbcc0884f2, 0x0, 0x0) r1 = epoll_create1(0x0) mq_timedsend(r0, 0x0, 0x0, 0x4e, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) mq_notify(r0, &(0x7f0000000000)) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 14:40:00 executing program 3: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000480)=""/216, 0x56}], 0x1, 0x300, 0x0) 14:40:00 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f0000000440)='\r\x00elinu\xef\xe3elinux\x00\x96\xf6\x03\n#*\xac\x05\xce\xf8D\\\x9a\xe6[]L+\xf6\v\xe8\xf2\xd3\b\x15\n\xb8F!Q9o\x1f#\xbdt\r\xfb\"\x18%\xfdM\xaf_t\xd2\xdcJ\x10\a1\xf0\xe4\xe3R\x95\xee\xe4\xbab\x1a\xdf\xb1\xbdU\xd7Lo\xe7\xac\x81\x10k\xce-\xf5@\xbb\x9d;\xe8\xf6\xffQ\x04\xaai\x92k\x1b;\xddM\xa2\xe1-\x0e\xd8\xde\x00\xff\x18\xdd\bL\xfb\xa2.\xb6{\xb5\x85#\x88\xdc\xf0\xfd\x04\xf1\xc4 \xdeV\x80q\xf7\x04\xf5\x85T\x1f\xc2S]*\xc9lw\xd3J\xc5\xe8\x02\xcb\xbbAHxr\xac\xb77F\xdf\x1c\xcb\xd4\xce\x88L\xf1\xf9[\x98\xd4+pTx\x95\xb5\x1b]x\x1a\x95\xe1\x856\xe7`83\xb7n#\xe0\xc1_\xec\xba\xdezthU\xe3\a\x8b\xc5\x86woo\xbcnq-\x90/\xed\xff\xad+\x03\x10\t\xda\xfd\xa2\xd0\xef4\n%\xf1\xd8u\xedt\xc1-\x16\x86\x85\xb4\x96\x02\x1bI<\x1e\xbd\x1c\xd0\x19\x96h\xc3\x14\xfb\xf7\x10\xee\x91\x9e\x01G\xbf', 0x6e93ebbbcc0884f2, 0x0, 0x0) r1 = epoll_create1(0x0) mq_timedsend(r0, 0x0, 0x0, 0x4e, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) mq_notify(r0, &(0x7f0000000000)) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 14:40:00 executing program 5: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:40:00 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f0000000440)='\r\x00elinu\xef\xe3elinux\x00\x96\xf6\x03\n#*\xac\x05\xce\xf8D\\\x9a\xe6[]L+\xf6\v\xe8\xf2\xd3\b\x15\n\xb8F!Q9o\x1f#\xbdt\r\xfb\"\x18%\xfdM\xaf_t\xd2\xdcJ\x10\a1\xf0\xe4\xe3R\x95\xee\xe4\xbab\x1a\xdf\xb1\xbdU\xd7Lo\xe7\xac\x81\x10k\xce-\xf5@\xbb\x9d;\xe8\xf6\xffQ\x04\xaai\x92k\x1b;\xddM\xa2\xe1-\x0e\xd8\xde\x00\xff\x18\xdd\bL\xfb\xa2.\xb6{\xb5\x85#\x88\xdc\xf0\xfd\x04\xf1\xc4 \xdeV\x80q\xf7\x04\xf5\x85T\x1f\xc2S]*\xc9lw\xd3J\xc5\xe8\x02\xcb\xbbAHxr\xac\xb77F\xdf\x1c\xcb\xd4\xce\x88L\xf1\xf9[\x98\xd4+pTx\x95\xb5\x1b]x\x1a\x95\xe1\x856\xe7`83\xb7n#\xe0\xc1_\xec\xba\xdezthU\xe3\a\x8b\xc5\x86woo\xbcnq-\x90/\xed\xff\xad+\x03\x10\t\xda\xfd\xa2\xd0\xef4\n%\xf1\xd8u\xedt\xc1-\x16\x86\x85\xb4\x96\x02\x1bI<\x1e\xbd\x1c\xd0\x19\x96h\xc3\x14\xfb\xf7\x10\xee\x91\x9e\x01G\xbf', 0x6e93ebbbcc0884f2, 0x0, 0x0) r1 = epoll_create1(0x0) mq_timedsend(r0, 0x0, 0x0, 0x4e, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) mq_notify(r0, &(0x7f0000000000)) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 14:40:00 executing program 2: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:40:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8}]}}}]}, 0x44}}, 0x0) 14:40:00 executing program 4: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:40:00 executing program 3: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000480)=""/216, 0x56}], 0x1, 0x300, 0x0) 14:40:00 executing program 3: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000480)=""/216, 0x56}], 0x1, 0x300, 0x0) [ 78.995550][ T27] audit: type=1400 audit(1705070400.413:271): avc: denied { write } for pid=5921 comm="syz-executor.3" name="mcfilter6" dev="proc" ino=4026532990 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 14:40:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8}]}}}]}, 0x44}}, 0x0) 14:40:00 executing program 3: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000340)=[{&(0x7f0000000480)=""/216, 0x56}], 0x1, 0x300, 0x0) 14:40:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8}]}}}]}, 0x44}}, 0x0) 14:40:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8}]}}}]}, 0x44}}, 0x0) 14:40:00 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5453, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000023896) 14:40:00 executing program 1: unshare(0x2000400) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x200480) flistxattr(r0, 0x0, 0x0) 14:40:00 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5453, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000023896) 14:40:00 executing program 1: unshare(0x2000400) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x200480) flistxattr(r0, 0x0, 0x0) 14:40:00 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5453, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000023896) 14:40:00 executing program 1: unshare(0x2000400) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x200480) flistxattr(r0, 0x0, 0x0) 14:40:00 executing program 1: unshare(0x2000400) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x200480) flistxattr(r0, 0x0, 0x0) 14:40:00 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5453, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000023896) 14:40:00 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5453, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000023896) 14:40:00 executing program 0: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:40:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x270, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}]}, 0x70}}, 0x0) 14:40:00 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5453, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000023896) 14:40:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x270, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}]}, 0x70}}, 0x0) 14:40:00 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5453, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000023896) 14:40:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x270, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}]}, 0x70}}, 0x0) 14:40:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x270, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x400000000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}]}, 0x70}}, 0x0) 14:40:00 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x15, 0x1, &(0x7f0000000000)=@raw=[@ldst], 0x0}, 0x90) 14:40:00 executing program 3: pipe(&(0x7f0000000080)) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) pipe(&(0x7f0000000640)) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d01000000000001fd5c5c00000008000300", @ANYRES32], 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff8305000000f9ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 14:40:00 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x15, 0x1, &(0x7f0000000000)=@raw=[@ldst], 0x0}, 0x90) 14:40:01 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x15, 0x1, &(0x7f0000000000)=@raw=[@ldst], 0x0}, 0x90) 14:40:01 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x15, 0x1, &(0x7f0000000000)=@raw=[@ldst], 0x0}, 0x90) 14:40:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffeca50000006d000000850000000e00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 14:40:01 executing program 5: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:40:01 executing program 2: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:40:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffeca50000006d000000850000000e00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 14:40:01 executing program 4: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:40:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffeca50000006d000000850000000e00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 14:40:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffeca50000006d000000850000000e00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 14:40:01 executing program 1: ioperm(0x0, 0x9, 0x814a) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) 14:40:01 executing program 1: ioperm(0x0, 0x9, 0x814a) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) [ 79.960386][ T6026] capability: warning: `syz-executor.1' uses 32-bit capabilities (legacy support in use) [ 79.983652][ T6022] ================================================================== [ 79.991939][ T6022] BUG: KCSAN: data-race in blk_mq_sched_dispatch_requests / blk_mq_sched_dispatch_requests [ 80.001933][ T6022] [ 80.004252][ T6022] read-write to 0xffff8881001a9350 of 8 bytes by task 6024 on cpu 1: [ 80.012308][ T6022] blk_mq_sched_dispatch_requests+0x84/0x100 [ 80.018290][ T6022] blk_mq_run_hw_queue+0x298/0x4c0 [ 80.023409][ T6022] blk_mq_flush_plug_list+0x7a7/0xdb0 [ 80.028781][ T6022] __blk_flush_plug+0x210/0x260 [ 80.033635][ T6022] blk_finish_plug+0x47/0x60 [ 80.038239][ T6022] ext4_do_writepages+0x1bc7/0x2100 [ 80.043426][ T6022] ext4_writepages+0x15e/0x2e0 [ 80.048179][ T6022] do_writepages+0x1c2/0x340 [ 80.052770][ T6022] filemap_fdatawrite_wbc+0xdb/0xf0 [ 80.057965][ T6022] filemap_write_and_wait_range+0xe0/0x210 [ 80.063775][ T6022] kiocb_write_and_wait+0x79/0x110 [ 80.068883][ T6022] __iomap_dio_rw+0x4fe/0x1090 [ 80.073659][ T6022] iomap_dio_rw+0x40/0x90 [ 80.077987][ T6022] ext4_file_read_iter+0x21c/0x2a0 [ 80.083130][ T6022] copy_splice_read+0x26b/0x4b0 [ 80.087977][ T6022] splice_direct_to_actor+0x288/0x650 [ 80.093415][ T6022] do_splice_direct+0xd7/0x150 [ 80.098266][ T6022] do_sendfile+0x377/0x880 [ 80.102670][ T6022] __x64_sys_sendfile64+0x110/0x150 [ 80.107886][ T6022] do_syscall_64+0x59/0x120 [ 80.112389][ T6022] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 80.118293][ T6022] [ 80.120603][ T6022] read-write to 0xffff8881001a9350 of 8 bytes by task 6022 on cpu 0: [ 80.128668][ T6022] blk_mq_sched_dispatch_requests+0x84/0x100 [ 80.134677][ T6022] blk_mq_run_hw_queue+0x298/0x4c0 [ 80.139789][ T6022] blk_mq_flush_plug_list+0x7a7/0xdb0 [ 80.145150][ T6022] __blk_flush_plug+0x210/0x260 [ 80.149991][ T6022] blk_finish_plug+0x47/0x60 [ 80.154563][ T6022] ext4_do_writepages+0x1bc7/0x2100 [ 80.159751][ T6022] ext4_writepages+0x15e/0x2e0 [ 80.164504][ T6022] do_writepages+0x1c2/0x340 [ 80.169081][ T6022] filemap_fdatawrite_wbc+0xdb/0xf0 [ 80.174265][ T6022] filemap_write_and_wait_range+0xe0/0x210 [ 80.180067][ T6022] kiocb_write_and_wait+0x79/0x110 [ 80.185211][ T6022] __iomap_dio_rw+0x4fe/0x1090 [ 80.189981][ T6022] iomap_dio_rw+0x40/0x90 [ 80.194294][ T6022] ext4_file_read_iter+0x21c/0x2a0 [ 80.199393][ T6022] copy_splice_read+0x26b/0x4b0 [ 80.204245][ T6022] splice_direct_to_actor+0x288/0x650 [ 80.209633][ T6022] do_splice_direct+0xd7/0x150 [ 80.214380][ T6022] do_sendfile+0x377/0x880 [ 80.218773][ T6022] __x64_sys_sendfile64+0x110/0x150 [ 80.223973][ T6022] do_syscall_64+0x59/0x120 [ 80.228471][ T6022] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 80.234361][ T6022] [ 80.236667][ T6022] value changed: 0x0000000000000e45 -> 0x0000000000000e46 [ 80.243757][ T6022] [ 80.246059][ T6022] Reported by Kernel Concurrency Sanitizer on: 14:40:01 executing program 1: ioperm(0x0, 0x9, 0x814a) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) 14:40:01 executing program 1: ioperm(0x0, 0x9, 0x814a) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) [ 80.252181][ T6022] CPU: 0 PID: 6022 Comm: syz-executor.2 Not tainted 6.7.0-syzkaller-06264-g70d201a40823 #0 [ 80.262147][ T6022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 80.272205][ T6022] ================================================================== 14:40:01 executing program 1: ioperm(0x0, 0x9, 0x814a) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) 14:40:01 executing program 1: ioperm(0x0, 0x9, 0x814a) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) 14:40:01 executing program 0: socket(0x200000100000011, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x27) ftruncate(r0, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000200)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = getpid() sched_setscheduler(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x409c804, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffe, @empty, 0x8000000}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r4, &(0x7f0000000200)=ANY=[], 0x87) sendfile(r4, r0, 0x0, 0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x8, 0x0) sched_setaffinity(r5, 0x8, &(0x7f00000001c0)=0xfffffffeffffffff) lseek(r0, 0x200, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x24000, 0x147) getpid() sched_setscheduler(0x0, 0x6, &(0x7f0000001700)=0x8) sendfile(r0, r6, 0x0, 0x1dd00) socket$nl_generic(0x10, 0x3, 0x10) 14:40:01 executing program 1: ioperm(0x0, 0x9, 0x814a) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) 14:40:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @dev={0xac, 0xd}}}}, 0x90) 14:40:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @dev={0xac, 0xd}}}}, 0x90) 14:40:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @dev={0xac, 0xd}}}}, 0x90) 14:40:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r1}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @dev={0xac, 0xd}}}}, 0x90) 14:40:01 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r0, 0x6, 0x3, 0xfffffffffffffffc, &(0x7f00000000c0)) 14:40:01 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r0, 0x6, 0x3, 0xfffffffffffffffc, &(0x7f00000000c0)) 14:40:01 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r0, 0x6, 0x3, 0xfffffffffffffffc, &(0x7f00000000c0)) 14:40:01 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_int(r0, 0x6, 0x3, 0xfffffffffffffffc, &(0x7f00000000c0)) 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003840)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@fwd={0x5, 0x0, 0x0, 0x13, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x30, 0x25]}}, &(0x7f0000000000)=""/215, 0x2d, 0xd7, 0x1}, 0x20) 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003840)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@fwd={0x5, 0x0, 0x0, 0x13, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x30, 0x25]}}, &(0x7f0000000000)=""/215, 0x2d, 0xd7, 0x1}, 0x20) 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003840)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@fwd={0x5, 0x0, 0x0, 0x13, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x30, 0x25]}}, &(0x7f0000000000)=""/215, 0x2d, 0xd7, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003840)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@fwd={0x5, 0x0, 0x0, 0x13, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x30, 0x25]}}, &(0x7f0000000000)=""/215, 0x2d, 0xd7, 0x1}, 0x20) 14:40:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWRULE={0x60, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x34, 0x4, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x20, 0x2, 0x0, 0x1, [@NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_BITWISE_MASK={0x4}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x88}}, 0x0) 14:40:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWRULE={0x60, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x34, 0x4, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x20, 0x2, 0x0, 0x1, [@NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_BITWISE_MASK={0x4}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x88}}, 0x0) 14:40:02 executing program 3: pipe(&(0x7f0000000080)) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) pipe(&(0x7f0000000640)) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d01000000000001fd5c5c00000008000300", @ANYRES32], 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff8305000000f9ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 14:40:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWRULE={0x60, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x34, 0x4, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x20, 0x2, 0x0, 0x1, [@NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_BITWISE_MASK={0x4}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x88}}, 0x0) 14:40:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWRULE={0x60, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x34, 0x4, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x20, 0x2, 0x0, 0x1, [@NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_BITWISE_MASK={0x4}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x88}}, 0x0) 14:40:02 executing program 2: pipe(&(0x7f0000000080)) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) pipe(&(0x7f0000000640)) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d01000000000001fd5c5c00000008000300", @ANYRES32], 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff8305000000f9ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 14:40:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r0, 0x0, 0xa, &(0x7f0000001000)="99", 0x1) 14:40:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r0, 0x0, 0xa, &(0x7f0000001000)="99", 0x1) [ 80.679911][ T6022] syz-executor.2 (6022) used greatest stack depth: 9896 bytes left 14:40:02 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00005a7000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000e3f000/0x3000)=nil) munlock(&(0x7f0000e4a000/0x1000)=nil, 0x1000) mremap(&(0x7f000054b000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000b12000/0x1000)=nil) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000e3f000/0xe000)=nil, 0xe000) 14:40:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f00000004c0)={r0, &(0x7f0000000440), 0x0}, 0x20) 14:40:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r0, 0x0, 0xa, &(0x7f0000001000)="99", 0x1) 14:40:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f00000004c0)={r0, &(0x7f0000000440), 0x0}, 0x20) 14:40:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r0, 0x0, 0xa, &(0x7f0000001000)="99", 0x1) 14:40:02 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00005a7000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000e3f000/0x3000)=nil) munlock(&(0x7f0000e4a000/0x1000)=nil, 0x1000) mremap(&(0x7f000054b000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000b12000/0x1000)=nil) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000e3f000/0xe000)=nil, 0xe000) 14:40:02 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00005a7000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000e3f000/0x3000)=nil) munlock(&(0x7f0000e4a000/0x1000)=nil, 0x1000) mremap(&(0x7f000054b000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000b12000/0x1000)=nil) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000e3f000/0xe000)=nil, 0xe000) 14:40:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f00000004c0)={r0, &(0x7f0000000440), 0x0}, 0x20) 14:40:02 executing program 5: r0 = socket$inet6(0xa, 0x805, 0x0) getsockopt$bt_hci(r0, 0x84, 0x80, &(0x7f0000000080)=""/4096, &(0x7f0000000040)=0x1000) 14:40:02 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00005a7000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000e3f000/0x3000)=nil) munlock(&(0x7f0000e4a000/0x1000)=nil, 0x1000) mremap(&(0x7f000054b000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000b12000/0x1000)=nil) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000e3f000/0xe000)=nil, 0xe000) 14:40:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x58, 0x2, 0x6, 0x101, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xff}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x58}}, 0x0) 14:40:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f00000004c0)={r0, &(0x7f0000000440), 0x0}, 0x20) 14:40:02 executing program 5: r0 = socket$inet6(0xa, 0x805, 0x0) getsockopt$bt_hci(r0, 0x84, 0x80, &(0x7f0000000080)=""/4096, &(0x7f0000000040)=0x1000) 14:40:02 executing program 3: pipe(&(0x7f0000000080)) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) pipe(&(0x7f0000000640)) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d01000000000001fd5c5c00000008000300", @ANYRES32], 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff8305000000f9ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 14:40:02 executing program 0: syz_emit_ethernet(0x8a, &(0x7f0000000140)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x54, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @fastopen={0x22, 0x5, "241ea7"}, @timestamp={0x8, 0xa}, @sack={0x5, 0xe, [0x0, 0x0, 0x0]}, @sack_perm={0x4, 0x2}, @mptcp=@synack={0x1e, 0x10}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:40:02 executing program 2: pipe(&(0x7f0000000080)) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) pipe(&(0x7f0000000640)) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d01000000000001fd5c5c00000008000300", @ANYRES32], 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff8305000000f9ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 14:40:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x58, 0x2, 0x6, 0x101, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xff}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x58}}, 0x0) 14:40:02 executing program 5: r0 = socket$inet6(0xa, 0x805, 0x0) getsockopt$bt_hci(r0, 0x84, 0x80, &(0x7f0000000080)=""/4096, &(0x7f0000000040)=0x1000) 14:40:02 executing program 0: syz_emit_ethernet(0x8a, &(0x7f0000000140)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x54, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @fastopen={0x22, 0x5, "241ea7"}, @timestamp={0x8, 0xa}, @sack={0x5, 0xe, [0x0, 0x0, 0x0]}, @sack_perm={0x4, 0x2}, @mptcp=@synack={0x1e, 0x10}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:40:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x2000070, 0x0) r4 = dup3(r3, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000380)="11", 0x1}], 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 14:40:02 executing program 5: r0 = socket$inet6(0xa, 0x805, 0x0) getsockopt$bt_hci(r0, 0x84, 0x80, &(0x7f0000000080)=""/4096, &(0x7f0000000040)=0x1000) 14:40:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x58, 0x2, 0x6, 0x101, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xff}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x58}}, 0x0) 14:40:02 executing program 0: syz_emit_ethernet(0x8a, &(0x7f0000000140)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x54, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @fastopen={0x22, 0x5, "241ea7"}, @timestamp={0x8, 0xa}, @sack={0x5, 0xe, [0x0, 0x0, 0x0]}, @sack_perm={0x4, 0x2}, @mptcp=@synack={0x1e, 0x10}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:40:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001400)=@ipv6_newrule={0x2c, 0x20, 0x313, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_FWMASK={0x8}, @FIB_RULE_POLICY=@FRA_FWMARK={0x8, 0xa, 0x7}]}, 0x2c}}, 0x0) 14:40:02 executing program 0: syz_emit_ethernet(0x8a, &(0x7f0000000140)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x54, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @fastopen={0x22, 0x5, "241ea7"}, @timestamp={0x8, 0xa}, @sack={0x5, 0xe, [0x0, 0x0, 0x0]}, @sack_perm={0x4, 0x2}, @mptcp=@synack={0x1e, 0x10}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:40:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x58, 0x2, 0x6, 0x101, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xff}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x58}}, 0x0) 14:40:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001400)=@ipv6_newrule={0x2c, 0x20, 0x313, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_FWMASK={0x8}, @FIB_RULE_POLICY=@FRA_FWMARK={0x8, 0xa, 0x7}]}, 0x2c}}, 0x0) 14:40:02 executing program 0: r0 = epoll_create1(0x0) r1 = gettid() r2 = getpgid(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)) r5 = dup(r3) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000000)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r4, r5, 0x40}) 14:40:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 14:40:02 executing program 0: r0 = epoll_create1(0x0) r1 = gettid() r2 = getpgid(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)) r5 = dup(r3) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000000)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r4, r5, 0x40}) 14:40:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001400)=@ipv6_newrule={0x2c, 0x20, 0x313, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_FWMASK={0x8}, @FIB_RULE_POLICY=@FRA_FWMARK={0x8, 0xa, 0x7}]}, 0x2c}}, 0x0) 14:40:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 14:40:02 executing program 0: r0 = epoll_create1(0x0) r1 = gettid() r2 = getpgid(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)) r5 = dup(r3) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000000)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r4, r5, 0x40}) 14:40:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x2000070, 0x0) r4 = dup3(r3, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000380)="11", 0x1}], 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 14:40:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001400)=@ipv6_newrule={0x2c, 0x20, 0x313, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_FWMASK={0x8}, @FIB_RULE_POLICY=@FRA_FWMARK={0x8, 0xa, 0x7}]}, 0x2c}}, 0x0) 14:40:02 executing program 0: r0 = epoll_create1(0x0) r1 = gettid() r2 = getpgid(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)) r5 = dup(r3) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000000)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r4, r5, 0x40}) 14:40:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 14:40:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x2000070, 0x0) r4 = dup3(r3, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000380)="11", 0x1}], 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 14:40:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x2000070, 0x0) r4 = dup3(r3, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000380)="11", 0x1}], 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 14:40:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 14:40:02 executing program 1: r0 = epoll_create1(0x0) r1 = gettid() r2 = getpgid(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)) r5 = dup(r3) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000000)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r4, r5, 0x40}) 14:40:02 executing program 1: r0 = epoll_create1(0x0) r1 = gettid() r2 = getpgid(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)) r5 = dup(r3) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000000)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r4, r5, 0x40}) 14:40:02 executing program 3: pipe(&(0x7f0000000080)) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) pipe(&(0x7f0000000640)) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d01000000000001fd5c5c00000008000300", @ANYRES32], 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff8305000000f9ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 14:40:02 executing program 1: r0 = epoll_create1(0x0) r1 = gettid() r2 = getpgid(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)) r5 = dup(r3) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000000)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r4, r5, 0x40}) 14:40:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001a000100000000000000000081800000", @ANYRES32=0x0, @ANYBLOB="00000000140001"], 0x30}}, 0x0) 14:40:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001a000100000000000000000081800000", @ANYRES32=0x0, @ANYBLOB="00000000140001"], 0x30}}, 0x0) 14:40:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x2000070, 0x0) r4 = dup3(r3, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000380)="11", 0x1}], 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 14:40:03 executing program 2: pipe(&(0x7f0000000080)) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) pipe(&(0x7f0000000640)) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="2d01000000000001fd5c5c00000008000300", @ANYRES32], 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r5, @ANYBLOB="ff8305000000f9ffffff", @ANYRES32=r2], 0x4}}, 0x0) sendfile(r4, r3, 0x0, 0x100000002) 14:40:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001a000100000000000000000081800000", @ANYRES32=0x0, @ANYBLOB="00000000140001"], 0x30}}, 0x0) 14:40:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x2000070, 0x0) r4 = dup3(r3, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000380)="11", 0x1}], 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 14:40:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001a000100000000000000000081800000", @ANYRES32=0x0, @ANYBLOB="00000000140001"], 0x30}}, 0x0) 14:40:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x2000070, 0x0) r4 = dup3(r3, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000380)="11", 0x1}], 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 14:40:03 executing program 1: migrate_pages(0x0, 0x7ff, 0x0, 0xfffffffffffffffe) 14:40:03 executing program 1: migrate_pages(0x0, 0x7ff, 0x0, 0xfffffffffffffffe) 14:40:03 executing program 1: migrate_pages(0x0, 0x7ff, 0x0, 0xfffffffffffffffe) 14:40:03 executing program 1: migrate_pages(0x0, 0x7ff, 0x0, 0xfffffffffffffffe) 14:40:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) ioctl$KDFONTOP_SET_DEF(r0, 0x4b45, 0x0) 14:40:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) ioctl$KDFONTOP_SET_DEF(r0, 0x4b45, 0x0) 14:40:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x2000070, 0x0) r4 = dup3(r3, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000380)="11", 0x1}], 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 14:40:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) ioctl$KDFONTOP_SET_DEF(r0, 0x4b45, 0x0) 14:40:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) ioctl$KDFONTOP_SET_DEF(r0, 0x4b45, 0x0) 14:40:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000000)={@void, @void, @eth={@broadcast, @broadcast, @val={@void, {0x8847}}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "015914", 0x44, 0x6, 0x0, @rand_addr=' \x01\x00', @mcast2, {[], {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x6}}}}}}}}}, 0x7e) 14:40:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x2000070, 0x0) r4 = dup3(r3, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000380)="11", 0x1}], 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 14:40:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x2000070, 0x0) r4 = dup3(r3, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000380)="11", 0x1}], 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) [ 81.881793][ T6241] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) 14:40:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000000)={@void, @void, @eth={@broadcast, @broadcast, @val={@void, {0x8847}}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "015914", 0x44, 0x6, 0x0, @rand_addr=' \x01\x00', @mcast2, {[], {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x6}}}}}}}}}, 0x7e) 14:40:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000000)={@void, @void, @eth={@broadcast, @broadcast, @val={@void, {0x8847}}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "015914", 0x44, 0x6, 0x0, @rand_addr=' \x01\x00', @mcast2, {[], {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x6}}}}}}}}}, 0x7e) 14:40:03 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000440)={0x1, 0x0, 0x1c, 0x0, 0x0, &(0x7f0000000040)}) 14:40:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000000)={@void, @void, @eth={@broadcast, @broadcast, @val={@void, {0x8847}}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "015914", 0x44, 0x6, 0x0, @rand_addr=' \x01\x00', @mcast2, {[], {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x6}}}}}}}}}, 0x7e) 14:40:03 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000440)={0x1, 0x0, 0x1c, 0x0, 0x0, &(0x7f0000000040)}) 14:40:03 executing program 5: r0 = socket(0x1, 0x5, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 14:40:03 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000440)={0x1, 0x0, 0x1c, 0x0, 0x0, &(0x7f0000000040)}) 14:40:03 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/816]}, 0x3a8) 14:40:03 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/816]}, 0x3a8) 14:40:03 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000440)={0x1, 0x0, 0x1c, 0x0, 0x0, &(0x7f0000000040)}) 14:40:03 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x60}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) 14:40:03 executing program 5: r0 = socket(0x1, 0x5, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 14:40:03 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000002000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f736530000000cc000000000000007465616f5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b74747970650000000000000000000000000000000000000000000000db000800000000000000f3f69d3e000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000400000000000000ff00000000726564697265637400000000396c27db39b2eedb0000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000005000000000000006c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000800080000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f34121000000000000000000000000000000000000eaffffff00000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00"/816]}, 0x3a8) 14:40:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000000)={@void, @void, @eth={@broadcast, @broadcast, @val={@void, {0x8847}}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "015914", 0x44, 0x6, 0x0, @rand_addr=' \x01\x00', @mcast2, {[], {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x6}}}}}}}}}, 0x7e) 14:40:03 executing program 5: r0 = socket(0x1, 0x5, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 14:40:03 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x60}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) 14:40:03 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/816]}, 0x3a8) 14:40:03 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x0, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 14:40:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000000)={@void, @void, @eth={@broadcast, @broadcast, @val={@void, {0x8847}}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "015914", 0x44, 0x6, 0x0, @rand_addr=' \x01\x00', @mcast2, {[], {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x6}}}}}}}}}, 0x7e) 14:40:03 executing program 5: r0 = socket(0x1, 0x5, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 14:40:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYRESHEX, @ANYRES64=0x0, @ANYRESOCT=0x0], 0xff, 0x2d0, &(0x7f0000001140)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 82.220706][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 82.220718][ T27] audit: type=1400 audit(1705070403.643:274): avc: denied { cpu } for pid=6287 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 82.229471][ T6293] loop0: detected capacity change from 0 to 128 14:40:03 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x0, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 14:40:03 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x60}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) 14:40:03 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x60}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) 14:40:03 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x0, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 82.246171][ T27] audit: type=1400 audit(1705070403.643:275): avc: denied { write } for pid=6287 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 14:40:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a005f3814f9f407000904018000000000000000000000000400070040000000", 0x24) 14:40:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000000)={@void, @void, @eth={@broadcast, @broadcast, @val={@void, {0x8847}}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "015914", 0x44, 0x6, 0x0, @rand_addr=' \x01\x00', @mcast2, {[], {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x6}}}}}}}}}, 0x7e) 14:40:03 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x0, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 14:40:03 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x0, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 14:40:03 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x0, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 14:40:03 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000a00)=""/190, 0xbe}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000540)=""/168, 0xa8}, {&(0x7f0000000080)=""/3, 0x3}, {&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000600)=""/100, 0x64}, {&(0x7f0000000680)=""/147, 0x93}, {&(0x7f0000000ac0)=""/196, 0xc4}, {&(0x7f0000000bc0)=""/237, 0xed}], 0x7}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x1bf}, {&(0x7f0000000280)=""/81, 0xf0}, {&(0x7f0000000fc0)=""/4096, 0x584}, {&(0x7f0000000400)=""/106, 0x35b}, {&(0x7f0000000740)=""/73, 0x10a}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000880)=""/204, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 14:40:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a005f3814f9f407000904018000000000000000000000000400070040000000", 0x24) 14:40:03 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x0, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 82.344461][ T6306] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 14:40:03 executing program 5: modify_ldt$write2(0x11, &(0x7f00000003c0)={0x85a}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) 14:40:03 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0xea60}) 14:40:03 executing program 5: modify_ldt$write2(0x11, &(0x7f00000003c0)={0x85a}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) 14:40:03 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000a00)=""/190, 0xbe}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000540)=""/168, 0xa8}, {&(0x7f0000000080)=""/3, 0x3}, {&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000600)=""/100, 0x64}, {&(0x7f0000000680)=""/147, 0x93}, {&(0x7f0000000ac0)=""/196, 0xc4}, {&(0x7f0000000bc0)=""/237, 0xed}], 0x7}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x1bf}, {&(0x7f0000000280)=""/81, 0xf0}, {&(0x7f0000000fc0)=""/4096, 0x584}, {&(0x7f0000000400)=""/106, 0x35b}, {&(0x7f0000000740)=""/73, 0x10a}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000880)=""/204, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 14:40:03 executing program 4: modify_ldt$write2(0x11, &(0x7f00000003c0)={0x85a}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) 14:40:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a005f3814f9f407000904018000000000000000000000000400070040000000", 0x24) [ 82.433686][ T6318] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 14:40:03 executing program 5: modify_ldt$write2(0x11, &(0x7f00000003c0)={0x85a}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) 14:40:03 executing program 4: modify_ldt$write2(0x11, &(0x7f00000003c0)={0x85a}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) 14:40:03 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000a00)=""/190, 0xbe}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000540)=""/168, 0xa8}, {&(0x7f0000000080)=""/3, 0x3}, {&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000600)=""/100, 0x64}, {&(0x7f0000000680)=""/147, 0x93}, {&(0x7f0000000ac0)=""/196, 0xc4}, {&(0x7f0000000bc0)=""/237, 0xed}], 0x7}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x1bf}, {&(0x7f0000000280)=""/81, 0xf0}, {&(0x7f0000000fc0)=""/4096, 0x584}, {&(0x7f0000000400)=""/106, 0x35b}, {&(0x7f0000000740)=""/73, 0x10a}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000880)=""/204, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 14:40:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a005f3814f9f407000904018000000000000000000000000400070040000000", 0x24) 14:40:03 executing program 5: modify_ldt$write2(0x11, &(0x7f00000003c0)={0x85a}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) 14:40:04 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0xea60}) [ 82.517546][ T6333] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 14:40:04 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000a00)=""/190, 0xbe}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000540)=""/168, 0xa8}, {&(0x7f0000000080)=""/3, 0x3}, {&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000600)=""/100, 0x64}, {&(0x7f0000000680)=""/147, 0x93}, {&(0x7f0000000ac0)=""/196, 0xc4}, {&(0x7f0000000bc0)=""/237, 0xed}], 0x7}}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/110, 0x1bf}, {&(0x7f0000000280)=""/81, 0xf0}, {&(0x7f0000000fc0)=""/4096, 0x584}, {&(0x7f0000000400)=""/106, 0x35b}, {&(0x7f0000000740)=""/73, 0x10a}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x4a}, {&(0x7f0000000100)=""/16, 0x1a8}], 0x81, &(0x7f0000000880)=""/204, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 14:40:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x3c}, {0x6}]}) 14:40:04 executing program 4: modify_ldt$write2(0x11, &(0x7f00000003c0)={0x85a}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) 14:40:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYRESHEX, @ANYRES64=0x0, @ANYRESOCT=0x0], 0xff, 0x2d0, &(0x7f0000001140)="$eJzs3E1rE10UwPHTNk3SlDZZPDyiIh50owhDG/dCkBbFgNI2YhWEaTvRkDEpmaESkbau3IofwkXpsruCunDbjTtXbtx1oeDCgi8jM5m0aU2pRZPU9v+DZM68nNx7mZlwbiCzfuvZg2LeMfKmK93xXukWWZQNkZQfiVT9ty4RiUtNl0T9RV+4Kotyvv/zu1Pjk7evZbLZkTHV0czExbSqDp5++fDx8pnXbv/NlcHVmKyl7q5/Sn9Y+3/t+PqPifsFRwuOlsqumjpVfu9Gp2xLZwpO0VC94XmmY2mh9GZSJNhfdk1/f94uz85W1SzNDCRmK5bjqFmqatGqqkREKlU175mFkhqGoQMJwV5iS2NjZiYI4/tOnm5Bh/DHrvxy4VcqGbOn8abdlFtqV68AAMDBsb3+1531f6ArXPpbvnue15i/v/p/NbpL/R/W9/X637Zq9b9jVdzfq//dsrp+/R+h/t+H3Fb9j0PLr/8T4f0beHJneSgIqP8BAAAAAAAAAAAAAAAAAAAAAPgXbHhe0vO8ZH1Zf8XCv4TX1zvdT7QG5/9oG9cwUI2L2E/ncnM5Ebu3tnHzvFsyJEn5FlwPoVo8ejU7MqSBlLyyF8L8hblcT5CYyUtBbLFkWJKSap4/XMvX7fm9kmjMT0tS/muen26aH5VzZxvyDUnK22kpiy0zwXW9lT8/rHr5enZHfl9wHAAAAAAAh4Ghm5rO3w1jt/21/ExeJJhf7/37wI75dURORDo7dgAAAAAAjgqn+qho2rZVaWMQF5HWt+WPrr3jahLMX+hk650Okg1b6g+Rbns3Io2NxsJetKitY89ffPl7H3hp5eTXzp3Bzn0nAQAAAGiNraJ/92O8j+3sEQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAR087HifW6TECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB8XPAAAA///QVyZJ") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 14:40:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYRESHEX, @ANYRES64=0x0, @ANYRESOCT=0x0], 0xff, 0x2d0, &(0x7f0000001140)="$eJzs3E1rE10UwPHTNk3SlDZZPDyiIh50owhDG/dCkBbFgNI2YhWEaTvRkDEpmaESkbau3IofwkXpsruCunDbjTtXbtx1oeDCgi8jM5m0aU2pRZPU9v+DZM68nNx7mZlwbiCzfuvZg2LeMfKmK93xXukWWZQNkZQfiVT9ty4RiUtNl0T9RV+4Kotyvv/zu1Pjk7evZbLZkTHV0czExbSqDp5++fDx8pnXbv/NlcHVmKyl7q5/Sn9Y+3/t+PqPifsFRwuOlsqumjpVfu9Gp2xLZwpO0VC94XmmY2mh9GZSJNhfdk1/f94uz85W1SzNDCRmK5bjqFmqatGqqkREKlU175mFkhqGoQMJwV5iS2NjZiYI4/tOnm5Bh/DHrvxy4VcqGbOn8abdlFtqV68AAMDBsb3+1531f6ArXPpbvnue15i/v/p/NbpL/R/W9/X637Zq9b9jVdzfq//dsrp+/R+h/t+H3Fb9j0PLr/8T4f0beHJneSgIqP8BAAAAAAAAAAAAAAAAAAAAAPgXbHhe0vO8ZH1Zf8XCv4TX1zvdT7QG5/9oG9cwUI2L2E/ncnM5Ebu3tnHzvFsyJEn5FlwPoVo8ejU7MqSBlLyyF8L8hblcT5CYyUtBbLFkWJKSap4/XMvX7fm9kmjMT0tS/muen26aH5VzZxvyDUnK22kpiy0zwXW9lT8/rHr5enZHfl9wHAAAAAAAh4Ghm5rO3w1jt/21/ExeJJhf7/37wI75dURORDo7dgAAAAAAjgqn+qho2rZVaWMQF5HWt+WPrr3jahLMX+hk650Okg1b6g+Rbns3Io2NxsJetKitY89ffPl7H3hp5eTXzp3Bzn0nAQAAAGiNraJ/92O8j+3sEQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAR087HifW6TECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB8XPAAAA///QVyZJ") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 14:40:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newtaction={0xe94, 0x30, 0x25, 0x0, 0x0, {}, [{0xe80, 0x1, [@m_pedit={0xe7c, 0x1, 0x0, 0x0, {{0xa}, {0xe50, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x2c, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x2}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe94}}, 0x0) 14:40:04 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) 14:40:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x3c}, {0x6}]}) [ 82.599663][ T6343] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 82.621659][ T27] audit: type=1326 audit(1705070404.043:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6348 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f01774e8d29 code=0x0 14:40:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newtaction={0xe94, 0x30, 0x25, 0x0, 0x0, {}, [{0xe80, 0x1, [@m_pedit={0xe7c, 0x1, 0x0, 0x0, {{0xa}, {0xe50, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x2c, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x2}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe94}}, 0x0) 14:40:04 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) 14:40:04 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) 14:40:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newtaction={0xe94, 0x30, 0x25, 0x0, 0x0, {}, [{0xe80, 0x1, [@m_pedit={0xe7c, 0x1, 0x0, 0x0, {{0xa}, {0xe50, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x2c, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x2}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe94}}, 0x0) 14:40:04 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) 14:40:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x3c}, {0x6}]}) [ 82.678291][ T6356] loop0: detected capacity change from 0 to 128 [ 82.690772][ T6360] loop4: detected capacity change from 0 to 128 [ 82.704822][ T27] audit: type=1326 audit(1705070404.123:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6358 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f01774e8d29 code=0x0 14:40:04 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0xea60}) 14:40:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newtaction={0xe94, 0x30, 0x25, 0x0, 0x0, {}, [{0xe80, 0x1, [@m_pedit={0xe7c, 0x1, 0x0, 0x0, {{0xa}, {0xe50, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x2c, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x2}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe94}}, 0x0) 14:40:04 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xf5\xbf\xb4\b\xedcJ\x8e\a\x00\x00\x00\x00\x00\x00\x00\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x12, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x13, 0x0, &(0x7f0000000040)) 14:40:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x3c}, {0x6}]}) [ 82.781993][ T27] audit: type=1326 audit(1705070404.203:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6371 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f01774e8d29 code=0x0 14:40:04 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xf5\xbf\xb4\b\xedcJ\x8e\a\x00\x00\x00\x00\x00\x00\x00\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x12, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x13, 0x0, &(0x7f0000000040)) 14:40:04 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0xea60}) 14:40:04 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) tgkill(r0, r0, 0x12) syz_open_procfs$userns(r0, &(0x7f0000000000)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) wait4(0x0, 0xffffffffffffffff, 0x0, 0x0) [ 82.845119][ T27] audit: type=1400 audit(1705070404.263:279): avc: denied { execute } for pid=6376 comm="syz-executor.1" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=33 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 82.869923][ T27] audit: type=1326 audit(1705070404.263:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6377 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f01774e8d29 code=0x0 14:40:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback, 0x0, r2}) 14:40:04 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) tgkill(r0, r0, 0x12) syz_open_procfs$userns(r0, &(0x7f0000000000)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) wait4(0x0, 0xffffffffffffffff, 0x0, 0x0) 14:40:04 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xf5\xbf\xb4\b\xedcJ\x8e\a\x00\x00\x00\x00\x00\x00\x00\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x12, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x13, 0x0, &(0x7f0000000040)) 14:40:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback, 0x0, r2}) 14:40:04 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xf5\xbf\xb4\b\xedcJ\x8e\a\x00\x00\x00\x00\x00\x00\x00\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x12, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x13, 0x0, &(0x7f0000000040)) 14:40:04 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) tgkill(r0, r0, 0x12) syz_open_procfs$userns(r0, &(0x7f0000000000)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) wait4(0x0, 0xffffffffffffffff, 0x0, 0x0) 14:40:04 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) tgkill(r0, r0, 0x12) syz_open_procfs$userns(r0, &(0x7f0000000000)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) wait4(0x0, 0xffffffffffffffff, 0x0, 0x0) 14:40:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback, 0x0, r2}) 14:40:04 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) tgkill(r0, r0, 0x12) syz_open_procfs$userns(r0, &(0x7f0000000000)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) wait4(0x0, 0xffffffffffffffff, 0x0, 0x0) 14:40:04 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) tgkill(r0, r0, 0x12) syz_open_procfs$userns(r0, &(0x7f0000000000)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) wait4(0x0, 0xffffffffffffffff, 0x0, 0x0) 14:40:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback, 0x0, r2}) 14:40:04 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) tgkill(r0, r0, 0x12) syz_open_procfs$userns(r0, &(0x7f0000000000)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) wait4(0x0, 0xffffffffffffffff, 0x0, 0x0) 14:40:04 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) tgkill(r0, r0, 0x12) syz_open_procfs$userns(r0, &(0x7f0000000000)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) wait4(0x0, 0xffffffffffffffff, 0x0, 0x0) 14:40:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x83}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x2}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) [ 83.141230][ T6431] selinux_netlink_send: 6 callbacks suppressed [ 83.141244][ T6431] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=6431 comm=syz-executor.5 [ 83.178346][ T6431] __nla_validate_parse: 19 callbacks suppressed 14:40:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYRESHEX, @ANYRES64=0x0, @ANYRESOCT=0x0], 0xff, 0x2d0, &(0x7f0000001140)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 14:40:04 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) tgkill(r0, r0, 0x12) syz_open_procfs$userns(r0, &(0x7f0000000000)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) wait4(0x0, 0xffffffffffffffff, 0x0, 0x0) 14:40:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000140)=[@in={0x2, 0x4e23, @private=0xa010100}], 0x10) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}}, &(0x7f0000000040)=0x98) 14:40:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x100, 0xf0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r0}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000580)={r0, &(0x7f0000000480), 0x0}, 0x20) [ 83.178359][ T6431] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 14:40:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x83}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x2}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) 14:40:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x100, 0xf0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r0}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000580)={r0, &(0x7f0000000480), 0x0}, 0x20) 14:40:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYRESHEX, @ANYRES64=0x0, @ANYRESOCT=0x0], 0xff, 0x2d0, &(0x7f0000001140)="$eJzs3E1rE10UwPHTNk3SlDZZPDyiIh50owhDG/dCkBbFgNI2YhWEaTvRkDEpmaESkbau3IofwkXpsruCunDbjTtXbtx1oeDCgi8jM5m0aU2pRZPU9v+DZM68nNx7mZlwbiCzfuvZg2LeMfKmK93xXukWWZQNkZQfiVT9ty4RiUtNl0T9RV+4Kotyvv/zu1Pjk7evZbLZkTHV0czExbSqDp5++fDx8pnXbv/NlcHVmKyl7q5/Sn9Y+3/t+PqPifsFRwuOlsqumjpVfu9Gp2xLZwpO0VC94XmmY2mh9GZSJNhfdk1/f94uz85W1SzNDCRmK5bjqFmqatGqqkREKlU175mFkhqGoQMJwV5iS2NjZiYI4/tOnm5Bh/DHrvxy4VcqGbOn8abdlFtqV68AAMDBsb3+1531f6ArXPpbvnue15i/v/p/NbpL/R/W9/X637Zq9b9jVdzfq//dsrp+/R+h/t+H3Fb9j0PLr/8T4f0beHJneSgIqP8BAAAAAAAAAAAAAAAAAAAAAPgXbHhe0vO8ZH1Zf8XCv4TX1zvdT7QG5/9oG9cwUI2L2E/ncnM5Ebu3tnHzvFsyJEn5FlwPoVo8ejU7MqSBlLyyF8L8hblcT5CYyUtBbLFkWJKSap4/XMvX7fm9kmjMT0tS/muen26aH5VzZxvyDUnK22kpiy0zwXW9lT8/rHr5enZHfl9wHAAAAAAAh4Ghm5rO3w1jt/21/ExeJJhf7/37wI75dURORDo7dgAAAAAAjgqn+qho2rZVaWMQF5HWt+WPrr3jahLMX+hk650Okg1b6g+Rbns3Io2NxsJetKitY89ffPl7H3hp5eTXzp3Bzn0nAQAAAGiNraJ/92O8j+3sEQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAR087HifW6TECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB8XPAAAA///QVyZJ") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 83.229410][ T6438] loop4: detected capacity change from 0 to 128 [ 83.259878][ T6445] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=6445 comm=syz-executor.5 14:40:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x100, 0xf0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r0}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000580)={r0, &(0x7f0000000480), 0x0}, 0x20) 14:40:04 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) tgkill(r0, r0, 0x12) syz_open_procfs$userns(r0, &(0x7f0000000000)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) wait4(0x0, 0xffffffffffffffff, 0x0, 0x0) [ 83.279775][ T6449] loop0: detected capacity change from 0 to 128 [ 83.291215][ T6445] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 14:40:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x100, 0xf0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r0}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000580)={r0, &(0x7f0000000480), 0x0}, 0x20) 14:40:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x100, 0xf0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r0}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000580)={r0, &(0x7f0000000480), 0x0}, 0x20) 14:40:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x83}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x2}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) 14:40:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x83}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x2}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) 14:40:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x100, 0xf0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r0}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000580)={r0, &(0x7f0000000480), 0x0}, 0x20) 14:40:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x100, 0xf0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r0}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000580)={r0, &(0x7f0000000480), 0x0}, 0x20) [ 83.404121][ T6462] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=6462 comm=syz-executor.5 [ 83.414531][ T6465] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=6465 comm=syz-executor.1 [ 83.438227][ T6462] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 14:40:04 executing program 2: sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x0) syz_io_uring_setup(0x6165, &(0x7f0000000200)={0x0, 0x0, 0x200}, &(0x7f0000000080), &(0x7f0000000000)) syz_io_uring_setup(0x5056, &(0x7f0000000140)={0x0, 0x0, 0xf004}, 0x0, 0x0) 14:40:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x83}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x2}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) [ 83.469852][ T6465] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 14:40:04 executing program 2: sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x0) syz_io_uring_setup(0x6165, &(0x7f0000000200)={0x0, 0x0, 0x200}, &(0x7f0000000080), &(0x7f0000000000)) syz_io_uring_setup(0x5056, &(0x7f0000000140)={0x0, 0x0, 0xf004}, 0x0, 0x0) 14:40:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x83}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x2}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) 14:40:04 executing program 2: sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x0) syz_io_uring_setup(0x6165, &(0x7f0000000200)={0x0, 0x0, 0x200}, &(0x7f0000000080), &(0x7f0000000000)) syz_io_uring_setup(0x5056, &(0x7f0000000140)={0x0, 0x0, 0xf004}, 0x0, 0x0) [ 83.548949][ T6475] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=6475 comm=syz-executor.5 [ 83.572727][ T6475] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 14:40:05 executing program 2: sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x0) syz_io_uring_setup(0x6165, &(0x7f0000000200)={0x0, 0x0, 0x200}, &(0x7f0000000080), &(0x7f0000000000)) syz_io_uring_setup(0x5056, &(0x7f0000000140)={0x0, 0x0, 0xf004}, 0x0, 0x0) 14:40:05 executing program 5: sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x0) syz_io_uring_setup(0x6165, &(0x7f0000000200)={0x0, 0x0, 0x200}, &(0x7f0000000080), &(0x7f0000000000)) syz_io_uring_setup(0x5056, &(0x7f0000000140)={0x0, 0x0, 0xf004}, 0x0, 0x0) 14:40:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYRESHEX, @ANYRES64=0x0, @ANYRESOCT=0x0], 0xff, 0x2d0, &(0x7f0000001140)="$eJzs3E1rE10UwPHTNk3SlDZZPDyiIh50owhDG/dCkBbFgNI2YhWEaTvRkDEpmaESkbau3IofwkXpsruCunDbjTtXbtx1oeDCgi8jM5m0aU2pRZPU9v+DZM68nNx7mZlwbiCzfuvZg2LeMfKmK93xXukWWZQNkZQfiVT9ty4RiUtNl0T9RV+4Kotyvv/zu1Pjk7evZbLZkTHV0czExbSqDp5++fDx8pnXbv/NlcHVmKyl7q5/Sn9Y+3/t+PqPifsFRwuOlsqumjpVfu9Gp2xLZwpO0VC94XmmY2mh9GZSJNhfdk1/f94uz85W1SzNDCRmK5bjqFmqatGqqkREKlU175mFkhqGoQMJwV5iS2NjZiYI4/tOnm5Bh/DHrvxy4VcqGbOn8abdlFtqV68AAMDBsb3+1531f6ArXPpbvnue15i/v/p/NbpL/R/W9/X637Zq9b9jVdzfq//dsrp+/R+h/t+H3Fb9j0PLr/8T4f0beHJneSgIqP8BAAAAAAAAAAAAAAAAAAAAAPgXbHhe0vO8ZH1Zf8XCv4TX1zvdT7QG5/9oG9cwUI2L2E/ncnM5Ebu3tnHzvFsyJEn5FlwPoVo8ejU7MqSBlLyyF8L8hblcT5CYyUtBbLFkWJKSap4/XMvX7fm9kmjMT0tS/muen26aH5VzZxvyDUnK22kpiy0zwXW9lT8/rHr5enZHfl9wHAAAAAAAh4Ghm5rO3w1jt/21/ExeJJhf7/37wI75dURORDo7dgAAAAAAjgqn+qho2rZVaWMQF5HWt+WPrr3jahLMX+hk650Okg1b6g+Rbns3Io2NxsJetKitY89ffPl7H3hp5eTXzp3Bzn0nAQAAAGiNraJ/92O8j+3sEQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAR087HifW6TECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB8XPAAAA///QVyZJ") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 14:40:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', 0x2010050, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYRESHEX, @ANYRES64=0x0, @ANYRESOCT=0x0], 0xff, 0x2d0, &(0x7f0000001140)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 14:40:05 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000300)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ce209", 0x48, 0x3a, 0x0, @private0, @local, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "72831c", 0x0, 0x2b, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, [@srh={0x0, 0x2, 0x4, 0x46, 0x0, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}]}}}}}}}, 0x0) [ 83.594384][ T6478] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=6478 comm=syz-executor.1 [ 83.638378][ T6478] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 14:40:05 executing program 5: sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x0) syz_io_uring_setup(0x6165, &(0x7f0000000200)={0x0, 0x0, 0x200}, &(0x7f0000000080), &(0x7f0000000000)) syz_io_uring_setup(0x5056, &(0x7f0000000140)={0x0, 0x0, 0xf004}, 0x0, 0x0) 14:40:05 executing program 5: sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x0) syz_io_uring_setup(0x6165, &(0x7f0000000200)={0x0, 0x0, 0x200}, &(0x7f0000000080), &(0x7f0000000000)) syz_io_uring_setup(0x5056, &(0x7f0000000140)={0x0, 0x0, 0xf004}, 0x0, 0x0) 14:40:05 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000300)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ce209", 0x48, 0x3a, 0x0, @private0, @local, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "72831c", 0x0, 0x2b, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, [@srh={0x0, 0x2, 0x4, 0x46, 0x0, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}]}}}}}}}, 0x0) 14:40:05 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000300)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ce209", 0x48, 0x3a, 0x0, @private0, @local, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "72831c", 0x0, 0x2b, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, [@srh={0x0, 0x2, 0x4, 0x46, 0x0, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}]}}}}}}}, 0x0) 14:40:05 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1d1e, 0x1) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x3, 0x0) [ 83.666216][ T6487] loop0: detected capacity change from 0 to 128 [ 83.687941][ T6490] loop4: detected capacity change from 0 to 128 14:40:05 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000300)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ce209", 0x48, 0x3a, 0x0, @private0, @local, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "72831c", 0x0, 0x2b, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, [@srh={0x0, 0x2, 0x4, 0x46, 0x0, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}]}}}}}}}, 0x0) 14:40:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x83}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=@bridge_newneigh={0x24, 0x1c, 0xd105d1610db53515, 0x0, 0x0, {0x2, 0x0, 0x0, r3, 0x2}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) 14:40:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@deltaction={0x28, 0x30, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}]}]}, 0x28}}, 0x0) 14:40:05 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000053c0)='o\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chmod(0x0, 0x0) [ 83.782618][ T6505] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=6505 comm=syz-executor.1 [ 83.808191][ T6505] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 14:40:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000140)=[@in={0x2, 0x4e23, @private=0xa010100}], 0x10) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}}, &(0x7f0000000040)=0x98) 14:40:05 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000053c0)='o\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chmod(0x0, 0x0) 14:40:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@deltaction={0x28, 0x30, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}]}]}, 0x28}}, 0x0) 14:40:05 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000053c0)='o\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chmod(0x0, 0x0) 14:40:05 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x4d}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 14:40:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@deltaction={0x28, 0x30, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}]}]}, 0x28}}, 0x0) 14:40:05 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x4d}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 14:40:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@deltaction={0x28, 0x30, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}]}]}, 0x28}}, 0x0) 14:40:05 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000053c0)='o\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chmod(0x0, 0x0) 14:40:05 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x4d}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 14:40:05 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x20020008) renameat2(r1, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f00000002c0)='./file1\x00', 0x4) r2 = dup(r0) renameat2(r2, &(0x7f0000000100)='./file0/file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x0) 14:40:05 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000053c0)='o\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chmod(0x0, 0x0) 14:40:05 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x4d}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 14:40:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001}, 0x8090}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x0, 0x9, 0x8, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000500), 0x1}, 0x0, 0xfffffffffffffffe, 0xfffffff7, 0x5, 0x6, 0x9, 0x81, 0x0, 0x5, 0x0, 0x81}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480), 0x101000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@generic={&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x10}, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x1, 0x20, 0xff, 0x0, 0xff, 0x8a0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x6, 0x7, 0x8, 0x40, 0x2, 0xa88, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x9) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000003c0)=0x1000, 0x12) openat$cgroup_ro(r3, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x9f) mkdirat$cgroup(r3, &(0x7f0000000240)='syz0\x00', 0x1ff) r5 = openat$cgroup_ro(r3, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000640)='ns/user\x00') openat$cgroup_ro(r5, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x200002, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000700), 0xffffffffffffffbd) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x1, 0x6, 0x9, 0x1, 0x0, 0x3f, 0x4004, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x1, 0x7}, 0x98208, 0x8, 0xa489, 0x5, 0x9, 0x0, 0xf56d, 0x0, 0x7, 0x0, 0x80}, 0x0, 0x1, r6, 0x9) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) write$cgroup_int(r4, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xf, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r2, 0x1a) syz_clone(0x3002d000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x18, 0x6000002c, &(0x7f0000000100)="b9ff03316844268cb89e14f0080065e0050000000000002f77fbac141416e000030a44079f03b180006000000000845013f2325f003901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014c0000c0adc043084617d7ecf41effff38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d7da058f6efa6d1f5f7ff400"/254, 0x0, 0xfe, 0x60000000, 0x0, 0xfffffffe}, 0x2c) 14:40:05 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\